Cyber Defense eMagazine July 2020 Edition
Cyber Defense eMagazine July Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine July Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
ut the case is if such a behavior is not restricted at its beginning it can cause the serious troubles the<br />
later on if that person does not quit with such habits. In other words, those individuals could continue<br />
playing “no one would see me” game and get the real concern to their surroundings. Any security<br />
professional would recognize it’s all about someone who would cope with the deep need to hide his<br />
identity and those habits could get adopted early in the childhood. So, in order to prevent the new<br />
generation of weird adults it’s needed to follow the progress of the children not only through schooling,<br />
but rather via the social activities. So, if the strict questions with the psychology’s interview are made and<br />
if anyone is reporting about such a strange behavior some measures of teaching should get applied.<br />
Practically, the next step in such a development could be that such individuals could figure out that the<br />
phone line with the changed voice is not that interesting toy any longer, so some kind of the transmission<br />
into the cyberspace could work better.<br />
The fact is the computer with the internet connectivity could provide us a plenty of opportunities to remain<br />
hidden behind some profile or account. In addition, there are the entire anonymity solutions being<br />
developed that can serve to stay anonymous and still in position to share your story or content with many.<br />
Indeed, these sorts of the systems could get used for the security purposes when needed to protect your<br />
identity and exchange some vitally important information. So, the phone with the tissue on is for the kids<br />
– the real hackers would rely on so sophisticated cyber infrastructure. From such a point of view, it’s only<br />
the business and many would do that for the money, but there are still so many unhealthy minds that<br />
would choose their victims in order to do bullying or provide the fake news to the communities. The main<br />
concern with the Darknet anonymity systems is that they would be the role-based ones and they would<br />
use the quite strong encryption, so if on the inaccessible spots there would be some difficulties to confirm<br />
the identity of the information sharer. We would say the places that are not easily approachable for a<br />
reason we would get in mind the terrorist groups that would take advantage over such well-developed<br />
systems and send the disinformation wherever they can. In other words, the innocent kid’s game could<br />
lead to the serious security concern, so from this perspective – the Pandora box would get opened as<br />
there would appear so many questions pointing the motives of the heavy cases to commit so harsh<br />
crimes.<br />
Even the kid can get how significant can be to appear as the trusted person and they can try to imitate<br />
the voice of the adult people in order to trick or confuse someone. The similar situation is with the Darknet<br />
asset as so many its users would recognize the power of the trusted account or at least convincing<br />
someone that they are the trusted persons. If anyone accepts that he is talking to the trusted individual<br />
he can give the information he normally would not and the bad guys could use such a campaign to collect<br />
the intelligence and figure out something they would never do. The timing and accurate information can<br />
mean the victory in the war, so it’s from the strategic significance to adopt the measures and techniques<br />
in order to prevent, observe and respond to such and similar cases in the practice.<br />
Who is from another Side of Cord?<br />
Doing some anonymity operations the bad guys would go through some experience believing something<br />
so important is happening on. Possibly they would develop those needs in the childhood and they would<br />
cope with the very vivid inner experiences that would motivate them to proceed with such an activity.<br />
Their motto could be that no one would even get who is on another side of the cord, so from their point<br />
of view it may appear as quite exciting and interesting doing so. The aim of the terrorism is to spread the<br />
fear and panics amongst the community members, so that’s why someone with the vivid imagination<br />
would make so horrifying stories that would get used to intimidate the quite broad population. Probably<br />
that special effect suggesting that – I know you, but you do not know me! – would deeply motivate the<br />
bad guys to believe they have some sort of the power over other people’s lives and security. It’s quite<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>July</strong> <strong>2020</strong> <strong>Edition</strong> 97<br />
Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.