With the growth of mobile device, cloud and internet, we are witnessing a rise in cyber-crimes. Cyber-attacks result in breaches to data security and sabotage. Personal data, intellectual property, physiological harm are easy targets. for a data security breach. Attacks can result in commercial losses, disruption of operations and the possibility of extortion.
Epsilon was investigating the database breach and identified companies that were affected by the breach. As a result, Epsilon’s clients were forced to issue warnings to their customers about the breach, warning them to be aware of subsequent spam and phishing attacks as a result of the disclosing of email addresses. 4) Safeguards the company implemented since the breach. Epsilon added new security enhancements to its email marketing platform in collaboration with Verizon Business. The new features included enhanced protection for Epsilon 's information technology (IT) infrastructure and the ability to track malicious IP addresses.
The national government helps to stop Terrorists, human traffickers, cartels and child abusers who use the internet to communicate, exploit and engage in commerce. State and local government also provide officers in order to keep peace amongst the nation. Although they may not be fighting terrorists, such duties still use technology to secure America. The national government monitors the internet in the name of protecting its
Cyber security is gaining tremendous attention nowadays due to the increasing use of internet, computers by the media and various public and private institutions. They recognize the terrible impacts with the cyber attacks. At present, cyber attacks has resulted in computer based criminal activities which are generating worldwide threat, destruction and disruption. There is no cross border for cyber activities and the increase in the use of internet by the world wide users and lack of international cyber legal regime resulting the increase of the international cyber attacks. Cyber security involves preventative methods which are used to protect information from being stolen or attacked.
Cyber-attacks are attacks on a target system carried about by different people and may not be associated with a terrorist group. They may be trying to steal information or corrupt data. There are many ways to carry out cyber-attacks such as malware, botnets, viruses, denial of service (DoS) accounts and many other types of attacks. Cybersecurity is also known as information security which applies to devices such as computers, laptops, mobile devices, networks, and including the internet to include preventing unauthorized access, modify, or destroying data. Department of Homeland Security plays roles in securing the federal government and helping to secure a cyber-ecosystem by helping with investigations and arrest of cyber criminals, releasing cyber alerts about threats, and educate the public and stay safe online.
The US’s governments goal is to protect all their citizens at all costs, because of this, data can be breached and used to make sure the user is safe. According to the 2010 National Security Strategy “cybersecurity threats represent one of the most serious national security, public safety, and economic challenges we face as a nation.” This is used to give the United States government the ability to not only look into potential terrorist plots but to also stop them before they ever happen. “The threats encompassed by our cybersecurity are created by three elements: (1) knowledge of a vulnerability, (2) access to it, and (3) a payload. (38) All cyber insecurities require some vulnerability--that is, a flaw or weakness”. (Finnmore and Duncan) The US has tried to limit these flaws or weaknesses online but has not been able to completely get rid of them because they allow their citizens to have more privacy and the problem won’t be stopped until they can access and assess all data from their citizens.
Internet as one of the most significant inventions in the 21st century broads our horizon, connects the world together and completely rewrites the human history. However as every other technology, Internet has its own limitation which is its anonymity. As Internet and computer have taken over more and more operations, devious people began to utilize internet to commit crimes or even planning terrorist attack. Argomaniz (2014) claimed that terrorists might take advantages of the information technology to destroy the operation system of electricity, public transportation and etc. which could lead to physical damages and civilian casualties.
Benefits of Vulnerability Assessment and Penetration Testing Vulnerability Assessment and Penetration Testing provides organizations with a more extensive system analysis than any single test can perform alone. Using the VAPT offers a company a more comprehensive view of the threats, flaws facing its system, enabling the company to better protect its data and systems from malicious attacks. Most companies are spending a lot of money trying to find ways to safeguard them on the internet. Vulnerability Assessment is one of the techniques that many organizations overlook when developing and establishing their security design. Vulnerability Assessment can be a very beneficial for organization.
Globalisation and the rise in technology have contributed to the advancement of terrorism. Internet savvy terrorist go on to create propaganda in the online society, which could result in further recruitment of like-minded individuals. Radicals could be nurtured into terrorist ideologies. One of the recent spades of events that is an ongoing threat to society and government is cyber terrorism. Firstly, Social networking creates a platform for collaboration of individuals through the online societal context.
Not protecting ones Personally Identifiable information can have great consequences. Sensitive Personally Identifiable Information can become public by being hacked on the computer, smartphone or tablet. This may grant the hacker access to, among other things, the individuals name, address, Social Security number, bank information. If the hacker or the person that has gained access to this personal information, it is no problem to steal the hacked persons identity and commit crimes, steal their money, or put them in dept. Furthermore, someone might now be able to post from the strangers social media sites which can cause someone their job if something especially degrading or embarrassing is said.