Page 60 - Cyber Defense eMagazine forJune 2021
P. 60

powerful net. One by one anyone can be compromised or caught with the endless world of criminalities,
            so far.

            From that perspective, it seems the most concerning thing to insider risk is to get an access to community
            as once implemented into some environment it can begin to develop its net of threats to everyone being
            inside or anyhow connected to that unit. That is primarily sensitive in case of the terrorist cells for a reason
            those groups are capable to approach the community members relying on propaganda, psychological
            operations and brainwashing programs that can be shared through the cyberspace or in the other means.
            The content being sent through such a matter is created to sound carelessly and benignly, but the actors
            hiding behind could be the real monsters. In other words, the point is to access some community leaving
            its members in belief nothing dangerous is happening and once the people get convinced there is no
            reason for fear they will put their weapon down giving the keys of their heart to someone being ready to
            break it into the pieces. The experience shows the common targets of those campaigns are the members
            of the general population and if the terrorists want to conquer the world they could attempt to rule over
            our minds using their carefully prepared psychological operations. The fact is the human mental system
            is the ultimate governor of the entire body, soul and psyche, so once attacked it can get in the hands of
            bad guys and in such a case the entire life path can be directed as those malicious actors wish. The body
            cannot live without mind and anyone knowing that will aim the center of everything. If the source of our
            strength is disabled the rest of our functioning will be conquered.


            As anyone will realize the main problem here is the access. The current situation in the world will suggest
            that everyone has become dependable on cyber technologies and that life habit is the greatest source of
            our weakness as such an innovation can be used in order to transfer the inadequate content to end users
            and literally feed them with so frightening products, so far.





            About The Author
            Milica D. Djekic is an Independent Researcher from Subotica, the
            Republic of Serbia. She received her engineering background from
            the Faculty of Mechanical Engineering, University of Belgrade. She
            writes for some domestic and overseas presses and she is also the
            author of the book “The Internet of Things: Concept, Applications
            and Security” being published in 2017 with the Lambert Academic
            Publishing. Milica  is  also  a  speaker  with  the  BrightTALK  expert’s
            channel. She is the member of an ASIS International since 2017 and
            contributor to the Australian Cyber Security Magazine since 2018.
            Milica's research efforts are recognized with Computer Emergency
            Response  Team  for  the  European  Union  (CERT-EU),  Censys
            Press, BU-CERT UK and EASA European Centre for Cybersecurity
            in  Aviation  (ECCSA).  Her  fields  of  interests  are  cyber  defense,
            technology and business. Milica is a person with disability.











            Cyber Defense eMagazine – June 2021 Edition                                                                                                                                                                                                60
            Copyright © 2021, Cyber Defense Magazine.  All rights reserved worldwide.
   55   56   57   58   59   60   61   62   63   64   65