01.07.2020 Views

Cyber Defense eMagazine July 2020 Edition

Cyber Defense eMagazine July Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine July Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ut the case is if such a behavior is not restricted at its beginning it can cause the serious troubles the<br />

later on if that person does not quit with such habits. In other words, those individuals could continue<br />

playing “no one would see me” game and get the real concern to their surroundings. Any security<br />

professional would recognize it’s all about someone who would cope with the deep need to hide his<br />

identity and those habits could get adopted early in the childhood. So, in order to prevent the new<br />

generation of weird adults it’s needed to follow the progress of the children not only through schooling,<br />

but rather via the social activities. So, if the strict questions with the psychology’s interview are made and<br />

if anyone is reporting about such a strange behavior some measures of teaching should get applied.<br />

Practically, the next step in such a development could be that such individuals could figure out that the<br />

phone line with the changed voice is not that interesting toy any longer, so some kind of the transmission<br />

into the cyberspace could work better.<br />

The fact is the computer with the internet connectivity could provide us a plenty of opportunities to remain<br />

hidden behind some profile or account. In addition, there are the entire anonymity solutions being<br />

developed that can serve to stay anonymous and still in position to share your story or content with many.<br />

Indeed, these sorts of the systems could get used for the security purposes when needed to protect your<br />

identity and exchange some vitally important information. So, the phone with the tissue on is for the kids<br />

– the real hackers would rely on so sophisticated cyber infrastructure. From such a point of view, it’s only<br />

the business and many would do that for the money, but there are still so many unhealthy minds that<br />

would choose their victims in order to do bullying or provide the fake news to the communities. The main<br />

concern with the Darknet anonymity systems is that they would be the role-based ones and they would<br />

use the quite strong encryption, so if on the inaccessible spots there would be some difficulties to confirm<br />

the identity of the information sharer. We would say the places that are not easily approachable for a<br />

reason we would get in mind the terrorist groups that would take advantage over such well-developed<br />

systems and send the disinformation wherever they can. In other words, the innocent kid’s game could<br />

lead to the serious security concern, so from this perspective – the Pandora box would get opened as<br />

there would appear so many questions pointing the motives of the heavy cases to commit so harsh<br />

crimes.<br />

Even the kid can get how significant can be to appear as the trusted person and they can try to imitate<br />

the voice of the adult people in order to trick or confuse someone. The similar situation is with the Darknet<br />

asset as so many its users would recognize the power of the trusted account or at least convincing<br />

someone that they are the trusted persons. If anyone accepts that he is talking to the trusted individual<br />

he can give the information he normally would not and the bad guys could use such a campaign to collect<br />

the intelligence and figure out something they would never do. The timing and accurate information can<br />

mean the victory in the war, so it’s from the strategic significance to adopt the measures and techniques<br />

in order to prevent, observe and respond to such and similar cases in the practice.<br />

Who is from another Side of Cord?<br />

Doing some anonymity operations the bad guys would go through some experience believing something<br />

so important is happening on. Possibly they would develop those needs in the childhood and they would<br />

cope with the very vivid inner experiences that would motivate them to proceed with such an activity.<br />

Their motto could be that no one would even get who is on another side of the cord, so from their point<br />

of view it may appear as quite exciting and interesting doing so. The aim of the terrorism is to spread the<br />

fear and panics amongst the community members, so that’s why someone with the vivid imagination<br />

would make so horrifying stories that would get used to intimidate the quite broad population. Probably<br />

that special effect suggesting that – I know you, but you do not know me! – would deeply motivate the<br />

bad guys to believe they have some sort of the power over other people’s lives and security. It’s quite<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>July</strong> <strong>2020</strong> <strong>Edition</strong> 97<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!