Page 30 - index
P. 30
or the entire underground could be so interested to make a breach and, in such a manner,
obtain an information from a security’s cycles. [1] We would believe that everyone can
understand the possibilities which could be opened to a malicious community once some of
professional security tools or applications get in hand of the bad guys.
Further, we would attempt to provide a closer overview of possible consequences of these
scenarios to a security’s community as well as the entire society. You would agree that these
sorts of breaches are not harmful to government’s organizations or federal agencies only, but
rather to the entire nations in terms of many socio-economical impacts or even losses to them.
How a computer breach could affect a security’s community
Computer breaches could be a great threat to a security’s community. As it’s getting obvious
from the previous segment of this article, those threats to a security’s community could include a
leakage of vitally important information as well as some software solutions used within security
staff or experts. A possible breach offers an opportunity to the bad guys to make a closer look at
the situation within a security’s cycles as well as a chance to try to disturb some security’s
activities.
You would agree with us that many organized crime or terrorist’s groups would certainly take
advantage of an opportunity to track some security’s businesses such as investigations,
operations or much more. [6, 7, 9] In our belief, this
should be treated as a great concern as well as a
possible issue to the entire society. Hopefully, it’s Those threats to a security’s
clear which sorts of impacts would make the fact community could include a leakage of
that some aspects of the security business could vitally important information as well
be exposed by some criminal or extremist’s as some software solutions used
organizations.
within security staff or experts.
In any case, we would strongly advise everyone
caring about its or general security to try to conduct
some sorts of periodic controls in terms of a digital forensic investigation management or,
simply, in sense of some kind of analysis of the condition of his organization’s computers and
networks. [2, 3].
We would also mention at this stage that crucially important could be the fact that many of
forensic tools are publically available for free on the web.
Which steps are recommended to be taken in such a case
The purpose of digital forensic is not only to find an evidence of some cyber breach as well as
estimate a seriousness of such an incident, but also to suggest some steps in terms of data
recovery and repair. [2, 5] As we indicated before, many of these forensic tools are available
free of charge through the internet, while some professional versions got priced.
We would also suggest that some of those tools could be downloaded from the web and tested
for the purposes of the future research and applications.
30 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide