Friday, November 21, 2014

5 years ago


Blog is intended for writing about topics or information security risk management, information technology, as is customary nowadays to call for information security, risk management days. Lofty themes of security: strategies and tactics, as well as the world's daily security worldwide.
This post will relate to two studies published shortly before Passover. Passover, a good time to refresh the mind, slavery procon was said, then thinking too. So what did we have? 1. Annual Report of Verizon titled: Verizon report procon on data breaches 2. criminology who study computer criminals. Criminologist Dr. Michael McGuire of the City University of London and his team present interesting data and "sohti sacred cows "in this regard. Is that so? The study was funded by BAE systems Detica titled: Organized Crime In the Digital Age report of Verizon says the language is not ambiguous: we forgot the first lesson. procon In other words, organizations forget Information protection is beginning to advanced security measures, but in a. So they say the vast majority (over 90%) of hundreds of hacking incidents investigated by them were caused by the negligence, lack of professional knowledge or simple mistakes and demanded a high level of professionalism burglars to break into corporate procon information technology systems. Bottom line, a relatively small investment would have prevented them. Criminologist's study presents a picture of organized crime in the physical and computing come together. Three elements building the current era of digital crime are: a. Who are working in it? The answer is close to 50% of cases, it is a person procon over the age of 35 and less than a third are aged less than 25. B. What abilities? Most of them do not have a deep professional knowledge in the field of information technology. C. It works. And how successful. What's going on? After telling us day and night this young guys hackers, procon information technology procon experts and here there is an image that is upside down. The reason is simple. Digital crime (computer) has become a production line of software tools are available for purchase procon through the Internet. Much of the crime is carried out based on economic models have been developed to serve the modern world of e-commerce and digital procon crime "rode the wave" procon and found its place in those methods, only for "some other" ... Why is it successful? That information technology components to available full exploitable failures (vulnerabilities), procon or alternatively, see the report of Verizon in the first part of the post ... In short, procon the information society and modern affluence procon should give herself accountable. The answer procon is the creation and enforcement processes combining technological knowledge in penetrating the world of digital crime proactively reduce not only the use of classical methods of defensive reactivity. On the other side, it is required that the information technology infrastructure to which production began in current use which will receive the necessary security inputs.
11 hours ago
RISKS Digest
Announcement: In memory of Donna Buenaventura
5 years ago
The register (UK) security NEWS around the world NEWSNOW (UK) ALL security NEWS around the world 7x24x365 The Kaspersky Lab Security News Service News from Infoworld Information Security IT Read now - News, information technology / security healthcareinfosecurity INFOSEC Island Microsoft Malware Protection Center Kable - Information procon security in the UK public procon sector The H - HOT security procon news Softpedia security news category Bank info security - The No1 Reference Tool for the Banking Information Security Community Finextra the independent newswire and information source for the worldwide financial technology community. procon US Government Information procon Security website DHS Daily Open Source Infrastructure Report
G 2014 (4) G September (1) G (June 1) Holocaust survivor (2) G 2013 (10) G (November 2) G (August 1) G (June 3) G Mai (3) G-February (1) 2012 (12) The December (1) G October (the first) G (July 2) April (3) The sinking of the Titanic - what is the connection ... Technological Risk Management Risk management includes risk management and information technology for Passover - what has changed management Water technology risk ... G March (2) Holocaust procon survivor (3) G in 2011 (18) The December (2) G (November 3) G (June 3) G Mai (1) G March (3) G-February (3 ) Holocaust survivor (3) G 2010 (1) February G (1) G 2009 (21) December G (2) G (July 3) G (June 1) G Mai (1) G April (7) G (March 4 ) G February (3)
Yair Rodiakov veteran in the IT world. Working in the field since 1978. IBM until 1993, and then for several years director of information security at the Ministry of Health. procon And now a private company information security consultancy. Lives and breathes security for many years. Hard to surprise me. Autodidact. Read a lot and connects the issues unexpectedly. View my complete profile
10October.03 2009: Conficker smites Oxford Brookes network - six million systems or more remain infected by the malware 09September.21 procon 2009: Addendum - Conficker C P2P Protocol and Implementation - Technical report by SRI 09September.03 2009: Ealing council lost 500,000 to computer virus 08August.24 2009: London hospital recovers from Conficker outbreak procon 07July.31 procon 2009: Black Hat - Conficker talk sanitized by the peaker to protect investigation 07July.01 2009: The true cost of beiing hit by Conficker - 1.5 MILION Pounds 05May.2

No comments:

Post a Comment