Information Security

5 Mar

In this post I will stray slighty from the aspects of information discussed previously. Instead of talking about how companies use information and the consequences of this, today I will discuss the idea of information security, particularly with regard to threats and policies in Europe.att-security-guard-070607

The safety and security of information on the internet have been threatened in recent years with cyber-attacks becoming increasingly sophisticated.In an effort to address this issue, the European Network and Information Security Agency (ENISA) was set by the European Commission in 2004. The goal of this initiative is to coordinate efforts to prevent and respond more effectively to potentially more harmful security threats. ENISA aims to secure Europe’s information infrastructure, promote security standards, and educate the general public about security issues(Laudon & Laudon,2012).

Despite this, Estonia suffered a massive cyber attack in 2007. This attack affected the government, the banking system,media ,and other services causing millions of dollars in economic losses.This particular attack was carried out using a plethora of techniques from simple message flooding to the more complex distributed denial of service attacks. Furthermore, in 2009,the Conflicker worm infected an estimated 10 million computers worldwide. Consequently the French navy had to groung all military planes when it was discovered that its computer network was infected.

‘Anonymous’ is another example of an infamous hactivist group.In January 2011, the website of Ireland’s then main opposition party was hacked by the group who came to prominence for attacks on companies related to the Wikileaks controversy.Up to 2000 people’s personal details were compromised in the attack(McDonald,2011).anonymous

In 2010, the first pan-European Critical Information Infrastructure Protection (CIIP) exercise was instigated by ENISA.More recently the European commission launched the Digital Agenda for Europe. The objective of this program is to determine the fundamental role that information communciation technologies will play in 2020.It aims to creat a single, open European digital market with broadband speeds of 30Mbps available to all Europeans by 2020.This is paramount in ensuring the smooth and instantaneous flow of information in all environments.With regard to the ever-worrying issue of security, the initiative is considering the implemetation of measures to prevent cyber crime and respond effectively to cyber attacks using an efficient networok of Computer Emergency Response Teams(CERT)(Laudon & Laudon,2012).

Will these endeavours be enough in the fight against cyber crime??

Only time will tell..

Image links:

http://www.bing.com/images/search?q=security&view=detail&id=F6126FD5533E28CBE0634259CD56100A7374AAA1&FORM=IDFRIR

http://www.bing.com/images/search?q=anonymous+hack+fine+gael&view=detail&id=8A61F2AB2928BB6F0231C483DAE813D3882FFA43&first=1&FORM=IDFRIR

References:

Laudon & Laudon ,(2012) Management Information Systems, Managing the Digital Firm, 12th edition.

McDonald, H., 2011.‘Fine Gael website targeted by Anonymous hackers.Guardian UK [online]Available at:  http://www.guardian.co.uk/technology/2011/jan/10/fine-gael-website-anonymous-hackers

3 Responses to “Information Security”

  1. sad111353781 March 5, 2013 at 8:04 pm #

    great blog🙂 it was really interesting and very current

    • sad111408478 March 7, 2013 at 10:18 pm #

      Thanks very much. It’s nice to hear you enjoyed it:)

  2. sad111408872 March 10, 2013 at 9:08 pm #

    yeah excellent blog,interesting to hear about the increasing threat of cyber crime

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: