2021: hackers value quality over quantity

ITNOW ◽  
2021 ◽  
Vol 63 (4) ◽  
pp. 48-49
Author(s):  
Patrick O'Connor
Keyword(s):  

Abstract Reported intrusions are down, the amount of personal data exposed is down, so it’s all good, right? Well yes and no… Patrick O’Connor MBCS CISSP CEH explores the good and bad of events in cyber security in 2021.

Author(s):  
Kirils Dubinins ◽  
Kristīne Mārtinsone

Provision of remote services became relevant all over the world, during the 2020 COVID-19 pandemic. Latvian supervisors were also forced to transfer their practice to the digital space as well. COVID-19 pandemic challenges opened a wider range of opportunities for improvement remote practice. Pandemic also highlighted the risks associated with lack of relevant competences. At the global level over the last decade, risks associated with remote counselling summarized in guidelines, providing professionals with examples of best practice. In Latvia, on other hand, such guidelines have not adopted yet.This study developed with the aim to find out the awareness of Latvian supervisors about the risks (cyber security) of using information technology and the protection of personal data in the conditions created by the COVID-19 pandemic.To find out how Latvian supervisors are aware about the risks of using information technology (cyber security) and personal data protection, a survey conducted among Latvian supervisors and organizing an expert panel discussion, scientific strength of the study ensured by data triangulation.The obtained results allowed to conclude that the COVID-19 pandemic highlighted the need for supervision remote practice, at the same time the research data show that the awareness of Latvian supervisors about the risks of information technology use (cyber security) and personal data protection is medium to low.The results of the research show that in the education of Latvian supervisors it is necessary to allocate place for the acquisition of information technology (cyber security) risk and personal data protection regulation.This research emphasizes the importance of several supervisors’ competences such as digital knowledge and personal data protection, however further research is needed to find the most effective methods how to improve these competences.  


2021 ◽  

Cybersecurity is a central challenge for many companies. On the one hand, companies have to protect themselves against cyberattacks; on the other hand, they have special obligations towards third parties and the state in critical infrastructures or when dealing with personal data. These responsibilities converge with company management. This volume examines the duties and liability risks of management in connection with cyber security from the perspective of corporate, constitutional and labour law. The volume is based on a conference of the same name, which took place in cooperation with the Friedrich Naumann Stiftung für die Freiheit on 23 and 24 October 2020 at Bucerius Law School in Hamburg. With contributions by Andreas Beyer, Marc Bittner, Alexander Brüggemeier, Anabel Guntermann, Katrin Haußmann, Dennis-Kenji Kipker, Christoph Benedikt Müller, Isabella Risini, Darius Rostam, Sarah Schmidt-Versteyl and Gerald Spindler.


2022 ◽  
pp. 168-196
Author(s):  
Heru Susanto ◽  
Fahmi Ibrahim ◽  
Rodiah ◽  
Didi Rosiyadi ◽  
Desi Setiana ◽  
...  

Financial technology (FinTech) as part of financial inlcussion changes conventional business models to be information technology minded. The presence of FinTech in the wider community makes it easy for access to financial service products and transactions and payment systems more practically, efficiently, and economically. Unfortunately, as the security risk in transacting increases, cyber security in the financial services industry and FinTech service providers is considered a major target by cybercriminals. This study proposed a security management approach through hybrid blockchain method implemented through flask framework and encryption to protect transaction data. The results are promising. Referring to accuracy, this study successfully reduces data leakage and misuse of personal data and financial data in FinTechs.


2015 ◽  
Vol 14 (10) ◽  
pp. 6184-6189
Author(s):  
Himanshu Gupta ◽  
Kapil Chauhan

In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel try to secure their information by using highly encrypted passwords and authentication identities, but, the misuse and theft of these security measures are rising in lot of theft cases Taking advantage of security flaws in authentication identities ends up in cards being duplicated or counterfeited and hence misused. This increasing fight with cyber security has been the sole reason of  making  biometric security systems, the  important area of concern is that how do  one can implement the biometric security for increasing of data security.  First unique feature which is found different in every human is Fingerprints; Humans have used fingerprints for personal identification. Presently, most of the organisation use  fingerprint recognition for authentication process  it is one of the oldest and most commonly used biometrics, with high accuracy & generally easy and efficient and fast.  In this paper we propose the idea to use fingerprint recognition along with the user authentication password or to access the data or information. Since the only person who can access information is the person linked to it, no thief can gain access. It also makes your data, very hard for cyber criminals to hack into.


