Most of the laws are still missing and the security measures are low
In the Internet age, more and more people use the computer to make your opinion air. Whether the crash of the US espionage aircraft on China, the bombardement in Afghanistan, the invasion of Iraq or the Palastina conflict, global political events are occasion “direct” and “personally” interlock. You send viruses into the virtual world, protested with DOS attacks, chops and crackes the computer’s supposed opponent. Occasionally, the political cooperates with the personal financial interest.
Many companies, however, usually give prestigegrunds to the damage suffered either or only partially. Many do not know how to calculate him at all precise. In the US, the This-year-old report of the Computer Security Institute and the FBIS based on data that could be collected at 530 companies. Overall, this report has a damage of around 202 million dollars, with almost a third of them, 66 million dollars, alone on the account of “DOS”-Attacks goes. What ultimately ultimately the total damage of all companies approached in the US “Cyberattacks” is, pure speculation remains: 2 billion, 20 billion, 200 billion?
Although 60% of all companies in Europe and the United States do not plan a fixed budget for computer security in their budget, the general security situation has become significantly better in recent years. Especially hackers are not so easy as sooner, which is why they are increasingly on so-called “Soft goals” evade. To those of the nearby east, where so far “Digital attacks” Usually politically motivated: “Palastina VS. Israel”. It was a small Arab-Israeli Cyberwar, the same time with the “Intifada” In September 2000 (Intifada began in Cyberspace) and by the Web sites of Hezbollah, Knesset or Jerusalem Post based on “DOS attacks” For a few days from the net had to be taken (fights on the Internet continue). Meanwhile, no longer the propaganda websites of the opponent are the main terminal target, but those of banks, rusts and borse.
The nearby is, which concerns computer security, nor a developing country and stands with Iran, Kuwait, UAE, Saudi Arabia and Egypt in the top 10 hacker list of security firm “Symantec”. So far, the proportion of the Middle East was expected to be global “Hacking” (Total per year “Several 100.000 attacks”, What the coarseed part happens through viruses and worms) just once to one percent. Now the situation seems drastically to others: alone in the United Arab Emirates (UAE), the unauthorized access to computer systems in the first six months of this year increased by 300% compared to the last six months of 2002. “A few years ago”, So David Michaux of Scanit, a company that carries out seminars for computer security throughout the Middle East, “Many companies got a security system that has never been updated and could not be updated, because nobody gave, who knew how that worked.” Since there was hardly serious forcolority, they weighed safely.
“The consciousness for safety preres went against zero”, Tells Gorashi Abdulrahman by Network Associates (McAfee), responsible for the Middle East. “So one became the main goal of attacks of all kinds. The viruses Lovesan and Sobig showed the person responsible that they need a rich security system”. The viruses, which were known to detect immense damage worldwide, came at the beginning of this year a local ATM dizziness in the UAE. A group of Indonesia, how to find out later, had gained access to the bank computers where all codes and personal information of customers were stored. The responsible persons will hardly be attracted to account, a corresponding legislation for computer and internet criminalitat is not available as in most other countries of the Middle East. The land of the “Gulf Cooperation Council”, Saudi Arabia included, currently advise on “Cyber law”, which aims to measure a joint approach to computer crime. Model is the Cybercrime law of the European Council.
Private companies, public organizations and not least governments in the Middle East have understood that they need to reuse in terms of computer security and invest more. “Especially for Saudi Arabia”, Says Mohammed Sulaiman, the product manager of Network Associates Saudi Arabia, “Is it important to protect yourself from unauthorized styles of all kinds. The Saudi Arab Information Technology Sector pays to the fastest growing in the region.”
The international computer security companies can be pleased. The Middle East is a market that was allowed to be worth more than $ 150 million, according to estimates. McAfee reported this year from an increase in sales in this region of 26% and expects the coming business year to increase the rate of 50%. Even the German TUV gets his part of the coarse Arab safety cake. In June of this year, the IT department of the technical monitoring association leaked a multi-declared training on the topic “Hacking” in Dubai.
For all safety measures, cyberattacks will no less. For DOS attacks, there are now programs that every computer laia can use. Real hacker attacks are increasingly targeted, preferably on the energy, finance and high technology sectors. For the conflict region “middle East” does not mean anything good. Criminally oriented individuals come political organizations. So, according to a computer specialist of the Lebanese government who wants to remain unrecognized, the Israeli intelligence Mossad specifically tries to hack banks, borseas, IT companies Arabian landing. “Nobody wants to confirm that, especially when the attacks were successful”, But that can, of course, be one of the popular conspiracy theories. Also Arab groups, such as Hezbollah with their worldwide network of computer specialists, mostly trained computer scientists,, on the other hand, are troubles to Israeli companies, government organizations or communication facilities. Of the “Cyberware”, The previously a public propagandawetting was changed, the arena has changed and now takes place behind closed cyber advances.
In this scenario, of course, not the US is missing, which after the 11. September u.a. began to monitor the Internet chat of the region. As you have been analyzing the entire telephone traffic worldwide worldwide for many years, you are also looking for information in Internet communication from and according to the countries of the Middle East, which could luck on an assassination. According to this method, allegedly, the early warnings have come about, which should have given it before the bombing in Riad, Saudi Arabia,. The general monitoring monitoring: websites of “terrorist” Breeded Islamic organizations and their email traffic will be “observed” And if necessary, so got that the corresponding page must be taken from the network.