- Posted March 11, 2014 by
London, United Kingdom
This iReport is part of an assignment:
Protecting Your Business From Vicious Hackers
Last year's arrest of a 28 year old British man charged with hacking into US government systems including Nasa, the Army and the Pentagon's Missile Defence Agency - all in an alleged effort to steal confidential data - serves to highlight how no organisation, no matter how large or seemingly secure, can ever rest on their laurels when it comes to the issue of computer hacking.
Lauri Love, from Suffolk, was arrested by officers from the National Crime Agency under the Computer Misuse Act, and has been accused, in a statement by US prosecutors, of being a “sophisticated and prolific computer hacker” who allegedly stole “massive quantities of confidential data” after breaking into the computer networks of government agencies, “resulting in millions of dollars in losses”.
According to a detailed list of alleged attacks, Love and three unnamed accomplices from Sweden and Australia stole data on more than 5,000 individuals, some of whom were military servicemen and servicewomen, as well as information on government budgets and procurement processes, and on the “demolition and disposal of military facilities”. It is alleged that the group mounted so-called “injection attacks” on supposedly secure government databases, creating back-door routes into the agencies' systems that gave them repeat access to the wealth of information held within.
Love and co. are accused of plotting their hacks in secure internet chat rooms, where they allegedly discussed attacking vulnerable computer networks “to disrupt the operations and infrastructure of the United States government”. Love is quoted as saying to his accomplices that "this stuff is really sensitive" and "it's basically every piece of information you'd need to do full identity theft".
Scary stuff indeed! However, there are steps that businesses can take to protect against such threats. One of such is undertaking an 'EC-Computer Hacking Forensics Investigator' training course which will give them the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade are taught during this course, including software, hardware and specialized techniques.
The EC-Computer Hacking Forensics Investigator' training course promises to give businesses and individuals the skill and knowledge needed to identify, track, and prosecute the cyber-criminals and to thoroughly prepare for the CHFI examination. It is aimed at Police and other law enforcement personnel, Defence and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, and IT managers.
For more information, visit http://www.net-security-training.co.uk/course-information/course-list/ceh-training