Share this on:
 E-mail
8
VIEWS
0
COMMENTS
 
SHARES
About this iReport
  • Not vetted for CNN

  • Click to view Netsec123's profile
    Posted March 11, 2014 by
    Netsec123
    Location
    London, United Kingdom
    Assignment
    Assignment
    This iReport is part of an assignment:
    Tech talk

    Protecting Your Business From Vicious Hackers

     

    Last year's arrest of a 28 year old British man charged with hacking into US government systems including Nasa, the Army and the Pentagon's Missile Defence Agency - all in an alleged effort to steal confidential data - serves to highlight how no organisation, no matter how large or seemingly secure, can ever rest on their laurels when it comes to the issue of computer hacking.

     

    Lauri Love, from Suffolk, was arrested by officers from the National Crime Agency under the Computer Misuse Act, and has been accused, in a statement by US prosecutors, of being a “sophisticated and prolific computer hacker” who allegedly stole “massive quantities of confidential data” after breaking into the computer networks of government agencies, “resulting in millions of dollars in losses”.

     

    According to a detailed list of alleged attacks, Love and three unnamed accomplices from Sweden and Australia stole data on more than 5,000 individuals, some of whom were military servicemen and servicewomen, as well as information on government budgets and procurement processes, and on the “demolition and disposal of military facilities”. It is alleged that the group mounted so-called “injection attacks” on supposedly secure government databases, creating back-door routes into the agencies' systems that gave them repeat access to the wealth of information held within.

     

    Love and co. are accused of plotting their hacks in secure internet chat rooms, where they allegedly discussed attacking vulnerable computer networks “to disrupt the operations and infrastructure of the United States government”. Love is quoted as saying to his accomplices that "this stuff is really sensitive" and "it's basically every piece of information you'd need to do full identity theft".

     

    Scary stuff indeed! However, there are steps that businesses can take to protect against such threats. One of such is undertaking an 'EC-Computer Hacking Forensics Investigator' training course which will give them the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade are taught during this course, including software, hardware and specialized techniques.

     

    The EC-Computer Hacking Forensics Investigator' training course promises to give businesses and individuals the skill and knowledge needed to identify, track, and prosecute the cyber-criminals and to thoroughly prepare for the CHFI examination. It is aimed at Police and other law enforcement personnel, Defence and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, and IT managers.

     

    For more information, visit http://www.net-security-training.co.uk/course-information/course-list/ceh-training

    What do you think of this story?

    Select one of the options below. Your feedback will help tell CNN producers what to do with this iReport. If you'd like, you can explain your choice in the comments below.
    Be and editor! Choose an option below:
      Awesome! Put this on TV! Almost! Needs work. This submission violates iReport's community guidelines.

    Comments

    Log in to comment

    iReport welcomes a lively discussion, so comments on iReports are not pre-screened before they post. See the iReport community guidelines for details about content that is not welcome on iReport.

    Add your Story Add your Story