CRIME Most system attacks take place before even experienced security experts have advanced knowledge of them. Most of the security solutions are best practices as we have so far seen and we will continue to discuss them as either preventive or reactive. An effective plan must consist of three components; prevention, detection, and analysis and response. Prevention Is probably the best system security policy, but only if we know what to prevent the systems from.
Prevention tips:
*always change your password for any social networking site
* do not share any files publicly
* check carefully emails sent to you that asked for validation
* do not simply click links that are suspicious for you
* do not enter banking website on public WIFI
* always clear CACHE after you make only online transaction
Although it is difficult and we are constantly chasing the hackers who are always ahead of us , we still need to do something. Among those possible approaches are the following: * security policy * risk management * perimeter security * encryption *legislation * self regulation *mass education Detection In case prevention fails the next best strategy should be early detection. Detection system must continuously capture , analyse ,and report on the daily happenings in and around network. In capturing, analysing, and reporting, several techniques are used including intrusion detection, vulnerability scanning, virus, detection, and other ad hoc methods. We will look at these in the coming chapters.
Cybercrime detection acts like a smart lock, and so detection of cybercrime(picking
the lock)involves monitoring computers, computer networks, and network servers that play important roles in information system. Recovery Whether or not prevention or detection solutions were deployed on the system if a security incident has occurred on a system, a recovery plan, as spelled out in the security plan , must be followed. THANK YOU BY: RIVIE U. ALTUBAR