Hi fam. Here is it.
CYBER CRIME AND ONLINE SECURITY SYSTEMS
SECURING ONLINE FUNCTIONS
The world wide web has turned the world a small community that is able to interact freely
with one another in an instance. Advances in this technology means that securing personal
information is key especially in this online world. Systems are connected in such a way that
being online at any one point puts the user at a risk of being attacked in financial markets,
and at a personal level. Governments are increasingly at risk of losing valuable information,
and so are corporations. The loss of such vital knowledge can pose a risk to individuals,
companies and in the global sense, whole nations. Encryption is a method that is used to
secure data for the relevant parties, but with the increasing demand for a global connection,
IT systems continue to be vulnerable to attacks from malicious parties hoping to gain from
such details (Sweir at al, 2007). Firewalls also play a role in blocking unwanted attacks to a
A local area network (LAN) connects devices in a regulated range. This is easily secured in
that the command centre can regulate the users within the same. It can be encrypted by the
use of passwords and access codes (Sweir at al, 2007). What cannot be regulated is the
number of users connected to the LAN since the size of the company, or institution is only
limited to the ability of any provider to host the number of users within the network.
A wide area network (WAN) enables businesses or organizations, even national institutions
to connect over greater distances. It facilitates communication between various branches of a
business and as such, has more users as opposed to a LAN.
Often, a LAN will need a WAN to communicate effectively, and in a timely manner with
other branches of a business organization. Encryption here is harder based on the volume of
users that are able to access the network of connected IT systems. It may be effective in the
sense that the IT department is solely responsible for the security of data transfers between
the two domains (Wang & My, 2013). Encryption keys can be generated at the control
centres and only passed to the relevant recipients. However, this poses a great risk to any
institutions utilising a LAN to WAN domain for factors detailed in the threat model outlined
Discussion on threat modelling
What is threat modelling? This refers to an active process of establishing potential dangers to
a business operating online and trying to come up with an effective way to counter the
possible negative outcomes that may arise from such dangers. It is a proactive method aimed
at ensuring that any arising issues have been solved even before they happen. It focuses on
the agenda and how it is being executed first. Next, the possible negative outcomes are
outlined and discussed in depth. What could go wrong is speculated upon and deliberated
upon at this stage in the process. After the potential unfavourable outcomes are identified, a
proposal to what can be done to solve them has to come up. In essence, what happens should
the negative expected outcome be, what should be done about it? Finally, an evaluation of
this reaction to the negative outcome has to be done (Brown at al, 2004). Was it effective?
What can be made better about if it wasn’t? Is there room for improvement? Ultimately, a
threat model forecasts a problem and finds ways to solve it before it happens while also
evaluating the outcomes from the reactions to these problems.
Advances in technology have rendered the world a globalised village so to speak. The
transfer of information happens in an instant, and friends across continents can communicate
in real time. In the case of a LAN to WAN domain, the constant flow of data an...