”The best defence is a good offence”. Rather than reacting to attacks once they’ve occurred, a wise strategy is to prepare proactive measures, so that if the time comes, you can completely bypass the attack or lessen the blow of it.
Cryptography is used as a secret method of writing. This is to ensure that only authorised parties can interpret the message. It is used in various industries, such as banking and health to protect the privacy and security of companies and customers’/patients’ information. Examples of encryption methods include:
- International Data Encryption Method (IDEA)
- Advanced Encryption Standard (AES)
- Data Encryption Standard (DES)
Digital Forensics by many, computer systems has become a tool for committing various crimes. Because of this, law enforcement officials have decided to use this tool to counteract the criminals’ use of computers to commit online and offline crimes. In essence, they have decided to “Fight fire with fire”.
In digital forensics, law enforcement collects and analyses the data in such a way that it can be used in court against the perpetrator.
Examples of cases where digital forensics was used:
- BTK Killer
Dennis Rader was convicted of a string of serial killings that occurred over sixteen years. Towards the end of this period, Rader sent letters to the police on a floppy disk. Metadata within the documents implicated an author named “Dennis” at “Christ Lutheran Church”; this evidence helped lead to Rader’s arrest.
- Joseph E. Duncan III
A spreadsheet recovered from Duncan’s computer contained evidence that showed him planning his crimes. Prosecutors used this to show premeditation and secure the death penalty.
* Sharon Lopatka: Hundreds of emails on Lopatka’s computer lead investigators to her killer, Robert Glass.
Intrusion detection is a vital asset to a computer system. Intrusion detection systems (IDSs) inform the administrator or a security information and event management system of unauthorised programs or people on the network. There is a variety of IDSs to choose from.
When looking to invest in an IDS, there are several questions to ask yourself.
- What does our business need in an IDS?
- Will our network support the IDS system?
- Can we afford an IDS?
- What do we do if something goes wrong with the IDS?
- As our business grows, we can still use this IDS?
- Some manufacturers of IDSs include:
- Dakota Alert, Inc.
- Juniper Networks
- Linear, LLC
- PureTech Systems, Inc.
The majority of computer hacking crimes are punishable under the Computer Fraud and Abuse Act (18 U.S.C. §1030). There may be additional penalties under state law. Under this act, there are penalties for committing the following offenses involving computer:
- Obtaining National Security Information
- Accessing a Computer and Obtaining Information
- Trespassing in a Government Computer
- Accessing a Computer to Defraud & Obtain Value
- Intentionally Damaging by Knowing Transmission
- Recklessly Damaging by Intentional Access
- Negligently Causing Damage & Loss by Intentional Access
- Trafficking in Passwords
- Extortion Involving Computers