.

Friday, July 8, 2011



Michael Hayden, head of the CIA under former President George W. Bush, says the U.S. should create a totally new Internet infrastructure to thwart cyber attacks that increasingly plagues the current Internet.
The proposed new system, with the domain name ".secure" instead of ".com," would get rid of the anonymity protected by the privacy guarantees of the Fourth Amendment. Users would need "certified credentials" to access the .secure system, according to Nextgov.com, which monitors the use of technology in the federal government.

       One of the fastest growing segments of the world economy is cybercrime. The opportunity is created by the inexorable digitization and interconnection of enterprises both Government and Commercial, and is exacerbated by increasingly sophisticated and well-funded attackers. The modern IT security approach to countering this threat has been reactive, not proactive. Intrusion detection systems, firewalls, Web filters, anti-malware software and Patch Tuesdays represent the state of the art, and while there are a lot of great security products and technologies available, the concept of allowing connectivity to critical information and networks while trying to filter and detect malicious activity is fundamentally flawed. The black hats simply change tactics to circumvent defenses, they are always one step ahead.
Learn from Others’ Mistakes
Every day we hear reports of successful cyber intrusions, expansive private data disclosures, service outages and massive monetary losses. The inability to protect our critical digital resources acts as a collective drag on innovation and productivity; for example, consider how mobile devices and cloud computing are generally viewed as far too risky to trust with enterprise-critical data.
Clearly, the IT security world is in need of a proactive approach. Critical infrastructure must be built upon trustworthy computing platforms that can guarantee protection against even the most sophisticated attackers.
Do your Homework
How do cyber criminals get into the supposedly secure networks of enterprises? They typically exploit one of the thousands of vulnerabilities of the underlying operating system or the web server or the firewall that the enterprise uses as it’s security foundation. And many IT professionals never even bother to research the existence of these vulnerabilities, although they are readily available by checking the national vulnerability database.
The first thing any organization should do when formulating a proactive approach to security is obtain independent affirmation of the level of security assurance of the technology they are going to deploy. There is one, internationally accepted standard for evaluating IT security: ISO/IEC 15408, commonly known as the Common Criteria. The Common Criteria specifies levels of security assurance. Common enterprise software products, such as Windows, Linux, Android, VMware and Oracle are certified at level 4+ or lower, a standard that is appropriate only against “inadvertent or casual attempts to breach the system security”. These are all wonderful, feature-rich products, but none of them were designed from the ground up to meet the highest levels of security.
In order to ensure maximum security, organizations should search out and deploy products rated at EAL 6+ High Robustness, the level of security that the US government specifies for protection of high value information against the most sophisticated and determined attackers. Level 6+ requires formal mathematical proof of security and detailed penetration testing – it requires vendors to actually prove that their products are secure.
What Not to Do
Adding filters and firewalls to insecure platforms is like attaching padlocks to a screen door. Inevitably, the criminals are going to find a way in, and when they do, they have a vast library of vulnerabilities in the platform with which to wreak havoc. One recent example is CVE-2009-2692, a flaw in the Linux kernel that enables user applications to take over complete control of the computer. This vulnerability was recently discovered by researchers after going undetected for eight years within the Linux code base. For eight years the cyber criminals had a simple way to get into any Linux system deployed.
Ask the Experts
In addition to searching the Common Criteria evaluated products list to find the highest certified products, consult organizations such as the Cyber Secure Institute, a non-profit cybersecurity analysis and advocacy organization dedicated to increasing awareness of the need for trustworthy computing to CIOs and other IT professionals. The Institute is leading the charge for both the government and commercial IT communities in a worldwide demand for a higher security standard from computing infrastructure suppliers.
It’s no secret that the strained economic climate has put direct pressure on companies to reduce their investments in security technology. The beauty of investing in trustworthy platforms, however, is that certain technologies can actually lower cost while improving security. So, the best advice for IT professionals who want to stop a cyber attack before it happens is: Do your homework, and invest in technology that protects sensitive data from the inside out.

Monday, July 4, 2011


Online trading enables you to research, monitor and adjust your investments at any time of the day or night wherever you are in the world. This means that whether you want to issue a purchase or sale order or simply monitor the performance of your portfolio you have instant access to information relating to your investment. Advancements in technology now mean that you are able to use WAP enabled mobile phones or organisers to access your online broker when you are on the move.
The majority of online brokers offer an execution only service meaning that while they offer access to research tools such as share prices, performance charts and business news, they do not provide any specific advice. However, execution only broker services tend to be much cheaper than personalised services - many online brokers charge a minimal flat fee for any investments made (although some may charge an annual administration fee). As an incentive to attract new customers many online dealers offer introductory rates and offers for new clients.
Although the use of an execution only broker service is not ideal for the novice investor, most online trading services offer customers the ability to theoretically invest and monitor the movement of shares in the stock market. This gives novice investors the opportunity to familiarise themselves with the way their share account works and how their 'fantasy investments' perform before risking their funds.
Features to look for when deciding which online broker to invest with are things such as whether the broker places a limit on the maximum or minimum amount you are able to trade with, the research facilities they offer, any administration or commission fees charged and also the length of the settlement period offered (as this will dictate how long it takes to withdraw funds from you trade account and can be anywhere between 1 and 10 days). It is also important to find out whether a broker offer facilities such as limit and stop loss orders and whether there is a related charge for their use. You should also check whether there are any limits on the variety of markets you can invest in.
Once you have chosen an online broker to invest with you will be required to set up a trading account and deposit funds. You will then have access to the brokers full range of investment resources to help you research potential stock. Once you have decided which stock to invest in, you can generate a real time share price. If you are happy with this price you can then instruct the broker to purchase the shares on your behalf.
The majority of online brokers will hold your share certificates in a nominee account which they will operate on your behalf but of which you are listed as the beneficiary. This means that all documentation relating to your investment is automatically forwarded to them. Although this cuts down on paperwork for you it also means that you won't be directly sent the company's reports and account, takeover announcements and other shareholder perks. Additionally, any dividends paid or shares sold will be paid into this account.
Although online trading has many advantages there are also several risks to be aware of By using an online execution only broker you are effectively managing your own portfolio, meaning you need to be able to constantly monitor share prices as well as the status of your investment. Additionally, as with anything that relies on computers, technological problems can occur and may have adverse effects on your ability to trade, especially if share prices are moving rapidly. Also you must always consider the risks to your capital that apply to investment in shares whether you trade online or use a more traditional broker service.
As long as the risks are taken into consideration, online trading provides an excellent way for the novice investor to gain experience in managing their own portfolio of shares as well as for allowing more experienced investors the facility to have instant access to their investments.