Age of Cyber Crime and Culture of Security
Science Journal of Business and Management
Volume 3, Issue 1-1, February 2015, Pages: 39-45
Received: Nov. 30, 2014; Accepted: Dec. 8, 2014; Published: Dec. 30, 2014
Views 2647      Downloads 183
Author
András Keszthelyi, Keleti Faculty of Business and Management, Óbuda University, Budapest, Hungary
Article Tools
Follow on us
Abstract
Entering into the “Information Age” brought us some new challenges. One of them is cyber crime and cyber warfare shooting upwards: instead of formal law which became a dead letter, nowadays club law dominates on the Network. How can enterprises and people manage their own security? I have been collecting several news of security incidents for fifteen years. Analysing this systematic collection some characteristic attributes of the new era can be identified: traditional definitions and concepts related to security do not work anymore. Both of technology and formal knowledge are necessary but not enough to survive. Organisations as well as individuals must (or have to) develop their own culture of security.
Keywords
Cyber Crime, Cyber Warfare, IT Security, Culture of Security
To cite this article
András Keszthelyi, Age of Cyber Crime and Culture of Security, Science Journal of Business and Management. Special Issue: The Role of Knowledge and Management’s Tasks in the Companies. Vol. 3, No. 1-1, 2015, pp. 39-45. doi: 10.11648/j.sjbm.s.2015030101.17
References
[1]
Bencsáth, B. et al. (2011), Duqu: A Stuxnet-like malware found in the wild. http://www.crysys.hu/publications/files/bencsathPBF11duqu.pdf, Oct. 2011.
[2]
Calin, B. (2009), Statistics from 10,000 leaked Hotmail passwords, Acunetix Web Application Security, http://www.acunetix.com/blog/news/statistics-from-10000-leaked-hotmail-passwords/
[3]
Carrol W. (2008), The New Cyber General, http://defensetech.org/2008/01/02/the-new-cyber-general/
[4]
Checkoway et al. (2011), Comprehensive Experimental Analyse of Automative Attack Surfaces, USENIX Security, http://www.autosec.org/pubs/cars-usenixsec2011.pdf
[5]
Consumer Password Worst Practices by The Imperva Application Defense Center (ADC), (2010), http://www.imperva.com/docs/wp_consumer_ pass word_worst_practices.pdf
[6]
Dilanian, K. (2014), NSA Director: Yes, China Can Shut Down Our Power Grids. Business Insider, 20.11.2014. http://www.businessinsider.com/nsa-director-yes-china-can-shut-down-our-power-grids-2014-11
[7]
Ducklin, P. (2013), Anatomy of a password disaster - Adobe's giant-sized cryptographic blunder, Naked Security - Award-winning computer security, news, opinion, advice and research from SOPHOS, 4.11.2013. https://nakedsecurity.sophos.com/2013/11/04/anatomy-of-a-password-disaster-adobes-giant-sized-cryptographic-blunder/
[8]
Epstein K. (2008), Network Security Breaches Plague NASA, in: Bloomberg Businessweek Magazine, 19. Nov. 2008. http://www.businessweek.com/stories/2008-11-19/network-security-breaches-plague-nasa, downloaded from Google cache, Feb. 2014.
[9]
F-Secure (2012), Threat Report H1 2012, https://www.f-secure.com/static/doc/labs_global/Research/Threat_Report_H1_2012.pdf
[10]
Gartzke U. (2007), Outrage in Berlin Over Chinese Cyber Attacks, in: The Weekly Standard, 31/8/2007. http://www.weeklystandard.com/weblogs/TWSFP/2007/08/outrage_in_berlin_over_chinese.asp
[11]
GData (2012), IT security trends in 2013: cyber war not on the horizon. http://sa.gdatasoftware.com/jp/security-labs/news/news-details/article/3029-it-security-trends-in-2013-cy.html, Dec. 2012
[12]
Google (2010), A new approach to China, Google Official Blog, http://googleblog.blogspot.hu/2010/01/new-approach-to-china.html
[13]
Greenwald, G. (2014), No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Henry Holt and Company, New York. ISBN 978-1-62779-073-4.
[14]
Hopkins, N. (2012), China suspected of Facebook attack on Nato's supreme allied commander, in: The Guardian Online, http://www.theguardian.com/world/2012/mar/11/china-spies-facebook-attack-nato
[15]
Joywang (2012), The 2007 Estonian Cyberattacks: New Frontiers in International Conflict, On Cyber War – Freshman Seminar 43z – Internet Law, http://blogs.law.harvard.edu/cyberwar43z, downloaded 12/22/2012.
[16]
Katz, Y (2010), 'Stuxnet virus set back Iran’s nuclear program by 2 years'. The Jerusalem Post, 15.12.2010. http://www.jpost.com/Iranian-Threat/News/Stuxnet-virus-set-back-Irans-nuclear-program-by-2-years
[17]
King, R. (2012), Virus Aimed at Iran Infected Chevron Network, The Wall Street Journal, 9.11.2012. http://online.wsj.com/articles/SB10001424127887324894104578107223667421796
[18]
Kirk J. (2013), Gh0stRAT malware attacks continue, researcher says. In: Computerworld, http://www.computerworld.com/s/article/9238640/Gh0stRAT_malware_attacks_continue_researcher_says?taxonomyId=17
[19]
Kiss, G. (2011), A Comparison of Informatics Skills by schooltypes in the 9-10th grades in Hungary, in: International Journal of Advanced Research in Computer Science, Volume 2, No. 2, pp. 279-284.
