Jumat, 27 April 2012

Kutipan Jurnal Internet Security


Journal of American Science 2010;6(1):15-24
Internet security - cyber crime Paradox
http://www.jofamericanscience.org/journals/am-sci/am0601/02_1046_Internet_Security_am0601.pdf

The journal discusses the cyber crime has been a major concern of Internet users and discuss about internet security . Cyber crimes have progressed into serious threats and proper legislation and prosecution is badly needed to combat them. Cyber crime legislation is always lagging behind the fast-growing technological advances which are used by the criminals as well as those who wish to combat them. There is also a need to consider the competing interests between individual rights of privacy and free speech, and the integrity of public and private networks. Due to the international nature of today's networks, no single country can enact laws to effectively address the issues related to cyber crimes.
Cyber crimes and cyber attacks. Any use of a computer and the internet to do some act that would be considered a crime is called a cyber crime since a crime is usually defined in terms of the end result. There are many types of cyber crimes including hacking, cracking, extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage. The tem 'hacker' usually refers to a computer user who wants to gain unauthorized access to a computer system while the term 'cracker' is used to refer to a hacker with criminal intentions. Crackers sabotage computers, steal information, and disrupt networks with malicious intents. Naturally, hacking and cracking should not be looked upon in the same way. Nearly a third of theft of confidential information and trade secrets is done by employees who have access to the target computer systems.
Legislation against cyber crime . The Interpol has also been active in combating cyber crimes by establishing regional working parties on IT crimes to facilitate the development of strategies, technologies, and information on the latest IT crime methods. Interpol uses its global police communications system to fight cyber crimes with the active participation of all member countries. Another important point needed in legislation against cyber crimes is provisions for broad jurisdiction. The Act has established the following acts as offenses:
a.       Unauthorized access to or modification of data stored in a computer with intent to commit a serious offence
b.      Unauthorized impairment of electronic communication to or from a computer with intent to commit a serious offence
c.       Unauthorized modification of data to cause impairment
d.      Unauthorized impairment of an electronic communication
e.       Unauthorized access to, or modification of restricted data, where the restricted data is either held for or on behalf of the Commonwealth or the access to or modification of it is caused by means of a telecommunications service
f.       Unauthorized impairment of data held on a computer disk, etc.
g.      Possession or control of data with intent to commit a computer offence
h.       Producing, supplying or obtaining data with intent to commit a computer offence.

Internet security of technology to track and locate the source of attacking programs and present the prerequisite factors for networking considering tracking technologies for counter-cyber attacks to program developers including security companies. They also presented trace back scenarios under various networking domain environment allowable for cyber attacks and described the required factors for tracing the attacking origins as well as other general things viewed from program requesters. Common recommendations for cyber safety are as follows:
a.       Use of antivirus software on the system
b.      Use of firewall on the system
c.       Frequent change of passwords
d.      Frequent scanning against spyware
e.       Maintaining backup of your important work
f.       Installing system software patches
g.      Removal of unnecessary software

Cyber security standards is a growing need for information assurance and security since sensitive information is often stored in computers that are attached to the internet. In addition to critical infrastructures, personal identity, important fiscal information, trade secrets, proprietary information and customers' information must also be safeguarded against possible cyber attacks. Cyber security standards are developed to provide security techniques in order to minimize the number of successful cyber attacks and provide guidelines for implementation of cyber security.
Digital and network forensics deals with discovering and retrieval of information about computer or cyber crimes to provide court-admissible digital evidence. The problem in network forensics is the huge network traffic that might crash the system if the traffic capture system is left unattended. In addition to the reinforcement of security policies, development and use of antispam, antivirus software, firewalls as means to combat cyber crimes, there is a serious need for the development and implementation of reliable and scalable hardware data security controllers.

Tidak ada komentar:

Posting Komentar