Author(s):  
M. Pleskach

The article is devoted to the issue on balancing the important interests of a person, a society and the state in cyber space by means of administrative law. The purpose of this article is to determine the legal nature and the role of the correspondence of the important interests of a person, a society and the state in cyber space in the context of administrative and legal provision of cyber security. The paper also deals with a proper balance between the law-enforcement interests of the state and the respect for fundamental human rights. The method of analysis has revealed in clarifying some features of concepts "interest", "need", "right". The method of synthesis has been used to define common concepts, for example "person's interest in cyberspace". Comparative legal method has been used in the process of comparison of the legislation of Ukraine and the international legislation that governs the issue on balancing the important interests of a person, a society and the state in cyber space. The author of this research presents the possible structure of person's cyber security through a set of important person's rights and interests in cyberspace, for example, the right to access to the Internet; the right to protect personal data in cyberspace; the right to be protected from aggressive marketing technologies in cyberspace, the prohibition of monitoring, including through cookies, HTTP, HTML5 markers or other technologies; the right to education, the right to access knowledge through the use of cyberspace etc. Conclusions and proposals of this research can be used for further research and for improving the administrative and information legislation of Ukraine, including the Law of Ukraine "On the Fundamental Principles of Cyber Security of Ukraine". Keywords: the balance of interests of the person, society and state, cyber space usage, public interest, private interest.


2021 ◽  
Vol 17 (2) ◽  
pp. 238-249
Author(s):  
Irhamni Ali

Indonesia is one of the countries that implement Institutional Repositories (IR) in their academic world. According to the National Library of Indonesia, there are more than 7890 academic IR in Indonesia. However, there is no research investigating the institutional repository's security aspect in the Indonesian academic institutional repository.  This paper will explore Indonesian academic IR's security by examining how to secure a connection between the network with encrypted communication to ensure that an intruder does not compromise the relationship between the server and the browser. This research's methodology is conducting experimental on the best institutional repository in Indonesia involving a private and public university. Some serious finding is that most Indonesian Academic Institutional Repositories have vulnerable security issues in their SSL and TLS and can cause a severe problem for their information asset's security in the future. The conclusion is that Indonesian academic institutions' security is not secure, and they need to consider this issue seriously. Create better security intervention for IR with the latest high-quality technology and policy to protect the information asset such as user, administrator, and visitor personal data and valuable digital objects in Indonesian academic IR.


2019 ◽  
pp. 1247-1263
Author(s):  
Witold Chmielarz ◽  
Oskar Szumski

Despite of the number of public advice campaigns, researchers have found that individuals still engage in risky cyber behaviour. The first part of this article is focused on the general approach to the cyber security and safety of personal data kept and processed by different entities from the perspective of students, while the second part is dedicated to the privacy aspects from the perspective of loyalty programs. Researchers have found that individuals are typically aware of online security and how to protect their privacy in the network, Nonetheless, individuals are still inclined to take risks because they are unrealistically optimistic and believe that negative events are less likely to happen to them. The survey also shows that even though respondents are aware that retailers collect, and process personal data and respondents feel that the amount of personal data of program members is far beyond the accepted level they still participate in such programs. Authors found also interesting patterns related to behaviour of respondents influenced by demographical data and the area of loyalty.


Author(s):  
Sue Milton

The proliferation of data exposure via social media implies privacy and security are a lost cause. Regulation counters this through personal data usage compliance. Organizations must also keep non-personal data safe from competitors, criminals, and nation states. The chapter introduces leaders to the two data governance fundamentals: data privacy and data security. The chapter argues that data security cannot be achieved until data privacy issues have been addressed. Simply put, data privacy is fundamental to any data usage policy and data security to the data access policy. The fundamentals are then discussed more broadly, covering data and information management, cyber security, governance, and innovations in IT service provisioning. The chapter clarifies the complementary fundamentals and how they reduce data abuse. The link between privacy and security also demystifies the high resource costs in implementing and maintaining security practices and explains why leaders must provide strong IT leadership to ensure IT investment is defined and implemented wisely.


In the era of social media and the Internet, there has been an exponential increase in threats related to the privacy of user accounts and data. The confidentiality of personal data is compromised for various motives. This sudden increase in security threats has led to widespread problems. Our research is focused on analyzing the extent of cyber-attacks in various countries across the globe. We have proposed a novel approach for analyzing the tweets related to cyber-attacks and its surrounding fields. The analysis proves that Asian countries face more cyber security issues as compared to European countries. Further, it is also analyzed that developing countries like India are more prone to these issues as compare to developed countries like the United States or the United Kingdom.


Sign in / Sign up

Export Citation Format

Share Document