Page 29 - index
P. 29
Cyber breaches – the risks, impacts and investigative
procedures
By Milica Djekic
Cyber breaches are getting a great concern in a today’s world. So often you would be aware
about many reports, studies and analysis claiming that some sort of computer breach has
occurred within a particular field of human’s society. What we plan to present here is a quite
comprehensive insight to the issues of such a sort of cyber threats which might happen within a
security environment as well. Hopefully, it would appear as understandable to everyone how big
and severe those effects could be to the entire security’s community. Through this article, we
would discuss the risks which could lead to such a sort of cyber occurrence as well as provide a
better look at potential impacts of such an event in terms of a confidential information leakage
and loss and propose some standard investigative procedures which should be applied.
Which sorts of risks could lead to a cyber breach
We are witnessing the time when many government, federal or other strategically important
systems are getting hacked and breached. [4, 8] Today’s media is so often reporting that even
security’s community is frequently under attack. Right here, we would discuss which kinds of
risks could lead to such an incident as well as analyze what the consequences of those
occurrences could be to a human’s society.
Hopefully, it’s getting clear that the main reasons for such a breach to happen would certainly
be reflected through some sorts of confidential information leakage. The central issue here
would be that the bad guys are getting so easily or easier than ever before login or access
details even to security community’s computers and networks.
As it was discussed previously,
one of the ways to track a security
community’s networks is through
their e-mail accounts. Also, what’s
so risky here is the fact that
malicious actors could get without
many difficulties an access to
some cloud-based technologies
which could be used for some
sorts of an investigation, operation
or surveillance management. All of
these is possible through carefully
organized and coordinated
hacker’s attacks which goal is to
gather as much as possible
information about its targeted
organization or country.
In other words, criminals, terrorists
29 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide