{"id":3049,"date":"2014-12-29T09:21:30","date_gmt":"2014-12-29T15:21:30","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=3049"},"modified":"2015-04-24T16:20:25","modified_gmt":"2015-04-24T21:20:25","slug":"the-future-of-cyber-security-in-the-home","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/the-future-of-cyber-security-in-the-home\/","title":{"rendered":"The Future of Cyber Security in The Home"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-3076\" src=\"\/blog\/wp-content\/uploads\/2014\/12\/cyber-secutiry-in-the-home.jpg\" alt=\"Cyber-Secutiry in the Home\" width=\"300\" height=\"210\">The internet is an increasingly important part of our daily lives. When it was first evolving, security was less of a concern. With the growth of cyberspace have come new opportunities \u2013 and new threats to match.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Today\u2019s cybercriminals are highly motivated professionals, often well-funded by criminal organizations or nation-states. At a lower level are hackers, cyber-activists, scammers, and fraudsters \u2013 any of whom may target individuals or corporate bodies.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">As we put more of our lives online, cyber-security concerns will become ever more relevant if we wish to keep ourselves safe.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 14pt; color: #3366ff;\"><b>Present and Future Threats<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The internet is being used as a platform for committing crimes such as fraud and identity theft, as well as providing new opportunities for those who seek to exploit children and the vulnerable.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">There are crimes too that exist only in the digital world, particularly those which target the integrity of computer networks and online services.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Malware is malicious software or code that typically damages or disables, takes control of, or steals information from a computer system. Its effects can range from the annoying (adware, which pops up unwanted advertising) to the catastrophic (backdoors and botnets, which can take over your machine).<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">As mobile devices evolve, they will increasingly be used as a replacement for the computer, storing vast amounts of personal data that\u2019s largely unprotected. Mobile malware is evolving too, and is likely to become a major threat in the near future.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 14pt; color: #3366ff;\"><b>The Strange Case of Reuben Paul<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Reuben Paul is CEO of Prudent Games, a company which currently ships two apps: Cracker Proof, which teaches about strong passwords, and Crack Me If You Can, which is based on information security (infosec) and brute force attacks.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">On November 14 2014 at the Ground Zero Summit \u2013 Asia\u2019s foremost information security summit \u2013 Paul delivered the keynote speech. He has been invited to perform the same role at the HITB HaxPo Security Conference in the Netherlands in May 2015.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"http:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/cyber-security\/8-year-old-ceo-reuben-paul-proves-that-kids-are-the-future-of-cybersecurity\/\" target=\"_blank\" rel=\"nofollow\">Reuben Paul<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> has become something of an ambassador for Cybersecurity awareness.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Here\u2019s the strange thing: he\u2019s 8 years old.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Reuben first learned about information security from his father and stresses the need for parents to learn about cyber security so they can teach their kids about threats online.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">He also hopes that infosec will become part of the school curriculum, especially in helping kids avoid phishing scams. Reuben suggests lessons in building strong passwords for younger children. Older ones could go into more depth, learning how hackers work, about social engineering, and how to stay safe on social media.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 14pt; color: #3366ff;\"><b>The Case for Formal Education<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In the US, the Department of Homeland Security (DHS) through its National Initiative for Cybersecurity Education works with universities to nurture talent through competitive scholarship, fellowships, and internship schemes. The DHS has also partnered with publishing giant USA Today to provide lesson plans about the importance of prevention of cyber crimes at home and in the classroom.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In the UK, intelligence agency GCHQ has certified Master\u2019s Degree courses in Cyber Security at six universities: Edinburgh Napier University, Lancaster University, University of Oxford, Royal Holloway (University of London), Cranfield University, and the University of Surrey. More institutions may be certified in 2015.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">GCHQ has also launched a free tablet computer app called Cryptoy, which is designed to teach students about code-breaking. It can be downloaded from Google Play or the GCHQ website, and is hoped to nurture the next generation of cyber security experts.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 14pt; color: #3366ff;\"><b>Some Proposals For The Future<\/b><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In its vision for Cyber Security in 2015, the UK government\u2019s 2010 National Security Strategy proposes to help consumers respond to cyber threats by using social media to provide warnings about scams or other online perils.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Internet companies are being consulted to explore the potential for online sanctions for any offenses committed online.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Greater co-operation is being sought from Internet Service Providers (ISPs) to help individuals identify whether their computers have been compromised \u2013 and what they can do to resolve the situation and protect themselves from future attacks.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Commercial standards organizations are being consulted in an attempt to draw up a \u201ckitemark\u201d scheme for marketing security products. This should help customers to navigate the market and identify companies offering products with appropriate levels of protection.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 14pt; color: #3366ff;\"><b>What YOU Can Do NOW<\/b><\/span><\/h2>\n<h3 style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>Be informed. <\/b><\/span><\/h3>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The internet isn\u2019t just a cyberthreat portal, it\u2019s an educational resource. Search engines, blogs, and online forums can give security advice to help you decide how best to use cyberspace, informed you about the risks and the measures you can take to guard against them.<\/span><\/p>\n<h3 style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>Be cautious.<\/b><\/span><\/h3>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Be careful about putting personal or sensitive information on the internet. Be wary of email attachments or links from unrecognized senders. Be cautious about downloading files from websites you know little about.<\/span><\/p>\n<h3 style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>Be protected.<\/b><\/span><\/h3>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Update your software and operating systems regularly and run anti-malware programs to help prevent unauthorized access to your computer. And safeguard your passwords.<\/span><\/p>\n<h3 style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>Be vigilant.<\/b><\/span><\/h3>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Help identify threats in cyberspace (like fraudulent websites) and report them.<\/span><\/p>\n<h3 style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>Be safe.<\/b><\/span><\/h3>\n<p style=\"padding-left: 30px;\"><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.getsafeonline.org\/\" target=\"_blank\" rel=\"nofollow\">Get Safe Online<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> is a joint public\/private sector campaign to raise awareness of online security, aimed at the general public and small businesses. It\u2019s sponsored by the UK Government, Microsoft, HSBC, Cable and Wireless, Ofcom, Trend Micro, Gumtree, Verisign, Symantec and Paypal. The site includes advice on topics such as online shopping, social networking sites, data theft and identity fraud.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet is an increasingly important part of our daily lives. When it was first evolving, security was less of a concern. With the growth of cyberspace have come new opportunities \u2013 and new threats to match. Today\u2019s cybercriminals are highly motivated professionals, often well-funded by criminal organizations or nation-states. At a lower level are [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3078,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13,6,9,8],"tags":[],"class_list":["post-3049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security","category-tech","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=3049"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3049\/revisions"}],"predecessor-version":[{"id":3506,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/3049\/revisions\/3506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/3078"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=3049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=3049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=3049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}