Security

Cyber-Security: Everyone's High Stakes War

Free registration required

Executive Summary

The increasingly shocking trend of cyber crimes is penetrating an individual's personal life and violating nearly all aspects of our lives. Cyber criminals use evolving sophisticated information age tools to gun for a bigger game. Criminals are looking at credit card fraud, hacking, shoulder-surfing, fake Caller ID, phishing, spearing, and medical identity theft. In fact the top five security threats in 2009 included Malware - software designed to infiltrate or damage a computer system without the owner's informed consent, Botnets - groups of computers infected with malicious code and controlled by an outside master, Cyber warfare - the use of computers and the internet in conducting warfare in cyberspace, threats to VoIP and mobile devices, and the evolving cyber crime economy. Web 2.0, mobile convergence, and targeted messaging attacks were listed as 2008's top emerging threats. Increased online time and social networking are opening more windows for the criminal to enter. Cyber security is the need of the hour. Of great importance is the need to be aware of the various threats in a constantly changing online world, and then take preventive measures to protect ones identity and assets. This paper provides guidelines on what to do if identity theft occurs or in case of the need for a security firm, what aspects to look into. A checklist provides steps that can be taken to reduce the risk of identity theft.

  • Format: PDF
  • Size: 121.7 KB