There Will Never Be Such A Thing As 100% Security Towards E-Crime

E-crime epidemic looks to be getting worse as the main problem is the growing number of computer criminals and the growing number of attacks. The number of attacks has more than doubled the last year, as we see several new viruses each minute through the 24 hours of the day. So you can ask yourself the question whether it is possible for any Anti-Virus company to react in a timely fashion to brand new examples of virus program code, that are appearing once every thirty seconds, that means over 2,500 in a twenty-four hour period?

One way of getting around the problem is use of Extreme Programming (XP), a way of doing rapid programming work. For the new products, for consumer markets, use of Extreme Programming is needed for sure, including anti-virus software development. But this alone will not solve the problem of course. We need to look into the elements needed in the anti virus software. We also need to look into how we can effectively catch cyber criminals, what methodologies we can use and tools to use in this fight. Then we have to look at how computers are designed versus how humans use the computers.

There are several elements that are needed to be covered in an anti virus software to keep up with the virus makers today and to keep your computer as safe as possible against any attacks from unwanted activities to your system and others.

The presence of a heuristic scanning process were the code is analyzed without executing the anti virus application itself.
Use of behavior blocker to intercepts the computer system while an application runs on the computer. If the activity is suspicious, it is stopped. In this system it is needed to have a roll back function, to undo all of the changes made by the monitored application so the computer will be reverted to its former state.
Use of a anti-rootkit technology is also needed to take care of rootkit program designed to hide itself and other programs, data, and/or activity including viruses, backdoors, keyloggers and spyware on a computer system.
Use of anti-keylogger technology has to be integrated in order to block attempts to monitor the users’ key strokes on their computer.
Another issue to be addressed is the need for special technologies to block trojans that attack Anti-Virus applications itself.

Almost 100% of malware is detected by these processes described above; however it is possible to create an attack that can bypass any security. There will never be such a thing as 100% security towards electronic attacks on a computer.

If the hackers are professional enough, there is no way to protect against their attacks, because every attack is a unique problem between an attacker and a victim. The attacker knows the victim; he has had time to analyze how the victim protects himself. And the victim doesn’t know what the attacker is going to do and their computer will be hijacked. If someone wants to attack you, they can, there is no such thing as 100% security."
There are a lot of these undiscovered exploits or viruses out there, in the wild, because they simply haven’t been very widely distributed or exploited yet.


Major anti virus companies have installed software robots to analyze all the incoming samples of new viruses detected by their software and most of them are handled by the robots, the signatures are added to the database automatically, and human interference is only needed to watching this conveyor

There are three main factors contributing in the numbers of cyber criminals growing globally today. E-crime is a very profitable business, it’s a low risk business and it’s easy to do.

The criminals in the Internet behave with the ‘speed of Internet’, and they don’t have national borders. So, the law also has to move with the speed of Internet with no borders.
Governments, companies, and users need to address this issue fast and talk about establishment of Internet Interpol. There is already some cooperation between European countries. But many of the attackers come from outside European countries. Most of the malicious code we see comes from China, followed by Spanish and Portuguese speaking countries, South America and Russia.
If governments do not want to comply with international cooperation then we should adapt a zero-tolerance policy. For those countries that do not join up to the Internet Interpol should just be cut off from the net.

Is there a way to authenticate official programs that people have downloaded? Some solutions are never going to work according to security experts.
It’s an existing problem today. In most cases, malware is installed by malicious code from Internet resources, FTP resources. Who will follow the certification standards? A few years back, there was a new idea, to have some kind of certification of users’ emails to avoid spam e-mails. The first people to follow the certification process of the system were the spammers themselves.

Even if you go to a vendor’s website, make sure it is the real website, and not a pharmer’s web site which is a duplicate created by criminals. The hackers sometimes make a page that looks exactly like the real site.

Windows operating system has to be used wisely in order to have a secure product running on your computer. Use of Internet Explorer to browse the Internet has to be set at custom level of security for the Internet zone, to prompt on all. Sometimes you will have to click five, six, or seven times to deactivate scripts on pages you read, but that’s what it takes.

Use of Open Source to create a more secure environment for home users than Windows has a dual edge to it. The hackers have easy access to the source code which of course makes hackers’ life easier, as they can find the vulnerabilities by reading the source code. Therefore we see that Open source projects have been misused by hackers. However, there are good guys, who analyze the code, and if there’s a problem they report it to the community, and it’s fixed.

Is there any such thing as a perfectly secure operating system? Could something like that be created? The operating system is found in the old Siemens S4 mobile phone, which is absolutely secure. You cannot change it at all; you cannot download or install applications to it. This is how you can create a perfectly secure operating system. But would you use such a system?
In some areas, such systems are used, like in the military, financial centers for example.

About the Author:

He has a background as civil engineer and geoscientist. He has worked mainly within the oil and gas industry from the mid 1980s. He has written a few fictional novels as well as being the author of some professional litterature within oil and gas sector, he is now an editor of some web sites.

Article Source: ArticlesBase.com - There Will Never Be Such A Thing As 100% Security Towards E-Crime

Internet, Russia, France, Server, Worm, Military, Navy, Hackers, Army, E-mail, Raf, Cyber War, Royal Air Force, Conficker, Royal Airforce, Conficker B++, Public Server