This is part two of a 6-article series on blockchain technology potential to reduce cyber crimes. The first article covered the definition of cybercrimes and cyber security as well as quantified the problem that cybercrime represent for modern civilization.
Part II – A Warning
Threats are not about bombs anymore, they’re about buttons. Have you seen what is happening in Baltimore? That is child’s play compared to what is around the corner. And what is being considered by our foes.
We better stop worrying about Donald Trump and focus on bigger problems. Have we become so enamored with judging a human being, that we have forgotten the world is at risk? We need a new problem and we need a new technology to fix that problem. Companies like Smart Community Technologies are creating these new protective blankets and fences for you, your family, your community, your company, your country.
Nathan Rothschild said, ”Give me control of a Nation’s economy and I care not who write its laws”.
Experts say that Cybercrime “will represent the greatest transfer of wealth in world history….and become more profitable for thieves than the global trade of all major illegal drugs…combined!” Robert Herjavek says, “this dramatic rise in damage costs only reinforces the sharp increase in the number of organizations unprepared for a cyber-attack.”
Impact of Baltimore Attack
Back to Baltimore, the Use Case For “Hacking For Dummies”. 1000s of cities and countries all over the world are next in line, just waiting to be hacked, because they don’t have a Risk Assessment Plan & Threat Analysis form companies like Smart Community Technologies, of Atlanta, Georgia.
Cyber-attacks are the fastest growing crime in the U.S. and the world by far:
- The Marriott breach near the end of 2018 exposed over 500 million user accounts.
- The Yahoo attack (largest ever) impacted over 3 billion accounts.
- The Equifax Breach in 2017 affected over 145 million customers.
A special agent to the FBI told the Wall Street Journal that every American citizen should expect that all of their data (personally identifiable information) has been stolen and is now on the dark web.
Distributed Denial of Service
What is a DDoS attack? DDoS is short for Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.
How DDoS Attacks Work
In a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address. In addition, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.
Robert Herjavek, the famous shark (mentioned above and one of the good guys in the fight, just wrote a new book entitled You Don’t Have to Be a Shark: Creating Your Own Success
As CEO and Founder of the Herjavek Group, his company does outstanding work in helping fight the forces of evil. Robert likes to tell people that his real job is being Batman in real life. He constantly is fighting the bad guys who are far from Jokers.
Robert says…” what really worries me though, is that all the hype around cybercrime – the headlines – the breach notices etc. – makes us complacent. Furthermore, the risk is very real, and we can’t allow ourselves to be lulled into a sense of inevitability.”