[20]
Kiss, G. (2012a), Measuring Computer Science Knowledge Level of Hungarian Students specialized in Informatics with Romanian Students attending a Science Course or a Mathematics-Informatics Course, in: TOJET: The Turkish Online Journal of Education Technology, Volume 11, Issue 4, pp. 222-235. Oct. 2012.
[21]
Kiss, G. (2012b), Measuring Hungarian and Slovakian Students’ IT Skills and Programming Knowledge, in: Acta Polytechnica Hungarica, Volume 9., No. 6, 2012, ISSN: 1785-8860, pp. 195-210.
[22]
Koscher et al. (2010), Experimental Security Analysis of a Modern Automobile, in: IEEE Symposium on Security and Privacy, Oakland, CA, http://www.autosec.org/pubs/cars-oakland2010.pdf
[23]
Krebs (2011), DHS Blasts Reports of Illinois Water Station Hack. http://krebsonsecurity.com/2011/11/dhs-blasts-reports-of-illinois-water-station-hack/
[24]
Lazányi, K. (2014). A biztonsági kultúra [The Culture of Security], VIKEK, Szeged, in print.
[25]
Leyden J. (2011), Dubai assassins used email trojan to track Hamas victim – Mossad kill squad tried poison before hotel lock-hack, In: The Register, http://www.theregister.co.uk/2011/01/05/mossad_dubai_assassination/
[26]
Lindsay, J. (2013), Stuxnet and the Limits of Cyber Warfare, Security Studies, 22:3, 365-404, DOI: 10.1080/09636412.2013.816122, http://dx.doi.org/10.1080/09636412.2013.816122
[27]
Leppard, D., 2012. Chinese steal jet secrets from BAE, in: The Sunday Times, http://www.thesundaytimes.co.uk/sto/news/uk_news/National/article991581.ece
[28]
Melloy, J. (2012), Mysterious Algorithm Was 4% of Trading Activity Last Week, CNBC, http://www.cnbc.com/id/49333454
[29]
Mesquita, R. (2010), Frenchman convicted for hacking Obama, http://www. boston. com/business/technology/articles/2010/06/25/frenchman_ convic ted_ for_hacking_twitter/, 25 June 2010.
[30]
Messmer, E. (2007), U.S. cyber counterattack: Bomb 'em one way or the other, in: NetworkWorld, IDG, http://www.networkworld.com/news/2007/020807-rsa-cyber-attacks.html?page=2
[31]
Michaels, J. (2013), Pentagon expands cyber-attack capabilities, in: USA Today http://www.usatoday.com/story/news/nation/2013/04/21/pentagon-expanding-offensive-cyber-capabilities/2085135/
[32]
Nakashima, E. (2014), NSA warns China could take out US power grid. http://www.afr.com/p/world/nsa_warns_china_could_take_out_us_ARMzNK4ApawIv34yHwGy4M 21.11.2014.
[33]
Nilsson, A. (2012), Statistics of "450.000 leaked Yahoo accounts", http://pastebin.com/2D6bHGTa, 13 July 2012.
[34]
Sanger, D., Shanker, T. (2014), N.S.A. Devises Radio Pathway Into Computers. The New York Times, 14.1.2014. http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?_r=0
[35]
Schneier, B. (2005), Sony's DRM Rootkit: The Real Story, Schneier on Security blog, https://www.schneier.com/blog/archives/2005/11/sonys_drm_rootk.html
[36]
Schmidt A. (2013). The Estonian Cyberattacks, in: Healey J. (ed.), The fierce domain – conflicts in cyberspace 1986-2012, Atlantic Council, Washington, D.C., 2013. Online: http://netdefences.com/wp-content/uploads/SchmidtA-2013-Estonian-Cyberattacks.pdf
[37]
Schmitt M. N. (ed.) (2013), Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge University Press
[38]
Storm, D. (2012), Pacemaker hacker says worm could possibly 'commit mass murder', in: ComputerWorld, http://blogs.computerworld.com/cybercrime-and-hacking/21163/pacemaker-hacker-says-worm-could-possibly-commit-mass-murder
[39]
Tóth-Laufer, E., Takács, M., Rudas, I. (2013), Interactions Handling Between the Input Factors in Risk Level Calculation. In: Szakál, A. (ed.) Proceedings of the IEEE 11th International Symposium on Applied Machine Intelligence and Informatics (SAMI 2013). pp. 71-76. (ISBN:978-1-4673-5928-3)
[40]
Websense (2011), It's no longer a question of 'if' but 'when'!, Websense Inc., http://click.websense-email.com/?ju=fe2d157274640675721079&ls=fdf01078716c077d7713737d&m=fefc1177756502&l=fec117787c66057a&s=fe2111757c620c78761170&jb=ffcf14&t=
[41]
Weitzenkorn, B. (2012), Bank of France's Accidental Hacker Acquitted, http://www.technewsdaily.com/8140-accidental-hacker-bank-france.html, 21 Sep. 2012.
[42]
Whitney M. (2006), The Pentagon’s War on the Internet, http://www.informationclearinghouse.info/article11901.htm
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186