01-01-2013, 02:33 PM
CYBERCRIME AND NETWORK SECURITY
CYBERCRIME.doc (Size: 456.5 KB / Downloads: 23)
ABSTRACT
Applied biometrics presents the e age solution to the worst problems of Identity recognition.LASER PUMER technology The process of authenticating by testing with DNA by a fast laser decoder is called laser pumer technology. The basing genetic coding has two strands of which the ride side strand is not easy to decode. So Pumer uses the left strand for analysis. The genetic coding is so unique that the repetition level of probability is < 0.03 % which matches to a impossible event!Eye and pulse extol Validation The alternative solution for a high cost Laser pumer technology is this technique! This involves the dual scanning concepts of scanning the patterns of the eye, which are unique, a fingerprint of a man! Since it is a dual scan it involves the scanning of low-level electric pulses that drive our body (0.23 μV). Finger print Validation For security access, this device uses fingerprint recognition to permit and restrict access to a computer or workstation. This security device reads any of your fingerprints, at any angle -- even upside down. The sensor is designed for ease of use. It requires no power supply and its USB port capability makes it truly plug-and-play gaining you even easier access to Windows, the Net, online services, and more Firewall & Big “H” repellent The alternative for using these testers is to use the smart networks called E.smart© which will spot a hacker into the network before he can access the main DB.
CYBER CRIME :
Computer crime encompass a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.
CYBER CRIME CASE STUDIES
Famous security flaws
• The most famous flaw was that of standard charted bank South Africa in the year 1996. Here the accounts were managed with a triple firewall hack proof command lines, but for the surprise of many a university graduate managed to log into the Sybase, which managed the overall transactions and added 5 million $ (US) to his over night balance! He repeated this for the span of three years before he was finally fished out by is family members!
• NASA too was not free from the hackers, the weak security present was exposed to its core when the Russian informer broke into the Cryogenic engine detail zone and formatted the contents and placed the Russian National Anthem with a few worthless info of Russia’s geography to restore the original size of 39.34 MB in the MAC system. This event was not a big event since the US officials anticipated that this would happen and had 120 hard copies of the original data in the safety lockers of Tennsy Gold Reserves.
Firewall & Big “H” repellent
The alternative for using these testers is to use the smart networks called E.smart© which will spot a hacker into the network before he can access the main DB.
The co., in research is NOVEL, Web fish.
They are trying to deign a browser & Netware that is going to fish in the big networks by laying traps, which most hackers stumble upon as they disguise themselves as the Main DB, whose location is known only to the master user!
This technology is linked with the cyber patrol so when a real time hacker is spotted the system draws details of his system and reports to the cyber patrol who rush to the system location to cuff the Criminal if found guilty who can be penalized up to $50 million or suffer 300 years in prison which is a life
This technology is so hard and it repels the hackers away from it and so it is called the Big “H” repellent. It also sets a virtual firewall to shield the real time data!
Conclusion:
• The technology is in U R hands but it is all up to U to safe guard your DATA
• The cracking into systems has become so common that the Windows network don’t work anymore!
• Switch to new technology and always remember, ”Prevention is better than cure!”