Mobile Security

Underlying vulnerabilities in mobile device software has also opened up the door to potential security breaches. In an article describing mobile application security flaws, (Westervelt, 2010) wrote that it was discovered that many mobile application security vulnerabilities were similar to those found in early web applications. ...

March 7, 2013 · 2 min · 391 words · icarnaghan

One audit standard fits all?

Computer applications are constantly evolving; while web based systems continue to grow in complexity. It is essential that these systems are properly secured both at the server level as well as at the code or application level, therefore Information Systems audit standards, more specifically focused on application and development measures provide some of the most useful valuable information at an organizations disposal. ...

March 6, 2013 · 2 min · 406 words · icarnaghan

Cultural Values and Moral Legitimacy

In a paper that discussed various cyber-crimes throughout the years carried out by juveniles, Radnofsky (2006) points us to the seriousness of these types of threats. The paper discusses the importance of changing cyber-culture through education and points to education through safety, security and ethics. ...

February 19, 2013 · 2 min · 384 words · icarnaghan

Cost and Challenges with E-Government

There is no doubt that E-Government provides conveniences today that many take for granted, however there is an underlying cost for these services. First of all, government sites are attractive targets for malicious activities, whether or not this involves deliberate disruption of service, or the stealing of sensitive information for profit. ...

February 18, 2013 · 3 min · 495 words · icarnaghan

Cybercrime: Law Enforcement and E-Government Transnational Issues

During his 2013 State of the Union address, President Obama highlighted the importance of defending our nation from the many cyber threats that are continuing to dominate the news cycles. Just days prior to the President’s speech, eighteen people were charged in a massive credit card fraud ring. The Associated Press (2013) described it as a “sprawling international scam that duped credit-rating agencies” by using stolen identities of individual victims to steal $200 million. ...

February 18, 2013 · 16 min · 3215 words · icarnaghan

Security Policies

Bosworth et al (2009) stress the importance of formality that should be adopted when creating an ethics policy. They emphasize that clear documentation, clear motivation, clear sanctions, and clear management support at every level, including the top, are all important pieces of an effective policy. ...

February 17, 2013 · 2 min · 321 words · icarnaghan

Risks, Threats and Vulnerabilities

According to SANS (2009) attacks against websites and web applications constitute more than 60% of total attacks observed on the internet. The risk of attack is generally based on the probability that a threat of some kind will exploit a vulnerability or weakness in a system or network. In recent years risks have been taken more seriously with many businesses that conduct online activities. ...

February 6, 2013 · 2 min · 398 words · icarnaghan

Cybercrime vs Traditional Crime

“Eighteen people were charged in what may be one of the nation’s largest credit card fraud rings, a sprawling international scam that duped credit-rating agencies and used thousands of fake identities to steal at least $200 million, federal authorities said Tuesday.” ...

February 5, 2013 · 3 min · 593 words · icarnaghan

Challenges Policy Makers face to Counter Cybercrime

Pfleeger (2005) reminds us that modern cyber-criminals can often be individuals that are difficult to detect. They “wear business suits, have university degrees, and appear to be pillars of their communities.” In addition to this, because of the wide spread accessibility to the internet and communications, it makes it easier for these criminals to operate in groups spread across the globe. ...

February 4, 2013 · 3 min · 586 words · icarnaghan

Cybersecurity as a Public Good

Over the last decade, the boom of the Internet has had a major impact on the way we interact with other individuals and business entities. Products and services have become available at the touch of a button and access to vast amounts of information has become available to anyone with a direct connection to the web. Much correspondence, which was traditionally mailed through the postal service now takes place online through e-mail communications. Management of bank and other financial services accounts can all be administered through online tools where the customer seldom needs to enter a physical branch location anymore. There are clearly many advantages to this new connected world and services that are still evolving at the current time will provide even more convenience to users over the next number of years. Unfortunately many of the conveniences of online services come at a price. As software systems have become more advanced so too have the criminals who seek to breach these systems to their own end. Computers have evolved to the point where the information stored now “contain wedding videos, scanned family photos, music libraries, movie collections, and financial and medical records.” (Vacca, 2009) Vast amounts of information is being stored online in newer cloud based services which is creating even larger targets for cybercriminals. Consumers have put their trust in many corporate organizations who handle their sensitive data to protect it adequately from those who would seek to steal or destroy it. ...

March 13, 2012 · 14 min · 2939 words · icarnaghan