Home CyberSecurity Feature

The Future of Cyber Security in The Home

Cyber-Secutiry in the HomeThe internet is an increasingly important part of our daily lives. When it was first evolving, security was less of a concern. With the growth of cyberspace have come new opportunities – and new threats to match.

Today’s cybercriminals are highly motivated professionals, often well-funded by criminal organizations or nation-states. At a lower level are hackers, cyber-activists, scammers, and fraudsters – any of whom may target individuals or corporate bodies.

As we put more of our lives online, cyber-security concerns will become ever more relevant if we wish to keep ourselves safe.

Present and Future Threats

The internet is being used as a platform for committing crimes such as fraud and identity theft, as well as providing new opportunities for those who seek to exploit children and the vulnerable.

There are crimes too that exist only in the digital world, particularly those which target the integrity of computer networks and online services.

Malware is malicious software or code that typically damages or disables, takes control of, or steals information from a computer system. Its effects can range from the annoying (adware, which pops up unwanted advertising) to the catastrophic (backdoors and botnets, which can take over your machine).

As mobile devices evolve, they will increasingly be used as a replacement for the computer, storing vast amounts of personal data that’s largely unprotected. Mobile malware is evolving too, and is likely to become a major threat in the near future.

The Strange Case of Reuben Paul

Reuben Paul is CEO of Prudent Games, a company which currently ships two apps: Cracker Proof, which teaches about strong passwords, and Crack Me If You Can, which is based on information security (infosec) and brute force attacks.

On November 14 2014 at the Ground Zero Summit – Asia’s foremost information security summit – Paul delivered the keynote speech. He has been invited to perform the same role at the HITB HaxPo Security Conference in the Netherlands in May 2015.

Reuben Paul has become something of an ambassador for Cybersecurity awareness.

Here’s the strange thing: he’s 8 years old.

Reuben first learned about information security from his father and stresses the need for parents to learn about cyber security so they can teach their kids about threats online.

He also hopes that infosec will become part of the school curriculum, especially in helping kids avoid phishing scams. Reuben suggests lessons in building strong passwords for younger children. Older ones could go into more depth, learning how hackers work, about social engineering, and how to stay safe on social media.

The Case for Formal Education

In the US, the Department of Homeland Security (DHS) through its National Initiative for Cybersecurity Education works with universities to nurture talent through competitive scholarship, fellowships, and internship schemes. The DHS has also partnered with publishing giant USA Today to provide lesson plans about the importance of prevention of cyber crimes at home and in the classroom.

In the UK, intelligence agency GCHQ has certified Master’s Degree courses in Cyber Security at six universities: Edinburgh Napier University, Lancaster University, University of Oxford, Royal Holloway (University of London), Cranfield University, and the University of Surrey. More institutions may be certified in 2015.

GCHQ has also launched a free tablet computer app called Cryptoy, which is designed to teach students about code-breaking. It can be downloaded from Google Play or the GCHQ website, and is hoped to nurture the next generation of cyber security experts.

Some Proposals For The Future

In its vision for Cyber Security in 2015, the UK government’s 2010 National Security Strategy proposes to help consumers respond to cyber threats by using social media to provide warnings about scams or other online perils.

Internet companies are being consulted to explore the potential for online sanctions for any offenses committed online.

Greater co-operation is being sought from Internet Service Providers (ISPs) to help individuals identify whether their computers have been compromised – and what they can do to resolve the situation and protect themselves from future attacks.

Commercial standards organizations are being consulted in an attempt to draw up a “kitemark” scheme for marketing security products. This should help customers to navigate the market and identify companies offering products with appropriate levels of protection.

What YOU Can Do NOW

Be informed.

The internet isn’t just a cyberthreat portal, it’s an educational resource. Search engines, blogs, and online forums can give security advice to help you decide how best to use cyberspace, informed you about the risks and the measures you can take to guard against them.

Be cautious.

Be careful about putting personal or sensitive information on the internet. Be wary of email attachments or links from unrecognized senders. Be cautious about downloading files from websites you know little about.

Be protected.

Update your software and operating systems regularly and run anti-malware programs to help prevent unauthorized access to your computer. And safeguard your passwords.

Be vigilant.

Help identify threats in cyberspace (like fraudulent websites) and report them.

Be safe.

Get Safe Online is a joint public/private sector campaign to raise awareness of online security, aimed at the general public and small businesses. It’s sponsored by the UK Government, Microsoft, HSBC, Cable and Wireless, Ofcom, Trend Micro, Gumtree, Verisign, Symantec and Paypal. The site includes advice on topics such as online shopping, social networking sites, data theft and identity fraud.

William Thompson is the Marketing Manager at Power Admin, a server monitoring software business in the Kansas City area. You can find him on Google+ and Twitter. William has been a professional in website design, digital marketing and 3D/graphic design for over 20 years.


Posted

in

, , , ,

by

Tags: