Number of Internet threats is growing year to year. To avoid the effects of cyber attacks used many different solutions. These include tools that not only allow them to quickly detect and react to them, but also – to provide that follow.
According to a report from McAfee in June 2014. Global losses due to cybercrime range between 400 and 575 billion dollars. Each year, the attacks made by the network demonstrate the weakness of systems – from the worst to the hardest-protected. Their victims are both single users as well as the world’s largest corporat ions and state governments.
– This shows that even the most advanced reactive protection is not sufficient – says Paul Regret, an expert in. Security Unizeto
and ethical hacker – For this reason, developing systems that operate proactively and in effect allow the prediction of planned cyber attacks. They are based on solutions of known forensic years.
How does a system that “predicts” threat?
Shortly after the tragic event increases the risk of a phishing attack. It can be anticipated that as a result, victims may be flooded with false messages of condolences, which may contain links to malicious pages and dangerous attachments. Proactive system can send a warning that in connection with an event of this caliber in a particular area may be a rash of messages containing specific keywords.
Analyst as a fairy, like glass cyberkula data
Here are three examples of mechanisms used to predict cyber attacks.
Predictive policing – is a mechanism used to analyze crime and environmental data and sociological research in order to identify threats before they will take place. It can be used to identify people and places, showing increased activity in the direction of a crime.
In order to counter cyber attacks, it is used to analyze Big Data that are collected during communication preceding them. A system using this technology is in use since 2010. The media was considered revolutionary.
Analysis of the network of organizations and businesses – an analysis of predictions in relation to the application may be compared to the collection of dots (data) and combining them. It aims to develop insights into the emerging potential threat.
Constant monitoring of activities allows to detect the preparations for cyber attack – the stage, without which there will be no cyberzamach. This method used only in development, intelligence agencies have and the private sector.
ACE – this mechanism is based on the collection of data from multiple external sources and the use of probability theory and the analysis of “Machine Learning”. This method is used by the intelligence services in support of the US government in anticipation of cyber attacks. Research on its effectiveness is still in progress.
Online Store prophesy future
Methods to predict future actions apply not only national governments but also corporations and private service providers. Internet giant e-commerce – Amazon.com – patented mechanism called. “Deliveries in advance.” It is based on an analysis of factors such as customer preferences, purchase history or previous query. The purpose of this mechanism is to forecast what customers will be interested in the future and deliver the goods to the store nearest them.
– Systems used to predict future activity are controversial.
On the one hand, can be used in good faith – for the purpose of data protection for citizens and secret information. However, it can not be excluded that on such mechanisms can also work cybercriminals to then use it as a weapon – emphasizes Paul Regret, security expert and ethical Unizeto hacker.
Unizeto
No comments:
Post a Comment