Featured Post

10 መሠረታዊ የኮምፒውተሮቻችንን ደህንነት መጠበቂያ መንገዶች 10 Basic Ways to Secure Your Computer

Image
  10 መሠረታዊ የኮምፒውተሮቻችንን ደህንነት መጠበቂያ መንገዶች 10 Basic Ways to Secure Your Computer 1. ሁላችንም የጥቃት ዒላማ ውስጥ መሆናችንን መረዳት መቼም ቢሆን “የሳይበር ጥቃት እኔን አያጋጥመኝም" ብሎ አለማሰብ፡፡ ሁላችንም በግል እና በምናደርጋቸው የገንዘብ ዝውውሮች እንቅስቃሴያችን ወይም በነበረን መልካም ስም ላይ ተፅዕኖ የሚፈጥር አደጋ ሊያጋጥመን ይችላል፡፡ የሳይበር ደህንነትን ማረጋገጥ የሁሉም ሰው ኃላፊነት ነው፡፡ ስለዚህ ሁልጊዜም ተገቢውን ጥንቃቄ ማድረግ ያስፈልጋል፡፡ 2. ለሶፍትዌሮች ወቅታዊ ዝመና ያድርጉ የኦፕሬቲንግ ሲስተሞቻችን /Operating System/ እና ፕሮግራሞቻችን የዘመኑ ሶፍትዌሮችን መጫን መሠረታዊ ነገር ነው፡፡ ሁልጊዜም የቅርብ ምርት የሆኑ የደህንነት ዝመናዎችን ማድረግ ጠቃሚ ነው፡፡ በተጨማሪም፡- • የመሣሪያዎትን ኦፕሬቲንግ ሲስተም ቀጥተኛ ዝመና /Automatic Update/ ላይ ያድረጉ፣ • ቀጥተኛ የደህንነት ዝመና በየጊዜው የሚያቀርቡ እንደ ክሮም ወይም ፋየር ፎክስ /Chrome or Firefox/ ያሉ የድረ-ገጽ ማፈላለጊያዎችን መጠቀም ይመከራል፣ • እንደ ፍላሽ፣ ሀርድ ዲስክ እና የመሳሰሉ ተንቀሳቃሽ መሣሪያዎችን ሲጠቀሙ ሁልጊዜም ወቅታዊ ዝመና የተደረገላቸው መሆናቸውን ማረጋገጥ ያስፈልጋል፡፡ 3. የፌሺንግ ጥቃት ሙከራዎችን ያስወግዱ የፊሺንግ ጥቃት የተለያዩ የማህበራዊ ምህንድስና መንገዶችን በመጠቀም የሚፈፀም ቋሚ ስጋት ሲሆን የሳይበር ወንጀሎች እንደ የይለፍ ቃል ባንክ መረጃዎች እና ክሬዲት ካርድ ያሉ ግላዊ መረጃዎችን የሚያጭበረብሩበት ነው፡፡ • የፊሺንግ ጥቃት ብዙውን ጊዜ በኢ-ሜይል አድራሻ፣ ከዚህ በተጨማሪም በስልክ፣ በመልዕክት መለዋወጫ ወይም በማህበራዊ ሚዲያ አማራጮች የሚፈጸ...

Researchers Call for a Shared Dark Web Taxonomy


A dark web intelligence company has called for an industry-wide, standardized framework for evaluating and describing goods and services for sale on underground forums, after complaining that most research is inconsistent and misleading.
Terbium Labs analyzed 22 reports from 18 different sources dating back to 2013 to better understand how security vendors and researchers approach the topic of dark web pricing for stolen accounts and identity information.
Its report, The Truth About Dark Web Pricing, argued that, despite the best intentions of those releasing these reports, they are saddled with inconsistencies in data collection, definitions and sampling methodologies. Researchers often cherry pick details, thus failing to present a balanced and accurate view of the industry as a whole, and are unable to provide insight into longer-term trends, it added.
“For example, one report classified payment cards with BINs (Bank Identification Numbers) as a separate category from payment cards, although all payment cards have BINs. Other reports classified cloneable payment cards and payment cards with track data separately, though they are essentially the same,” the study noted.
“Even reports from the same research group used slightly different categories from year to year; one series of reports grouped cards from the same geographic area in different categories depending on the year the report was published.”
This only adds to the fear, uncertainty and doubt permeating the cybersecurity industry and creates greater opacity where insight and clarity is desperately needed, argued Terbium Labs.
The answer is to build a shared taxonomy for describing dark web goods and services, ideally involving a price index which could measure price changes in a standardized way, according to the firm’s chief research officer, Munish Walther-Puri.
“An industry standard such as this one cannot be set by one organization; a true standard requires that we synthesize across sectors. We are proposing first to recognize the shared problem that we all face and then create an environment where a standard can emerge,” he told Infosecurity.
Models from adjacent areas could help in drawing up such a standard, he claimed.
“These include the development and adoption of STIX TAXII for threat intelligence, ATM terminal and fraud definitions set by the European Association for Secure Transactions, and even the scoring of corruption: the Corruption Perception Index from Transparency International,” Walther-Puri explained.
“The latter case, incidentally, is a similar challenge: what once was considered strictly qualitative, and limited discussion of the influence and impact of corruption soon became measurable and comparable over time.”

Comments

Popular posts from this blog

WHO IS FULL-STACK DEVELOPER & WHY MANY PROGRAMMERS FAIL?

10 መሠረታዊ የኮምፒውተሮቻችንን ደህንነት መጠበቂያ መንገዶች 10 Basic Ways to Secure Your Computer

Top 5 Ways To Protect You From Hackers Online 2020 Tips