Cyber Crime and Cyber Terrorism


ORGANIZATIONAL ASPECTS NOT LEARNED FROM PREVIOUS



Download 5,67 Mb.
Pdf ko'rish
bet28/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   24   25   26   27   28   29   30   31   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

ORGANIZATIONAL ASPECTS NOT LEARNED FROM PREVIOUS 
ICT INNOVATION CYCLES
When we take a look at the end-user side, early adopters of ICT innovations mainly 
focus on effectiveness increases, “cool” applications, and ease of use. Therefore, 
manufacturers are rewarded by early adopters for being first on the market with their 
cool new functionality, for not bringing months later a secured, well tested, and less 
easy to use innovation empowered by the use of ICT.


24
CHAPTER 3
New and emerging threats of cyber crime and terrorism
During the mainstream phase of an ICT innovation cycle, the whole chain (from 
manufacturer, sales force, and acquisition process at the end-user, system integrator, 
installer, third-party maintenance organization, and the daily operations by the end-
user) largely fails to take cyber security into account. The whole process is focused 
on providing functionality, not on a secure operational environment. It starts with the 
manufacturer’s installation guide which discusses electromagnetic compatibility on 
the first pages, then where to connect the power cord and network plug. Security, if 
at all, is loosely documented after page 60. It even may be surprising that standard 
manufacturer passwords sometimes have been modified. Where ICT is almost hid-
den as part of easier to functionality, people are “unconsciously insecure.” An exten-
sive discussion on this phenomenon and some detailed examples of avoidable cyber 
security failures can be found in 
Luiijf (2013)
.
EMERGING THREATS
From the above, it will be clear that any next ICT innovation cycle will result in new 
threats to end-users and our society. The bright new ICT inventors focus on the new 
functionality, increased efficiency and effectiveness of people and organizations, and 
ease of use. They lack any historic understanding of previous secure design failures 
and of earlier lessons identified in good coding practices.
This means that emerging threats can be predicted in new fields of ICT, especially 
where ICT is deeply embedded in functional systems. Often the threats are old threats 
disguised in a new look. These will allow cybercriminals, hacktivists, cyber spies, and 
states to enter ICT-based systems in an unauthorized way by making use of:
• Weaknesses in the validation of input values and protocol elements causing 
unexpected inputs to be used as a can opener.
• Buffer overflows allowing elevation of access rights to system manager (root) level.
• Man in the middle attacks to near field and wireless communication channels.
• The addition of self-configuring hardware modules to an existing system or 
network providing a backdoor.
• Publically known manufacturer and other default passwords.
• Unconfigured functionality which provides a backdoor.
• Unconsciously insecure managed ICT, often embedded in functions where 
people do not understand that it contains ICT under the “hood.”
The above forms a basis to understand the large number of next innovation areas 
where ICT is embedded and which may provide or already provides such security 
threats and new attack routes. We can distinguish mass products and essential parts 
of critical sectors:
 1.
Modern living: Increasingly, digital TVs are connected to public networks 
and the internet. The many millions of digital TVs with sets of fast video 
processing engines are an attractive source of processing power for cyber 
criminals, e.g., to make them part of botnets. The digital TV soon will become 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   24   25   26   27   28   29   30   31   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish