1)The viruse which is the most dangerous threat.In DTI survey,72% of all the companies
received infected e-mails last year.the internet experienceed three worms in 12 day which causes
1.8bn damages,according to Symantec\'s internet Security Threat Report.
2)Social network attacks which are cyber security threat due to social networks like
facebook,twitter.We can access them by even phone.
While subscribing to these we provide some information regarding us like phone number to the
web thus the hackers can easily get our
information through internet.They use one Technic called \"Intelligence Information gathering\"
which is more advance than google.They can
see our posts also so try to avoid posting sensitive and personal information.
3)By gathering the Celebrity information the hackers sent
malware(.pif,.scr,.exe,.com,.vbs,.bat,.cmd or .hta have extenstion ) to their targets.
When the user run that program,hackers trigger a Throjan horse or Remote Administration
Tool(RAT) by this hackers can remotely acces users machine.
SSL protocal is used for internet banking.By using Man-in-middle software which employs the
ARP posioning technique to can sniff the password.
So be alert while using ATM,Credit card and check the statements carefully.
4)Insider threats or organised crime more than 50 percent cyber security threats are caused by
internal figures means computer crime may be carried
out by one person by hacking prepaid phone card system.That is \"Organised crime\"
china,Brazil,Russia cooperating with internal employees in criminal
model CaaS.
5)These internal attacks are most dangerous threat to data and systems.Rogue employees,who are
members of the IT team with knowledge of and access to
networks,data centers and admin accounts, can cause serious damage.
6)Misunderstanding GRC:So many managements dont\'t understand the concept of
GRC(Governance,Risk Management,Compliance) for IT governance,information
security governance and corporate governance.To deal with training in IT governance,corporate
governance,information security governance are best practice.
ITIL and CobiT helps to deal with this problem.
Solution
1)The viruse which is the most dangerous threat.In DTI survey,72% of all the companies
received infected e-mails last year.the internet experienceed three worms in 12 day which causes
1.8bn damages,according to Symantec\'s internet Security Threat Report.
2)Social network attacks which are cyber security threat due to social networks like
facebook,twitter.We can access them by even phone.
While subscribing to these we provide some information regarding us like phone number to the
web thus the hackers can easily get our
information through internet.They use one Technic called \"Intelligence Information gathering\"
which is more advance than google.They can
see our posts also so try to avoid posting sensitive and personal information.
3)By gathering the Celebrity information the hackers sent
malware(.pif,.scr,.exe,.com,.vbs,.bat,.cmd or .h.
A Critique of the Proposed National Education Policy Reform
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1. 1)The viruse which is the most dangerous threat.In DTI survey,72% of all the companies
received infected e-mails last year.the internet experienceed three worms in 12 day which causes
1.8bn damages,according to Symantec's internet Security Threat Report.
2)Social network attacks which are cyber security threat due to social networks like
facebook,twitter.We can access them by even phone.
While subscribing to these we provide some information regarding us like phone number to the
web thus the hackers can easily get our
information through internet.They use one Technic called "Intelligence Information gathering"
which is more advance than google.They can
see our posts also so try to avoid posting sensitive and personal information.
3)By gathering the Celebrity information the hackers sent
malware(.pif,.scr,.exe,.com,.vbs,.bat,.cmd or .hta have extenstion ) to their targets.
When the user run that program,hackers trigger a Throjan horse or Remote Administration
Tool(RAT) by this hackers can remotely acces users machine.
SSL protocal is used for internet banking.By using Man-in-middle software which employs the
ARP posioning technique to can sniff the password.
So be alert while using ATM,Credit card and check the statements carefully.
4)Insider threats or organised crime more than 50 percent cyber security threats are caused by
internal figures means computer crime may be carried
out by one person by hacking prepaid phone card system.That is "Organised crime"
china,Brazil,Russia cooperating with internal employees in criminal
model CaaS.
5)These internal attacks are most dangerous threat to data and systems.Rogue employees,who are
members of the IT team with knowledge of and access to
networks,data centers and admin accounts, can cause serious damage.
6)Misunderstanding GRC:So many managements dont't understand the concept of
GRC(Governance,Risk Management,Compliance) for IT governance,information
security governance and corporate governance.To deal with training in IT governance,corporate
governance,information security governance are best practice.
ITIL and CobiT helps to deal with this problem.
Solution
1)The viruse which is the most dangerous threat.In DTI survey,72% of all the companies
received infected e-mails last year.the internet experienceed three worms in 12 day which causes
2. 1.8bn damages,according to Symantec's internet Security Threat Report.
2)Social network attacks which are cyber security threat due to social networks like
facebook,twitter.We can access them by even phone.
While subscribing to these we provide some information regarding us like phone number to the
web thus the hackers can easily get our
information through internet.They use one Technic called "Intelligence Information gathering"
which is more advance than google.They can
see our posts also so try to avoid posting sensitive and personal information.
3)By gathering the Celebrity information the hackers sent
malware(.pif,.scr,.exe,.com,.vbs,.bat,.cmd or .hta have extenstion ) to their targets.
When the user run that program,hackers trigger a Throjan horse or Remote Administration
Tool(RAT) by this hackers can remotely acces users machine.
SSL protocal is used for internet banking.By using Man-in-middle software which employs the
ARP posioning technique to can sniff the password.
So be alert while using ATM,Credit card and check the statements carefully.
4)Insider threats or organised crime more than 50 percent cyber security threats are caused by
internal figures means computer crime may be carried
out by one person by hacking prepaid phone card system.That is "Organised crime"
china,Brazil,Russia cooperating with internal employees in criminal
model CaaS.
5)These internal attacks are most dangerous threat to data and systems.Rogue employees,who are
members of the IT team with knowledge of and access to
networks,data centers and admin accounts, can cause serious damage.
6)Misunderstanding GRC:So many managements dont't understand the concept of
GRC(Governance,Risk Management,Compliance) for IT governance,information
security governance and corporate governance.To deal with training in IT governance,corporate
governance,information security governance are best practice.
ITIL and CobiT helps to deal with this problem.