Friday, April 30, 2010

Public Key Infrastructure

Rcently, the Internet has been spread all over the world and it has used to be an infrastructure of e-commerce. However, there are several security problems on networks.The Public Key Infrastructure or PKI was initially developed in 1977 ,and it is powerful and widely use technology and can be considered as a good solution to the Internet security problems,however Most consumers didn't realized it, even when using it .
What is PKI?
IT is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates which shows identity of each domain.In other word PKI respective user identities by means of a certificate authority (CA).The primary role of the CA is to publish the key bound to a given user. In fact CA is an entity that issues digital certificates for use by other parties .





Wednesday, April 28, 2010

Digital Property Right

In this post I want to write a Little bite a bout digital property right which is very important for online business. Much like reale properly right ,digital property supported by three basic mechanisms.Patent law is concentrate on producing or reproducing a new digital inventions and support inventors right .Copyright addresses the right to publish or duplicate expressions of ideas .Trademark is concerned with word or images used to identify products in the market. However the boundaries between them have been modified by legislation an courts. For better understanding of digital property right
Advertising rights. In the physical world, a property owner can earn revenue by selling advertising space on billboards, marquees, kiosks, signposts, even wall space. Likewise, the Internet is ripe with opportunities for enterprising individuals and businesses to target potential clients through advertising on websites, message boards, 3-D virtual environments, and other online real estate space.
Mining rights. Similar to a landowner in the physical world offering the rights to minerals and other natural resources that exist on a parcel of land, online real estate frequently contains underlying resources that can make it extraordinarily valuable. In the context of online property, these resources exist in the form of data. Data can be mined from online property in a number of ways that can be beneficial to business interests, academic researchers, the medical community, and many other professional fields.
Application rights. A property owner in the physical world can make arrangements with businesses to operate valuable equipment on a piece of real property. Software applications in the digital world can be thought of like physical equipment. The rights to operate applications in an online space can add value to the online property and create significant business opportunities for the applications’ owners.


Utility rights. Utilities associated with real property are the “tools” that make the property useful and productive – electricity, water lines, and telecommunications lines among them. The digital world has its utilities as well. Discreet software functions, such as file converters, calculators, voice over Internet protocol (VoIP), and defragmentation programs, among others, form a digital “tool belt” that can help make online real estate space more valuable and productive. The opportunity to supply digital utilities to online property spaces represents real revenue potential for software developers.
Service rights. The need for third-party contractors to offer services to support business ventures exists in the digital world just as it does in the physical world. Many online real estate spaces will benefit from access to services like data backup, printing and publishing, and network administration. Providing these services in the online environment represents an excellent revenue stream that is ready to be tapped by entrepreneurs in the digital world.


Commerce rights. The exchange of good and services for money are the basics of commerce in both the physical world and the digital world. In online real estate spaces, enterprising business owners will have the ability to earn profits by placing such things as pay-per-view content (including audio, video, graphics and text files) and vending portals within easy access of visitors to those online environments.
“Flow” rights. Landowners in the physical world also hold certain rights to those things that flow through their real property – natural resources such as water, petroleum, and natural gas. The digital world sees similar “flows” of resources from one online space to another. These resources include data, information, user traffic, and monetary funds. The ability to monitor or even control or regulate these flows of digital resources can be valuable to properly-equipped businesses, and many online real estate owners will be eager to work with those who can offer the tools to tap into these flows.
References:
http://digitalpropertyregistry.org/DigitalRightsDefined.html

A Cyberlaw Case: Man who Erases Facebook Data After Threat of Suit

Pete Warden, a British immigrant and entrepreneurial software engineer who blogs under “PeteSearch,” ostensibly destroyed his database showing regional patterns among 210 million Facebook users when the social networking site accused him of misusing the site according to its terms of use and threatened him with a lawsuit.


According to the man’s blog, Pete Warden of Boulder, Colorado, said he had planned to give the data to social science researchers. Facebook maintained that Warden gathered the data in contravention to its terms of use. In response, Warden says he has now destroyed the data, heading off a potential lawsuit he reportedly wasn’t entirely convinced was legal.




After I read this case two things comes in mind , the first point is mainly related to social network and information security, this guy wasn't the first person who collected information from Facebook and other social networks and definitely couldn't be the last one ,so there is always potential risk that people misuse such information that they collected illegally from social networks.Thus social networks users have to be aware of such potential threat and don't share important information on these networks.


Second point is related to Cybele issues ,I believed that this case must trial based on Cyberlaw ,because he violated Term of use of the Facebook as a user ,whether or not this guy didn't have any wrong intention from collecting that information.
Reference:
Man who erases Face book data....,http//www.exmainer,com






Tuesday, April 27, 2010

Online transaction,has it more benefits or chalanges?

