Page 27 - Cyber Warnings
P. 27
The mobile technologies: In some cases, the threats would rely on mobile
technologies and use phone calls, text messages or web applications to exchange the
information. Anyway, they would leave a trace – so, this case got a good perspective to
get resolved so far.
The hacker’s support: So commonly, the insider’s threats would deal with the hacker’s
support. It’s well-known that hacker’s could steal the information from any computer so
secretly, but sometimes they would need the assistance of people being inside the
organization. This scenario would begin as a usual phishing campaign and some of the
employees would click on the suspicious link and make the entire network getting visible
to the hackers.
In the majority of cases, the computers within a network would not have the valuable
data, so some of the local criminals would track the potential target and make a contact
in order to recruit that person to serve as an insider’s threat. The today’s hacker’s tools
would get a remote administration option, so the insider’s threat would receive the
instructions directly on their screen – either as a chat message or as skillfully prepared
file. This sort of scenario would also deal with the trace, so we believe that the modern
authorities could cope with such a case.
The meetings in person: Sometimes it can happen that the insider’s threats would get
organized to meet in person with their criminal or terrorist contacts in order to talk to
them directly or provide them something being so valuable. This type of scenario could
also be discovered and proved for a reason the bad guys would carry on their cell
phones and leave some sort of the route that can be traced.
This article provides some of the typical cases being present in a modern criminology and
describes how those examples could get handled in a practice. We hope there would be more
research attempts that would try to investigate this topic deeper.
About The Author
Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and.
She writes for American and Asia-Pacific security magazines. She is a volunteer with the
American corner of Subotica as well as a lecturer with the local engineering society.
27 Cyber Warnings E-Magazine – March 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide