The History of Cyber Security

The term cyber crime is all the same as any other kind of crime – there is a culprit and also a victim. For the cyber crime to become successful, it needs the same component of other crime; the motive, the opportunity and the means. When one can view the brief history of cyber crime we could see that the elements for the motive, opportunity and means are few, thus computer crime is less prevalent. Indeed, profit is one of the reasons, but there are some reasons like revenge for cyber crimes like DDoS attacks as well as ego in creating malicious viruses.

However, as the accessibility and connectivity has increased, the means and the opportunity have also increased. Back then, only a few people know how to use computers and there is no reason in assaulting them; the companies during those times weren’t even connected online. Since the internet nowadays is almost everywhere, the means and the opportunity has greatly increased. Now, anyone can use a computer and there are many ways to use them like networking, online gaming, and banking and money transactions

When we look back, cyber criminals were almost always more sophisticated than those individuals who are trying to deter them. And even if companies have IT security, there are only few security professionals and ms information security graduates and much fewer security tools available against threats. Today the story is almost the same, criminals may have grown more dangerous and has many ways to accomplish their dark deeds, but for some reasons the threats they pose have been greatly reduced, compared to as before.

The vulnerability in cyberspace has been greatly reduced thanks to the increased numbers of security professionals and graduates of master’s degree in information security as well as many products and methods that can be used to mitigate threats. All of these can provide better security in the cyberspace for companies.

Another possible reason would be is that the laws against cyber crime have also changed; more cyber criminals are being brought to justice. Cyber crime is treated the same as any crime, any culprits caught are punished and are locked in behind bars. However, there are some skilled criminals who can escape justice from both worlds – the virtual and physical world.

Even if companies will muster all their resources just provide the best IT security by hiring security experts and employing the use of technologies and best methods; the threat of cyber crime is still present. If the criminals are barred in one way, they will still seek other ways of entry. In the past, cyber criminals grew tired of directly attacking hosts and networks, they shifted their attention into other ways like attacking the more vulnerable applications. If the application is blocked, then attackers would target the end users of those companies via phishing, XSS or other attacks targeting the clients. They become the most suitable target because they are unaware of IT security and on how to keep every transaction safe and secure.

Any financial institution with weak IT security will fall prey to cyber criminals in just a matter of seconds, but banks with advanced security will be much more difficult to confront. But that doesn’t stop criminals; they could easily trick the clients and steal their credentials and important information needed for banking transactions. Often times, attackers would send Emails masking as security mails asking to verify important data; once the clients make the mistake of supplying the information then his account will be compromised. Employees of companies can also fall victim to the same method. Emails, phone inquiries and other techniques are used just to get the necessary data that can be used to penetrate the systems of the company. We can simply put it this way; the surest way to go through security is have someone else’s login ID as well as password.

Sometimes, the most common reason why individuals fall prey to these vile criminals is their ignorance. Some of these individuals are still making use of computers with ancient operating systems which are more prone to cyber attacks. They didn’t know that computers are not like appliances and that they needed to be updated from time to time.

The ware against cyber crime is still not won. And each side is getting better and better as years go by. Many security experts and master’s degree information security graduates would agree with this statement, “It is much better to protect the individuals and company’s information network rather being the cause of their downfall.”

EC-Council University is a licensed university that offers degrees and master’s degrees on Security Science online. The degrees are recognized worldwide and may be used in any employment worldwide as well as the graduate certificates that they offer. With excellence and dedication as the core values, many professionals and degree holders have benefited from undergoing the programs in this university.

More information about master’s degrees in information security available at www.eccuni.us.

EC-Council organizes first Global CyberLympics in Malaysia

The world’s first ethical hacking championship ever organized in the country is supported by CyberSecurity Malaysia and its CEO, Lt Col (R) Prof Dato’ Husin Jazri, is also appointed as the Chairman of the Technical Advisory Board for the Asia Pacific Championships. The mission behind the Global CyberLympics (http://cyberlympics.org), is to foster better cooperation and communication on cyber-security issues among countries

Kuala Lumpur, Malaysia – CyberSecurity Malaysia, the national cyber security specialist center, an agency under the Ministry of Science, Technology and Innovation (MOSTI) Malaysia, is supporting the Global CyberLympics, a new initiative by the EC-Council to foster stronger international cooperation for information security issues and for improving cyber security training and awareness in developing nations and in third world countries.

