Cybercrime Victims Feel Ripped Off

Monday, September 20, 2010

Eli Talmor

7af56c65866a442699d6dd1dfb02b528

A new Norton Study of 7,000 Web Users Is First to Gauge Emotional Impact of Cybercrime; Victims Feel Ripped Off ... and Pissed Off .

Two-thirds (65 percent) of Internet users globally, and almost three-quarters (73 percent) of U.S. Web surfers have fallen victim to cyber-crimes, including computer viruses, online credit card fraud and identity theft.

As the most victimized nations, America ranks third, after China (83 percent) and Brazil and India (tie 76 percent). That victims' strongest reactions are feeling angry (58 percent), annoyed (51 percent) and cheated (40 percent), and in many cases they blame themselves for being attacked.

Only 3 percent don't think it will happen to them, and nearly 80 percent do not expect cyber-criminals to be brought to justice- resulting in an ironic reluctance to take action and a sense of helplessness...

Relating to that -  US White Housepublished a Draft on "National Strategy for Trusted Identities in Cyberspace Creating Options for Enhanced Online Security and Privacy".

Few quotes from this document:

"Cyberspace - the interdependent network of information technology components that underpins many of our communications - is a crucial component of the Nation's critical infrastructure. We use cyberspace to exchange information, buy and sell products and services, and enable many online transactions across a wide range of sectors, both nationally and internationally. As a result, a secure cyberspace is critical to the health of our economy and to the security of our Nation. In particular, the Federal Government must address the recent and alarming rise in online fraud, identity theft, and misuse of information online."

The Strategy's vision is:

Individuals and organizations utilize secure, efficient, easy-to-use, and interoperable:

Identity solutions to access online services in a manner that promotes confidence, privacy,choice, and innovation.

Fraudulent transactions within the banking, retail, and other sectors along with intrusions against the Nation's critical infrastructure assets that are essential to the functioning of our society and economy (utilities, transportation, financial, etc.) are all too common.

As more commercial and government services become available online, the amount of sensitive and financial data transmitted over the Internet is ever increasing.

Consequently, the probability of loss associated with data theft and corruption, fraud, and privacy breaches increases as well. The poor identification, authentication, and authorization practices associated with these identity solutions are the focus of this Strategy.

Identity Solutions will be Secure and Resilient:

Securing identity solutions against attack or misuse is paramount. Security ensures the confidentiality, integrity, and availability of identity solutions: Strong cryptography, the use of open and well-vetted security standards, and the presence of auditable security processes are critical to the trustworthiness of an identity solution.

Identity solutions should have security built into them such that they detect and prevent intrusions, corruption, and disruption to the maximum extent possible.

Identity solutions should be resilient, able to recover and adapt to drastic or abrupt change. Identity Solutions will be Cost-Effective and Easy To Use. Identity solutions should be simple to understand, intuitive, easy to use, and enabled by technology that requires minimal user training."

I have submitted my proposal to this initiative at : http://www.nstic.ideascale.com/a/dtd/Protecting-Online-Transactions-and-Sensitive-Data-Files-with-Malware-resilient-Software-as-a-Service./45573-9351

Your comments are welcome.

Possibly Related Articles:
5469
Security Awareness
Security Awareness Cyber Crime
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.