Das E-Mail-System droht durch das zunehmende Aufkommen von Spam, Phishing und Viren zu kollabieren. Phishing zielt auf die Gewinnung von fremden Passwörtern, PIN's und anderen sicherheitsrelevanten Daten ab und bedient sich immer ausgefeilterer Methoden. Inzwischen sind auch deutsche Kreditinstitute von diesen Phishing-Attacken betroffen und Kunden sind im Falle eines Falles für Schäden haftbar. Verschiedene Zusammenschlüsse von gefährdeten Unternehmen und Aktivitäten von auf die Phishing-Abwehr spezialisierten Unternehmen, versuchen, dieses Problem in den Griff zu bekommen.
The Federal Aviation Administration's (FAA) Next Generation upgrade proposes a fundamental transformation to thenational airspace system (NAS) that aims to reduce dependence on outdated radar infrastructure, increase airline safetyand condense required aircraft spatial separation. A key component of the upgrade is the Automatic DependentSurveillance-Broadcast (ADS-B) system. ADS-B provides continual broadcast of aircraft position, identity, velocityand other information over unencrypted data links to generate a precise air picture for air traffic management. Officialdocuments claim operational requirements necessitate unencrypted data links while maintaining that there is a lowlikelihood for malicious exploitation. This paper studies the security vulnerabilities associated with the ADS-Bimplementation plan and develops a taxonomy to classify attacks and examine potential impacts the attacks have onoverall NAS operations. The taxonomy helps provide a comprehensive understanding of the threats associated withADS-B implementation and facilitates risk analysis and risk management.
Na protyazhenii neskol'kikh poslednikh let shirokoe rasprostranenie v global'noy seti poluchili raspredelënnye setevye ataki. Vopros bor'by s atakami takogo tipa ostayetsya nereshyennym i po sey den'. Problema zaklyuchaetsya takzhe i v tom, chto zloumyshlenniki modifitsiruyut i uluchshayut strategii provedeniya ataki, a menyayushchiesya podkhody k predostavleniyu servisov v global'noy seti pozvolyayut nakhodit' novye napravleniya dlya takikh atak. Vopros o zashchite ot etikh atak — slozhnaya i ob"yemnaya zadacha i dlya eye resheniya trebuetsya opredelyennaya podgotovka, tsel'yu kotoroy budet izuchit' i sistematizirovat' imeyushcheyusya informatsiyu o setevykh atakakh, a takzhe predostavit' obosnovaniya sposobov analiza i strategiy povedeniya atakuemykh sistem. Iskhodya iz etogo, tsel'yu dannoy raboty bylo vybrano sozdanie sposoba analiza setevogo trafika dlya povysheniya zashchishchyennosti informatsionnykh sistem. Dlya dostizheniya postavlennoy tseli v rabote opredelyaetsya i reshaetsya ryad konkretnykh zadach. Rabota predstavlyaet interes dlya setevykh i sistemnykh administratorov servisov global'noy seti.
A Guide to National Security offers an analysis of the threats and policy responses facing the UK, presented within the framework of the Government's National Security Strategy and the Strategic Defence and Security Review. It explores the processes and developments which have shaped the transformation of national security over the last three decades, and critically examines the processes of politicisation and securitisation that have delivered the new strategic vision.
Presented in three parts, the book has taken one of the key recommendations from the National Security Strategy – collaboration between police and national security agencies – and used this as both the viewpoint from which to assess the current state of play regarding the UK's national security, as well as the approach to identifying future threats and creating policies and tactics to deal with them. Part One: Threats sets the scene for the current status of national security in the UK and relates this to the rest of the world, before moving on to the myriad of possible threats facing governments and intelligence services, from organised crime and terrorism to cyber-threats and failed states. Part Two: Responses looks at the interaction between governments and other agencies in response to a threat, how that framework functions and is organized, as well as the action or response taken. Finally, Part Three: Strategies offers a range of considerations for the future, including making a case for military restructuring, discussing domestic policies regarding radicalisation and other internal security issues, and the building of partnerships with the EU and the rest of the world, as well as within current international organizations, such as the UN and NATO. Throughout, the book presents opinions from leading figures across the agencies, including the National Security Council and members of ACPO, as well as case studies and suggestions for further investigation.
Continue reading “A Guide to National Security: Threats, Responses and Strategies”
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.