Friday, 20 March 2015

CYBER POLICE



CYBER POLICE
Now days there is many of criminals that are caused of the development of technology in such away the security of the confidential information must be protected well
Cyber police is the situation where by police secures the information and finding fighting the cyber crime propaganda and monitoring and manipulating the public opinion in many countries.
Each country has the strategy and techniques of secure their country with attack of information in the computer networks.



Internet users have the procedures on implementation of preventive measures in order to reduce possible damage from security incidents and to help them in responding to security threats
At United Kingdom operating an Internet ‘Hotline’ for the public and IT professionals to report their exposure to potentially illegal content online. It works in partnership with the police, Government, the public, Internet service providers and the wider online industry
During the detecting of the threats there is a communication between the police and center of the system and make elaboration on how to solve the problem arise

The information can be captured and direct to other source that will be changed or modified and reach with wrong information.
For the case of enemy of one country to other this security of captured of information must be protected time after time in such away there is encryption of data that will make hacker get a long time number of years to understand
Police force of many developed country are used this technics to protect their country with enemy by protect the networks information and use technology to see their enemy what they planned on how to stopped before it reached.




CYBER BULLYING
Cyber bulling is the use of information or communication technology to harm or harass other people.
It can be done by use of internet service and mobile technologies such as web pages and discussion groups as well as instant messaging or Short message service (SMS) text messaging with the intention of harming another person.
This occur by posting rumors or gossips about the person in the internet and bringing hatred in others mind to the extent of personally identifying victims and publishing materials severely defaming and humiliating them

This will occur several times in communication and facilitate the death threat between the individual and groups of people. The most part involve on spreading of information is on social media where it include large group of people.
By posting the rumors in the social media it enable to spread over the great area by views pictures, videos and fake profile that explains what it happens.
Source of information can be from the neighbor person or enemy and intend to make people being in attention that anytime the target person is attacked. It’s difficult and impossible to trace the source.

Deleting inappropriate or harassing messages, texts, and pictures is extremely difficult after they have been posted or sent.
Cyber security attempts to assure the protection of assets, which includes data, desktops, servers, buildings, and most importantly, humans.
Cyber security is the process of applying security measures to ensure confidentiality, integrity, and availability of data.
The goal of cyber security is to protect data both in transit and at rest.

COMPUTER SECURITY
Computer security is applied in computing device such as computer, smartphones and computer networks to secure the information being hacked, modified with intrudes in manner of protection of health conflict that will remove peace among the society.
Computer security is most important now days due to the development of science and technology to acquire we live peacefully.


 Computer security can be attacked with crime in different ways

  •  The computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information.

Most of the hackers login in the server system and stolen the confidential information for the use of their beneficial and others spread to the groups of enemy of the targeted group.
The stolen information concentrated with military information to know how they are planned on them and for others.

  •     The computer as a target - attacking the computers of others (spreading viruses is an example).

Computer millware and virus that will affect computer programs is discharged into the internet where by the users of network will be affected after login in the system. 

  • The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling).

The other aspect on the protection of the computer crime on illegal gambling that will affect manual on the attack personally and affect health even death

VULNERABILITY
Vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
This will comprise on loose of the owner of the personal information’s or group where they can be accessed with anyone without authority and modifying data.
Vulnerability is the intersection of three elements
 System susceptibility or flaw
 Attacker access to the flaw
 Attacker capability to exploit the flaw. 

To exploit a vulnerability attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface.
Several factors must come together for a crime to occur:
  1. an individual or group must have the desire or motivation to participate in a banned or prohibited behavior;
  2. at least some of the participants must have the skills and tools needed to commit the crime; and,
  3. An opportunity must be acted upon.

No comments:

Post a Comment