Online transactions widely adopted by customers which enable them to benefit from online purchasing .While this trends become more popular and so many business build or change their business plan based on Internet and online transactions,both business and customer face some critical challenges in this way. There is no doubt that online transactions have important benefits for both parties ,however the identity theft or credit card fraud can be considered as main obstacle for developing online transactions.
According to survey By Tim Wilson Dark and Reading More Than 40 Percent Of U.K. Users Say They Have Been Fraud Victims. Based on the survey about 44 percent of respondent said they had suffered from bank or credit card fraud and average amount of stolen was $3000 per person.
Now what do you think about online transactions ? Do you prefer traditional or online transaction ? please make your answers or comments about these questions.
Reference:
Wilson T,Reading D.(April ,2010)More Than 40 Percent Of U.K. Users Say They Have Been Fraud Victims,http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=224600470

Monday, April 26, 2010

Footbal and cybercrime

Yes this in my topic in this post ;Football and cybercrime ,maybe you think that there is no relationship between them,but I tell you there is. These days Internet application increases ,and many Internet users doing their works via the Internet from buying books from the Amazon or buying ticket for a football mach .Now you see the relationship,as online ticketing for football match become more popular , it's create another area of cyber crime ,especially for the important event such as FIFA world cup 2010 that so many football fans want to catch tickets of their national team matches . According to Walter Tapfumanei, communication officer, Africa Agency for ICT Development.

"The problem is that so many people are competing for tickets to the World Cup. In the process, many of them are getting swindled through phishing and fake online promotions for tickets to the event."

In 2009 South Africa was at number 50 on the list of countries where most attacks took place and has jumped 7 places to number 43 in 2010 which is mainly due to FIFA world cup effects. This is not the end of story ,I 'm sure that it will become more popular in the future that many football fans loose their money in this way.So,it is important for both issuers and buyers of online tickets to be aware of fraud activities on the Internet.


Reference:


Online bookings spur cybercrime in South Africa,http://news.idg.no/cw/art.cfm?id=F8BA8D87-1A64-6A71-CEF65DDE92D103F4

Saturday, April 24, 2010

Zeos ,The Most Prevalant Financial Malware

Zeos also knows as Zbot infects PCs, waits for the user to log onto a list of targeted banks and financial institutions, and then steals their credentials which are sent to a remote server in real time. It can modify genuine web page from bank's server to ask for personal information such as payment card number and PIN.

Ironically .Most antivirus was unable to detect zeos , based on study conducted in US and UK in 2009. The new version of Zeos (known as Zeos 2) targeted Internet explorer and FireFox browsers and use complicated methods to avoid antivirus detection.

Zeos which affected PCs for the first in 2006,it is still considered as one of the dangerous Pisces of malware on the Internet.

Wednesday, April 21, 2010

What is zombie computer ?

A zombie computer refers to a computer that connect to the Internet and is controlled by unauthorized third party without permission and awareness of computer's user. Hacker can use zombie computer in many ways, for example Zombies can be used to conduct distributed denial of service attacks or to send spam email.

Furthermore hackers have full access to data on a zombie computer ,and they can copy ,corrupt change or even delete entire of hard copy .Also they can install a software on a zombie computer which help them to get the user name, password , and even financial information such as credit card number and bank account.Hacker can use this information to commit fraud.

Tuesday, April 20, 2010

Online Banking Fraud

As Online Banking became more popular and the Banks perused their customers to do that ,the number of online banking fraud increase enormously. For example in UK,According to UK Payment Association the number of online banking fraud doubled in the last two years which is mainly due to criminals use more sophisticated method to gain access to customers account information.
Criminals are using a variety of methods -- including database hacks, brute forcing and phishing - to get login credentials from non-financial websites, such as social networking sites and Web-based email services.
Many online bank customers use their ID and password for other web sites which are not as secure as bank's web site that enable criminals to get information form those sites and use them for accessing to customers bank account. So ,an important suggestion for online banking users could be : Never use your online banking ID and password for other websites

Friday, April 16, 2010

Financial and cyber crime most prevalent economic crime in Malaysia

This is the last news about cybercrime in malaysia :

"KUALA LUMPUR, April 13 (Bernama) -- Financial and cyber crimes were among the most prevalent economic crimes commited in Malaysia, says Honorary Group Chairperson of International Cybercrime and Forensics Examiner (ICFE) Group of Companies, Tommy Seah."

As I mentioned in the previous post ,the number of cybercrime cases increases,it is mainly due to increases of online application especially in business area and social networking and lack of knowledge about computer crimes and corresponding issues among Internet users.In the case of Malaysia ,as country that want to be attractive for foreign investors,it is crucial to raise level of knowledge about cybercrime in both public and private sectors . One way to achieve this goal could be developing knowledge of students by putting at least one subject in school curriculum about Internet security,cyberlaw and related issues. Furthermore ,both public and private sectors must train their employees in order to keep customers information from misusing by intruders in the cyber space . In a short , developing skills and knowledge of Internet users could be an importnt step in order to reduce number of cybercrime cases .
Refrence:

Tuesday, April 13, 2010

Need for Inernational Organization on Cybercrime

Cyberspace is very important tools not only for business,education,government and so on ,but also it is very fascinating environment for those who tends to do something against the law for any reason.While the number of Internet users increased drastically by 399% from 360,985,492 at the end of year 2000 to 1,802,330,457 in December 2009(1), at the same time number of cybercrime cases increased too.Definitely,Internet users and application increase further and computer crime also become an important issue .Thus Constitution of an international organization on cyberlaw could be an important step toward improvment of internet security and development.




Refrences:


1.World Internet Users and Population Stats :www.internetworldstats.com/stats.htm

Followers