Journal of American Science
2010;6(1):15-24
Internet
security - cyber crime Paradox
http://www.jofamericanscience.org/journals/am-sci/am0601/02_1046_Internet_Security_am0601.pdf
The
journal discusses the cyber crime has been a major concern of Internet users and discuss about
internet security . Cyber crimes
have progressed into serious threats and proper legislation and prosecution is
badly needed to combat them. Cyber crime legislation is always lagging behind
the fast-growing technological advances which are used by the criminals as well
as those who wish to combat them. There is also a need to consider the
competing interests between individual rights of privacy and free speech, and
the integrity of public and private networks. Due to the international nature
of today's networks, no single country can enact laws to effectively address the
issues related to cyber crimes.
Cyber crimes and cyber
attacks. Any use of a computer and the internet to do some act that would be considered a
crime is called a cyber crime
since a crime is usually defined in terms of the end result. There are many types of cyber crimes including hacking, cracking,
extortion, child pornography,
money laundering, fraud, software pirating,
and corporate espionage. The tem 'hacker' usually refers to a computer user who
wants to gain unauthorized access to a computer system while the term 'cracker'
is used to refer to a hacker with criminal intentions. Crackers sabotage
computers, steal information, and disrupt networks with malicious intents.
Naturally, hacking and cracking should not be looked upon in the same way. Nearly
a third of theft of confidential information and trade secrets is done by
employees who have access to the target computer systems.
Legislation against cyber crime . The Interpol has
also been active in combating cyber crimes by establishing regional working
parties on IT crimes to facilitate the development of strategies, technologies,
and information on the latest IT crime methods. Interpol uses its global police
communications system to fight cyber crimes with the active participation of
all member countries. Another important point needed in legislation against
cyber crimes is provisions for broad jurisdiction. The Act has established the
following acts as offenses:
a. Unauthorized
access to or modification of data stored in a computer with intent to commit a
serious offence
b. Unauthorized
impairment of electronic communication to or from a computer with intent to
commit a serious offence
c. Unauthorized
modification of data to cause impairment
d. Unauthorized
impairment of an electronic communication
e. Unauthorized
access to, or modification of restricted data, where the restricted data is
either held for or on behalf of the Commonwealth or the access to or
modification of it is caused by means of a telecommunications service
f. Unauthorized
impairment of data held on a computer disk, etc.
g. Possession
or control of data with intent to commit a computer offence
h. Producing, supplying or obtaining data with
intent to commit a computer offence.
Internet security of
technology to track and locate the source of attacking programs and present the
prerequisite factors for networking considering tracking technologies for
counter-cyber attacks to program developers including security companies. They
also presented trace back scenarios under various networking domain environment
allowable for cyber attacks and described the required factors for tracing the
attacking origins as well as other general things viewed from program
requesters. Common recommendations for cyber safety are as follows:
a. Use
of antivirus software on the system
b. Use
of firewall on the system
c. Frequent
change of passwords
d. Frequent
scanning against spyware
e. Maintaining
backup of your important work
f. Installing
system software patches
g. Removal
of unnecessary software
Cyber security standards
is a growing need for information assurance
and security since sensitive information is often stored in computers that are attached to the internet. In addition to critical
infrastructures, personal
identity, important fiscal information, trade secrets, proprietary information and customers' information must also be safeguarded
against possible cyber attacks.
Cyber security standards are developed
to provide security techniques in order to minimize the number of successful cyber attacks and provide guidelines for implementation
of cyber security.
Digital and network forensics deals with discovering
and retrieval of information about computer or cyber crimes to provide
court-admissible digital evidence. The problem in network forensics is the huge
network traffic that might crash the system if the traffic capture system is
left unattended. In addition to the reinforcement of security policies,
development and use of antispam, antivirus software, firewalls as means to
combat cyber crimes, there is a serious need for the development and
implementation of reliable and scalable hardware data security controllers.
Tidak ada komentar:
Posting Komentar