Best Practices Against Cybercrime Essay

PAGES
4
WORDS
596
Cite

Cybercrime Prevention The fate of Target when it comes to cybercrime is fairly well known. They hit the headlines for all the wrong reasons when their customers' credit card information was exploited during a holiday season in recent years. Given that and given the ominous and ever-present threat of cybercrime, this brief report shall serve as a good guideline to help prevent cybercrime events and damages, or at least mitigate them. The lessons learned from Target's own breach are on full display in this report but there are other real-world lessons, events and principles that should also be considered and remembered.

Best Practices

Invest in Software & Hardware

• Do not go cheap or cut corners on hardware

• Do not go cheap or cut corners on software

• Make sure all software is fully functional and licensed

• Ensure uptime of all systems is as close to 100% as possible

• Use modern and state of the art hardware and software

• Avoid using wireless internet when at all possible

• NEVER use wireless internet to transmit credit card/sales information

• NEVER use WEP wireless encryption (has been hacked) -- only enterprise level WPA, WPA2 or something similar (Ou, 2007).

• Update software and hardware periodically so as to keep on the cutting edge.

• Do smaller incremental updates rather than huge...

...

jumps
• More like once every year or two rather than every five years or more

Invest in People

• Make sure to staff the information technology/security department as much as is needed to ensure security

• Do not run a skeleton crew at any time

• Make sure the people hired and staffed know what they are doing

• Degrees

• Certifications

• Proven prior experience

Adhere to Best Practices & Procedures

• Network should be monitored for cyberattacks and anomalous activity at all times

• Keep credit card and other sensitive information in the most secure part of the servers

• Only people with "right to know" should have ANY access to those servers

• All employees with network access should have PRECISELY the access they need

• Nothing beyond that

• Nothing short of it

• Must be able to do job but not access things that they don't need to meddle with or see

• Vendors access should also be controlled carefully (Winter, 2014)

• Access only to what they need to do their job

• Keep integrated in the system so that both vendors and Target have access

• Conduct periodic penetration testing to see how good the current security is (BSIMM, 2017)

• Keep up…

Sources Used in Documents:

References

BSIMM. (2017). Penetration Testing Types & Remediation. bsimm.com. Retrieved 5 June 2017, from https://www.bsimm.com/framework/deployment/penetration-testing/

Ou, G. (2007). TJX's failure to secure Wi-Fi could cost $1B | ZDNet. ZDNet. Retrieved 5 June 2017, from http://www.zdnet.com/article/tjxs-failure-to-secure-wi-fi-could-cost-1b/

Winter, M. (2014). Home Depot hackers used vendor log-on to steal data, e-mails. USA TODAY. Retrieved 5 June 2017, from https://www.usatoday.com/story/money/business/2014/11/06/home-depot-hackers-stolen-data/18613167/


Cite this Document:

"Best Practices Against Cybercrime" (2017, June 05) Retrieved May 8, 2024, from
https://www.paperdue.com/essay/best-practices-against-cybercrime-2165676

"Best Practices Against Cybercrime" 05 June 2017. Web.8 May. 2024. <
https://www.paperdue.com/essay/best-practices-against-cybercrime-2165676>

"Best Practices Against Cybercrime", 05 June 2017, Accessed.8 May. 2024,
https://www.paperdue.com/essay/best-practices-against-cybercrime-2165676

Related Documents

Cyber Crime Cybercrime has been a hot button topic in recent years. A crime involving digital services or computers, cybercrimes typically is when someone targets a computer for a crime, uses a computer as a tool for a crime, or has computer containing evidence of a crime. Since the rise of information technology, cybercrime has become taken center stage as a shift in criminal activity means more criminals doing business online

CYBER CRIME AND CORPORATE SECURITYAbstractIn the past, various businesses have lost huge sums of money to cybercriminals, while others have experienced severe service disruptions. This has been the case as cyber criminals execute schemes meant to advance certain agendas. For this reason, cybercrime is increasingly being seen as one of the most serious challenges that business enterprises (as well as government agencies) face today. Various surveys conducted in the past

Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Part of the problem is that America's national crime reporting systems, such as the National Incident-Based Crime Reporting System and the Uniform Crime Report Program managed by the Federal Bureau of Investigation (FBI) in cooperation with thousands of U.S. law enforcement agencies, do not specifically identify or distinguish between many forms of online crimes. Nor do they effectively distinguish between traditional in-person forms of crime that are substantially facilitated

Abstract Cybercrime, data breaches, and fraud represent evils that significantly threaten businesses. Companies have, in the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the