Created by EC-Council, the Global CyberLympics is a series of ethical hacking games which are comprised of both offensive and defensive security challenges that will take place starting from September in six continents. Teams will vie for regional championships, followed by a global championship round to determine the world’s best cyber-security team. EC-Council is sponsoring over $400,000 worth of prizes at these CyberLympics.

“We support the mission of Global CyberLympics in fostering a greater sense of partnership and cooperation between countries on issues pertaining to cyber security” said Lt Col (R) Prof Dato’ Husin Bin Jazri, CEO of CyberSecurity Malaysia. “By sharing knowledge, training and resources, we can help to improve the level of cyber-security among individuals, organizations and companies around the world.”

“Our purpose with the Global CyberLympics initiative is to help establish true cyber security partnerships across borders,” said Jay Bavisi, Chairman of the Global CyberLympics Organizing Committee and president of EC-Council. “We are very proud and honored for this initiative to be supported by key players in the information security community, including CyberSecurity Malaysia, as well as some of the most reputable events such as GITEX, one of the third largest IT tradeshow globally, and Hacktivity, the largest IT security conference in central and eastern Europe.”

He adds: “We are also pleased that the CEO of CyberSecurity Malaysia has accepted the appointment as Chair of the Technical Advisory Board for the Asia Pacific Championships. This role will be instrumental in charting the technical directions of the Games for the Asia Pacific region.”

The EC-Council’s mission with the Global CyberLympics is to unify global cyber defense by means of the games, along with these following objectives:

– Capacity Building: Discovering new talents, methods and ideas; and to encourage development in the field of information security. Besides discovering gifted hackers and cyber-defenders, the Global CyberLympics will also inspire the development of the Information security professionals of the future.

– Raising Awareness: Educating the global community, especially in developing nations and third world countries on the issues of Information security and to encourage further development of the field. This will raise awareness towards increasing education and ethics in information security.

– Global Peace: Fostering friendship and creating cohesiveness between information security professionals, whether as individuals, representing a corporation or for a national agency, and encouraging frequent exchange of essential information, technology and skills.

The upcoming Asia Pacific Regional championships will be held at Hacker Halted Asia Pacific, hosted in Kuala Lumpur from Nov 15-17.

For media and partnership enquiries, please contact: Leonard Chin, Vice Chair, Global CyberLympics Organizing Committee: leonard [at] cyberlympics.org.

ABOUT EC-COUNCIL:

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in cyber security and e-commerce. It is the owner and developer of 20 security certifications, including Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and Certified Security Analyst /Licensed Penetration Tester (ECSA/LPT). EC-Council has trained over 90,000 security professionals and certified more than 45,000 members.

EC-Council’s certification programs are offered by over 450 training centers across 87 countries. These certifications are recognized worldwide and have received endorsements from various government agencies including the U.S. Department of Defense via DoD 8570.01-M, the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). EC-Council also operates EC-Council University and the global series of Hacker Halted information security conferences. The global organization is headquartered in Albuquerque, New Mexico. More information about EC-Council is available at www.eccouncil.org.

ABOUT CYBERSECURITY MALAYSIA:

CyberSecurity Malaysia is the national cyber security specialist centre. The Government has gazetted the role of CyberSecurity Malaysia as an agency under the Ministry of Science, Technology and Innovation (MOSTI) that provides ICT security specialist services and continuously monitors threats to national security.

Among the services by CyberSecurity Malaysia:

– Malaysia Computer Emergency Response Team (MyCERT)
– Digital Forensics
– Cyber999 Help Centre – Security Management & Best Practices
– Security Assurance
– Product Evaluation & Certification
– Professional Development (Training & Certification)
– Cyber Security Awareness For Everyone (CyberSAFE)
– Research Malaysia CyberSecurity Clinic

More information at www.cybersecurity.my.