Cyber Crime and Cyber Security – A Review of the Past Year

A appear at how the cyber safety landscape has played out this previous year, the online neighborhood has had to deal with a terrific deal of threats and attacks. Maybe these who have felt them more have been the organizations and firms. Away from these, espionage has seen the targeting of government networks and other installations of national interest in nations in the Middle East as effectively and the American government. 2012 has also been an year in which the apple brand was rattled by the flashback Trojan which impacted the Macs. The invincibility of the Macs in the face of malware and cyber threats was shattered and this changed the safety landscape for excellent.

A overview of the previous year will point out to the various attacks which have been aimed on Google powered android platform. The open supply nature of the platform has noticed the exploitation of the function by malware writers who worked to create malware infected apps and these have been unleashed to the android app marketplace. cloud erp hosted solutions have fallen for the cyber crime tactic. Mobile safety and the debate surrounding android security will be a aspect which can’t be ignored at all. The happenings this previous year where the android malware attacks have enhanced by more than 600% of what was reported the earlier year. These figures give credibility to the truth that android security is required and will be a significant talking point in the coming year in a bid to stem the malware and attacks noticed on the android platform.

It has been noted that cyber threats are now serious crimes and needed measures and measures need to have to be accomplished to confront this challenge. Cyber threats are no longer just an economic bottleneck but current activity indicates that cyber threats are becoming a political, a safety and a national situation. Hacktivism and espionage have been disturbing developments that now plague the cyber neighborhood. Predictions for the coming years outline that some of these threats will continue to raise in scale and further plague the cyber world.

In the present state of the globe, the cyber space touches and impacts on about all facets of life. Cyber security is then the duty of all stakeholders in this field to work towards defending against the known threats and working towards preventing the further escalation of the cyber crime status. The unfortunate scenario has been that the attacks have taken a non discriminatory method seen in the reality the cyber criminals and their rings do not spare anybody. Cyber attacks on folks, on schools and finding out institutions, government installations, military, enterprises and any other establishment which can be added to this list have been reported. These attacks show the extent to which cyber crime impacts numerous facets of life and how this monster is here to remain even in 2013. The sad scenario is that the cyber crime monster is nowhere near becoming tamed. There has been a steady rise in the quantity of threats identified each year. This indicates that the cyber safety niche will stay on its toes to stay abreast of the happenings connected to cyber crime. It culminates in the use of sources economic or otherwise. As a matter of fact, the budgets of corporations and other organizations continue expanding in a bid to keep secure from cyber criminals.

The 3 important interventions which can be vital in the quest to boost cyber security are enhancing the ability to protect against the cyber threats which are both agile and sophisticated, improving on systems and the potential to recover from cyber crime incidences and improvement of infrastructure to assure that it is resistant to penetration. These efforts can’t be carried out in isolation but need that cooperation is enhanced between parties who may well be on line customers themselves, government which aids with the formulation and enactment of policies and laws, cyber safety experts who investigation on cyber crime, trends and come up with measures which includes software program and patches to retain away the cyber criminals and lastly the cooperation from private sector and allied national governments.

And for the above named efforts to be profitable, enterprise, organizations, governments and people should really have comprehensive details on their infrastructure and networks and the reported works and intentions of cyber criminals to be on the safe and secure side.

Leave a Reply

Your email address will not be published.