Saturday, April 7, 2012

Is Anonymous Different From Cyber Crooks?

By Oliver David


With a lot of high-profile information breaches within the news and also the arrest of a number of hacktivists related to the group Anonymous, it is no surprise that there appears to become various views of cyber crime and hacktivism. Are they truly that various from 1 an additional?

A current report differentiated the 2 when reporting out on information breaches. The report noted that hacktivists had been accountable for the majority of individual information that was swiped from public and private networks. The number of information taken was a pc break-in for political gains, not for monetary acquire. The report noted that in prior years the breaches had been monetary in nature.

The report noted that, "Activist groups created their fair share of misery and mayhem last year...They stole more data than any other group. Their entrance onto the stage also served to change the landscape somewhat with regard to the motivations behind breaches. While good old-fashioned greed and avarice were still the prime movers, ideological dissent and schadenfreude took a more prominent role across the caseload."

The researched looked at nicely more than 800 breach incidents about the globe that involved more than 150 million records. They also received assist from law enforcement officials from the U.S. the Netherlands, Australia, the U.K. and Ireland. The researchers looked in the motivation and discovered that within the majority from the instances it was to advance a political trigger or to target organizations they had problem with for political factors. Not for monetary profit.

But numerous believe that the techniques and also the finish outcomes are truly exactly the same. Particularly for the targeted organization. The organization that lost or had information compromised is nonetheless has to right the scenario and make amends to their clients, patients or workers. Either way, these organizations ought to place a system of layered security technologies and policies into location. They should make workers use stronger passwords, use usb encyrption, and they've to educate the masses on the numerous techniques hacktivists and typical criminals use to infiltrate networks and acquire information.




About the Author:



0 comments:

Post a Comment