Developing a Common Vocabulary to Fight Cybercrime

November 20, 2013

Developing a Common Vocabulary to Fight Cybercrime

Internet security and stability depend increasingly on cooperation between all parties involved, and such cooperation can be crucial to successfully fight against the growing number of information security incidents on the Internet.

“The sum of each and every individual action will make problems easier to tackle. We must develop a common vocabulary.” With this statement, Cristine Hoepers, senior security analyst and general manager at CERT.br, called on LACNIC 20 attendees to double their efforts towards achieving significant improvements in Internet security and stability.

While participating in LACNIC 20, Hoepers delivered a keynote presentation titled “Cybersecurity, Cybercrime, Cyberwar, Cyberespionage… can the Internet make the situation better?” during which she asked everyone to “put aside their preconceived ideas” in order to address the difficulties that are appearing throughout the region.

Speaking to LACNIC News, Hoepers admitted that the key lies in that every player must adopt the same security practices.

(Free access, no subscription required)

– What are the most common or frequent computer security incidents at regional level? Has the number of incidents increased lately? Is it possible to quantify the losses caused by computer security incidents in Latin America?

– There is no formal, statistically based study available that can show us what the scenario looks like for the region. Available indicators are based on voluntary reporting or online surveys. As we know, however, none of this data reflects the actual costs or the true extent of the problem, largely because affected organizations are not always motivated to make public the information regarding the costs and impacts of an incident on their operations.

Nevertheless, many public sources of information on malicious activities exist around the world and these show that, in our region, many problems involve large numbers of home computers infected by Botnets that are used to attack other networks or to send spam. This type of activity has landed many of the region’s networks on blocking lists, and has, for everyone involved, an impact that is hard to measure, which is the bad reputation of our networks and being considered by many as a “bad neighborhood.” If the region’s operators do not take the necessary steps to implement best practices as well as to recover botnets and antispoofing (BCP 38), the problems may worsen and become increasingly difficult to mitigate.

1 Comentarios
Oldest
Newest Most Voted
Inline Feedbacks
View all comments