Monday, June 25, 2012

The sure "bulletproof" against Cybercrime...really?

Forgive me if laughing is a crime 'cos it seem to me that to these spotlight fans, there is no such thing as sure bulletproof. By the way, for the purpose of this blog I like to refer to cyber terrorism, crime and war perpetrators as spotlight fans, ok?



Last week we talked about “Paunch” taking the spotlight from anonymous. Though they are both brothers in cyber-crimes but there is a sharp contrast in their modus operandi. These folks always device new ways of running the show, but right now a framework for countermeasures have already been outlined to stop these spotlight fans.

Ken Presti of http://www.crn.com/ on June 20th 2012 wrote an article that had the caption New Studies Outline Framework for Cyber-Threat Countermeasures.

While the caption was eye-catchy I could not help but laugh. I laughed because there have been theories from countless number of security geeks to curb the venom from these spotlight fans but none seem to beat their tactics. There always seem to be one form of breach or another that scaled or by-passed security parameters put in place in an organization’s infrastructure or network.

Now, back to the business of the day, sorry, i had to go in circles to get here. Ken says, as complex attacks become common place businesses and government need to take comprehensive and methodical approach to keep their data, infrastructure and other resources safe. Old wives tales…right? This advice he says came in the wake of Stuxnet and Flame worms. The advice I am about to enumerate comes from Information Security Forum and would carry its members through 2014.

Sure bulletproof against these spotlight fans is, knowing the following; Skill set now extends beyond technical capability and focus is now on people skills and business knowledge, I.T. is now beyond technical component but is now a business discussion and protection of infrastructure now a very important objective.

Finally, the framework for the countermeasure is that organizations should adopt a four-phased approach that begins with an evaluation of the organization’s business model, ascertaining the full range and relative severity of the threat landscape, assessing the relative value of your data and infrastructure with an eye towards what you can and can’t do without, and, finally, developing responses to the various risks and implementing those responses.

I hope this "bulletproof" and framework for countermeasures against spotlight fans will help you and your organization or business to stay safe. Until next week when I set my eyes on you, don’t forget to let me know what you think.

Au revoir! (Goodbye)

No comments:

Post a Comment