Trends in Cybersecurity and NEC’s Commitment to Developing Solutions

Author(s): SUZUKI Mikio, YAMAI Tadanori, SUZUKI Tetsuya & MIYAUCHI Kouji  |  Published date:  Jan, 2008

<p style="text-align:justify;">Over the past few years, cyberattacks and cybercrime have become increasingly destructive and are now regarded as a significant social issue. Under these circumstances, the Japanese government has hammered out a number of policies aimed at boosting cybersecurity both in the public and private spheres. At NEC, we take the threat of cyberattacks very seriously and have developed a variety of technologies such as a cyberattack protection system and information leakage measurement platform to protect our own security. Most recently, we have begun to apply AI technology to detect and counter threats and are working diligently to acquire security intelligence. Drawing on the technologies we have developed and the information we have collected, as well as sophisticated security human resources, NEC is now able to offer a wide spectrum of security solutions. In this paper, we will take a closer look at trends in cybersecurity and explain in some detail the efforts NEC is undertaking in this area.</p><p style="text-align:justify;"><strong><span style="font-size:medium;color:#3300ff;">1. Introduction &mdash; Trends in Cybersecurity </span></strong></p><p style="text-align:justify;">The nature of cyberattacks is constantly in flux, always evolving to keep pace with the times. Initially, personal cyberattacks &mdash; such as email pranksters &mdash; were predominant. But as more and more of the world&rsquo;s business shifted online, cyberattacks grew in scope and ambition, targeting businesses, large organizations, critical infrastructure, and governments at the highest level, gradually becoming ever more sophisticated and complex. These attacks range from economically motivated to politically motivated and can include targeted attacks aimed at specific subjects who have expressed social or political opinions that differ from those of the attackers. These often take the form of distributed denial of service (DDoS) attacks in addition to the hacking of websites. On the more prosaic side, theft of credit card information and other personal information has become an almost daily occurrence, along with illegal remittances via Internet banking. As a consequence, cyberattacks have come to be recognized as an issue that society as a whole must confront.</p>

Download pdf

Importance of Cyber Security

Author(s): Rajesh Kumar Goutam  |  Published date:  Feb, 2015

<p><span style="font-size:medium;color:#3333ff;"><strong>ABSTRACT </strong></span></p><p>Governments, military, organizations, financial institutions, universities and other businesses collect, process and store a large amount of confidential information and data on computers and transmit that data over networks to other computers. With the continuous rapid growth of volume and sophistication of cyber attacks, quick attempts are required to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace and shows how the internet is unsecure to transmit the confidential and financial information. We demonstrate that hacking is now common and harmful for global economy and security and presented the various methods of cyber attacks in India and worldwide. </p><p><strong>Keywords:</strong> Cyber security, Cyberspace, Cybercrime. </p><p><span style="font-size:medium;color:#3333ff;"><strong>1. INTRODUCTION </strong></span></p><p>Cyber security is defined as technologies and processes constructed to protect computers, computer hardware, software, networks and data from unauthorized access, vulnerabilities supplied through Internet by cyber criminals, terrorist groups and hackers. Cyber security is related to protecting your internet and network based digital equipments and information from unauthorized access and alteration. Internet is now not only the source of information but also has established as a medium through which we do business, to advertise and sell our products in various forms, communicate with our customers and retailers and do our financial transactions. The internet offers lots of benefits and provides us opportunity to advertise our business across the globe in minimum charges and in less human efforts in very short span of time. As internet was never constructed to track and trace the behavior of users [1]. The Internet was actually constructed to link autonomous computers for resource sharing and to provide a common platform to community of researchers [1]. As internet offers on the one hand huge number of benefits and on the other hand it also provides equal opportunities for cyber-terrorists and hackers. Terrorist organizations and their supporters are using internet for a wide range of purposes such as gathering information and dissemination of it for terrorist purpose, recruiting fresh terrorists, funding attacks and to motivate acts of terrorism [2]. It is often used to facilitate communication within terrorist groups and gathering and dissemination of information for terrorist purposes [2]. </p>

Download pdf