CYBER POLICE
Now days there is many of criminals that are caused
of the development of technology in such away the security of the confidential information
must be protected well
Cyber police is the situation where by police
secures the information and finding fighting the cyber crime propaganda and
monitoring and manipulating the public opinion in many countries.
Each country has the strategy and techniques of secure
their country with attack of information in the computer networks.
Internet users have the procedures on implementation of preventive
measures in order to reduce possible damage from security incidents and to help
them in responding to security threats
At United
Kingdom operating an Internet ‘Hotline’ for the public and IT professionals to
report their exposure to potentially illegal content online. It works in
partnership with the police, Government, the public, Internet service providers
and the wider online industry
During
the detecting of the threats there is a communication between the police and
center of the system and make elaboration on how to solve the problem arise
The
information can be captured and direct to other source that will be changed or
modified and reach with wrong information.
For
the case of enemy of one country to other this security of captured of
information must be protected time after time in such away there is encryption
of data that will make hacker get a long time number of years to understand
Police
force of many developed country are used this technics to protect their country
with enemy by protect the networks information and use technology to see their
enemy what they planned on how to stopped before it reached.
CYBER
BULLYING
Cyber bulling is the use of information or
communication technology to harm or harass other people.
It can be done by use of internet service and mobile technologies
such as web pages and discussion groups as well as instant messaging or Short
message service (SMS) text messaging with the intention of harming another
person.
This
occur by posting rumors or gossips about the person in the internet and
bringing hatred in others mind to the extent of personally identifying victims
and publishing materials severely defaming and humiliating them
This will occur several times in communication and
facilitate the death threat between the individual and groups of people. The
most part involve on spreading of information is on social media where it
include large group of people.
By posting the rumors in the social media it enable
to spread over the great area by views pictures, videos and fake profile that
explains what it happens.
Source
of information can be from the neighbor person or enemy and intend to make
people being in attention that anytime the target person is attacked. It’s difficult
and impossible to trace the source.
Deleting
inappropriate or harassing messages, texts, and pictures is extremely difficult
after they have been posted or sent.
Cyber security
attempts to assure the protection of assets, which includes data, desktops,
servers, buildings, and most importantly, humans.
Cyber security
is the process of applying security measures to ensure confidentiality,
integrity, and availability of data.
The
goal of cyber security is to protect data both in transit and at rest.
COMPUTER SECURITY
Computer
security is applied in computing device such as computer, smartphones and
computer networks to secure the information being hacked, modified with
intrudes in manner of protection of health conflict that will remove peace
among the society.
Computer
security is most important now days due to the development of science and
technology to acquire we live peacefully.
Computer security can be attacked with crime
in different ways
- The computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information.
Most
of the hackers login in the server system and stolen the confidential
information for the use of their beneficial and others spread to the groups of
enemy of the targeted group.
The
stolen information concentrated with military information to know how they are
planned on them and for others.
- The computer as a target - attacking the computers of others (spreading viruses is an example).
Computer
millware and virus that will affect computer programs is discharged into the
internet where by the users of network will be affected after login in the
system.
- The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling).
The
other aspect on the protection of the computer crime on illegal gambling that
will affect manual on the attack personally and affect health even death
VULNERABILITY
Vulnerability
is a weakness which allows an attacker to reduce a system's information
assurance.
This
will comprise on loose of the owner of the personal information’s or group where
they can be accessed with anyone without authority and modifying data.
Vulnerability
is the intersection of three elements
System susceptibility or flaw
Attacker access to the flaw
Attacker capability to exploit the flaw.
To
exploit a vulnerability attacker must have at least one applicable tool or
technique that can connect to a system weakness. In this frame, vulnerability
is also known as the attack surface.
Several
factors must come together for a crime to occur:
- an individual or group must have the desire or motivation to participate in a banned or prohibited behavior;
- at least some of the participants must have the skills and tools needed to commit the crime; and,
- An opportunity must be acted upon.
No comments:
Post a Comment