Page 137 - Cyber Defense eMagazine June 2020 Edition
P. 137

so many inexperienced staffs would not know that and they would pass through the real hell being so
            scared that no one would trust them or they could cope with some restrictions for not dealing with the
            enough evidence at that moment. So, in our opinion – such a situation could get prevented and the entire
            traumatic  impact  could  get  reduced  if  the  employees  would  know  how  to  handle  such  a  case.  For
            instance, it’s important to teach your staffs to respond so appropriately to that occurrence and it’s needed
            to suggest to everyone that there must exist the certain level of the trust amongst the team’s members.
            Well, if your heavy work has been destroyed in any sense while you were operating in the cyberspace,
            you are definitely the victim of the illegal activity and only that could be quite traumatic to your mental
            health state. In other words, it would seem that we are still on the search to the accurate responses to
            these occurrences, so at this stage, it’s crucial to understand that we need to protect our assets as well
            as people the best we can.

            Assumption #6. Cyber operations need skillful hackers.

            Explanation #6. Hacking is easy if you have someone’s IP address and the rest of the access details.
            There are so many professional tracking tools that could support you to track anyone’s accounts on.
            Simply the black market would get in possession of these effective applications and the bad guys would
            so massively exploit these gadgets. The reasons why the black market has become overwhelmed with
            such software is the never ending insider threat challenge. In other words, someone from the legal system
            would sell those products to the malicious actors not caring at all about the possible consequences to
            the community. Also, we would notice that there are a lot of email address hunting tools that could serve
            for discovering someone business account details and once you get someone’s email address you would
            not need his password as the professional security tool would give you the tracking permissions. In
            addition, if you are playing with someone’s email detail – it’s quite clear that you can easily conduct the
            phishing campaign that would offer you much more access information. So, once you get enough data
            to make a breach to someone’s device – you would be in position to expose the entire network and make
            some changes regarding those IT assets. The experience would show that the hackers are so skillful
            guys and they can do a lot in order to offer the access to any digital environment. Indeed, there are a
            plenty  of  the  social  engineering  techniques  that  could  get  applied  in  order  to  threaten  everything  –
            including the both – physical and virtual security. If anyone believes being the hacker is easy task, he is
            purely mistaken. The practice would suggest that those guys are outstandingly intelligent and quite quick
            in the cyberspace. Maybe someone would formulate the strategy on what is needed to get done in sense
            of either psychological or profit making operations and those cyber criminals would just find the way to
            accomplish such a requirement. So, as it is quite well-known there is the entire black market on the
            Darknet that would offer you a plenty of services beginning with the narcotics distribution, over contract
            murder, until the rent-a-hacker services. In other words, anyone getting the capacity to make the strategy
            could pay to the member of the cybercrime underworld to conduct some cyber operation that could cope
            with the wide spectrum of feasible applications and usages. Some studies would show that those hacker’s
            groups would function as the enterprises that would get capable to make the billions of dollars per an
            annum. In other words, if the terrorists or any transnational crime groups make a decision to attack
            anyone in order to do some sort of intimidation or cyber warfare – they would rent so skillful professional
            hackers that would so smoothly deliver those campaigns. Apparently, so many cyber terrorists would
            have the capabilities to provide the cyber operations in order to intimidate as many people as they can
            and in such a case – it’s clear that even those bad guys could deal with the exceptional hacking skills.






            Cyber Defense eMagazine –June 2020 Edition                                                                                                                                                                                                                         137
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   132   133   134   135   136   137   138   139   140   141   142