DescriptionThe fast development of information and communication technologies, and widespread services provided by the cyberspace raise the inquiry, "In what capacity can security of the internet be guaranteed?".
In the technologically advanced world, finding the malicious and illegal data transfer and communication is creating a major issue. To prevent the risk of potentially disastrous cyber terrorist and cyber terrorist communication, nations’ policy makers are progressively considering on the utilization of discouragement procedures to enhance digital barrier.
Nations make their own national arrangements and methodologies which spread digital security countermeasures including digital barrier and discouragement against cyber attacks.
Terrorism and the Internet: Utilization of the Internet and the computer systems will correspond to a major challenge in the future. Such use could incorporate utilization of the nets as a purposeful publicity device, yet in addition as a methods for correspondence between terrorist organization and different associations.
Common types of cyber crimes:
- Unapproved access to computer frameworks and administration
- Harm to or modifications of computer information or programs
- Computer forgery
- Unofficial model of legally protected computer program
Five common attack methods:
- Application layer attacks
- IP spoofing
- Password attacks
- Network packet sniffers
- Denial-of-service attacks
Best Practices: Develop, deploy, review, and impose security policies that satisfy business objectives.
- Risk Management: Intermittently conduct an information security risk evaluation that identifies critical information resources.
- Access Control: Create a range of security controls to protect resources residing on systems and networks.
- Software Integrity: Regularly verify the reliability of installed software.
- Backups: Require a regular schedule of backups for both software and data.
- Monitor and Audit: Use appropriate monitoring, reviewing, and inspection facilities and assign responsibility for reporting, evaluating, and responding to system and network events and conditions.
- Physical Security: Control physical access to information resources and IT services and resources.
Co-authors to your solutionUday Karthik, Sreeja Rajput
Help to Improve This Idea.