Amazines Free Article Archive
www.amazines.com - Monday, July 28, 2025
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133577)
 Advice (161673)
 Affiliate Programs (34799)
 Art and Culture (73858)
 Automotive (145727)
 Blogs (75623)
 Boating (9851)
 Books (17224)
 Buddhism (4130)
 Business (1331067)
 Business News (426461)
 Business Opportunities (366526)
 Camping (10974)
 Career (72796)
 Christianity (15854)
 Collecting (11638)
 Communication (115089)
 Computers (241958)
 Construction (38977)
 Consumer (49954)
 Cooking (17080)
 Copywriting (6734)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20323)
 Dating (45910)
 EBooks (19704)
 E-Commerce (48279)
 Education (185537)
 Electronics (83525)
 Email (6438)
 Entertainment (159864)
 Environment (29004)
 Ezine (3040)
 Ezine Publishing (5454)
 Ezine Sites (1551)
 Family & Parenting (111012)
 Fashion & Cosmetics (196613)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310640)
 Fitness (106493)
 Food & Beverages (63058)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25207)
 Government (10519)
 Health (630190)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91753)
 Home Improvement (251310)
 Home Repair (46262)
 Humor (4729)
 Import - Export (5462)
 Insurance (45105)
 Interior Design (29637)
 International Property (3488)
 Internet (191034)
 Internet Marketing (146690)
 Investment (22864)
 Islam (1161)
 Judaism (1352)
 Law (80500)
 Link Popularity (4596)
 Manufacturing (20933)
 Marketing (99329)
 MLM (14140)
 Motivation (18237)
 Music (27000)
 New to the Internet (9498)
 Non-Profit Organizations (4049)
 Online Shopping (129743)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12691)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126918)
 Recreation & Leisure (95497)
 Relationships (87678)
 Research (16182)
 Sales (80369)
 Science & Technology (110299)
 Search Engines (23525)
 Self Improvement (153318)
 Seniors (6224)
 Sexuality (36012)
 Small Business (49399)
 Software (83054)
 Spiritual (23537)
 Sports (116156)
 Tax (7664)
 Telecommuting (34070)
 Travel & Tourism (308303)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11803)
 Website Design (56951)
 Website Promotion (36673)
 World News (1000+)
 Writing (35853)
Author Spotlight
LEMUEL ASIBAL

Lemuel Asibal is a web content writer who also ventures on writing articles and blog posts about any...more
LINDA HOLLAND

I am a passionate article and blog writer based in South Africa. With a love for life and a strong d...more
JOSEPH ZHOU

China Care Medical has been exporting out Chinese medical equipment for many different countries. We...more
HEINZ RAINER

Thirty years Africa, Asia, Europe | Worked in Industry, Trade | preferred Nations : China, Thailand,...more
AREESH ISHTIAQ

Areesh Ishtiaq a Top Rated SEO and Digital Marketing Guru on Upwork, working as a project manager fo...more


Cyber attacks, Spear Phishing, and InfraGard by Stephen Bryen





Cyber attacks, Spear Phishing, and InfraGard by
Article Posted: 07/12/2011
Article Views: 151
Articles Written: 9
Word Count: 830
Article Votes: 0
AddThis Social Bookmark Button

Cyber attacks, Spear Phishing, and InfraGard


 
Computers,Internet,Science & Technology
Cyber attacks on computers have grown exponentially. The cyber crime trade has become increasingly refined, leveraging ingenuous and constantly evolving malicious software (or malware) with tens of thousands of silently infected computers to hide tracks and steal credentials, like credit card data and passwords, from millions of unsuspecting individuals.

According to Paul Joyal who is Managing Director for Public Safety and Homeland Security at National Strategies based in Washington DC, cyber crime has become one of the world economy’s largest growth sectors—Russian, Chinese, and Israeli gangs are now joined by upstarts from Brazil, Thailand, and Nigeria— all of whom recognize that in the globally connected world, cyberspace offers stealthy and instant means for enrichment.

A recent study by Bell Canada suggests that CA$100 billion ($103.4 billion US) out of $174 billion (179.94 billion US) of revenue transiting Canada’s telecommunications infrastructure is “at risk.” Bell Canada also measured over 80,000 “zero day” attacks per day targeting computers on its network—meaning, attacks that are so new the security companies have yet to register them.

Paul Joyal says that cyber crime has been enhanced by the rapid growth of social media such as Facebook and LinkedIn. Cyber criminals use the social media to learn about their targets and the friends of the targets. It gives them a way to go “phishing” and even more relevantly “spear phishing.” The difference is that “spear phishing” takes aim either at high net worth people or individuals connected to key industries sought by cyber criminals and their government sponsors. “Spear phishing” involves disguising emails and other contacts to look like or appear like a friend or associate, thereby opening the users computer and computer connections to invasive malware that can be used to steal data and information. Paul Joyal points out that sometimes “spear phishing” even involves creating fake personalities who “live” on the Internet and on places such as Facebook and LinkedIn. There are known cases, too, where identities have been pilfered and used by cyber criminals and others misrepresenting themselves. An example of expropriation very recently was the fake Syrian lesbian blogger who appropriated a woman’s photo from Facebook but who actually was an American man living in Scotland. Such techniques have been used to penetrate banking networks, critical infrastructure facilities, and defense companies such as Lockheed Martin. According to Joyal, the Lockheed attack involved the theft of at least a terabyte of information on Lockheed’s stealth Joint Strike fighter (F-35) program.

Technical means alone will not stop cyber attacks, particularly sophisticated attacks built around a strong intelligence gathering network.

Paul Joyal strongly believes that users, especially those in sensitive industries, need to be educated to the threat. Joyal now serves on the Board of Directors of InfraGard. InfraGard is a partnership between the Federal Bureau of Investigation and the private sector. InfraGard is an association of businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.Each InfraGard Chapter has an FBI Special Agent Coordinator assigned to it, and the FBI Coordinator works closely with Supervisory Special Agent Program Managers in the Cyber Division at FBI Headquarters in Washington, D.C.

The public private partnership of InfraGard supports information sharing at national and local levels and its objectives are as follows:

Increase the level of information and reporting between InfraGard members and the FBI on matters related to counter terrorism, cyber crime and other major crime programs.

Increase interaction and information sharing among InfraGard members and the FBI regarding threats to the critical infrastructures, vulnerabilities, and interdependencies.

Provide members value-added threat advisories, alerts, and warnings.

Promote effective liaison with local, state and federal agencies, to include the Department of Homeland Security.

Provide members a forum for education and training on counter terrorism, counterintelligence cyber crime and other matters relevant to informed reporting of potential crimes and attacks on the nation and U.S. interests.

Membership in InfraGard is free.

The benefits of joining InfraGard include:

Network with representatives from other companies that help maintain our national infrastructure.

Quick Fact: 350 of our nation’s Fortune 500 have a representative in InfraGard.

Gain access to an FBI secure communication network complete with VPN encrypted website, webmail, listservs, message boards and much more.

Learn time-sensitive, infrastructure related security information from government sources such as the FBI and DHS.

Get invitations and discounts to important training seminars and conferences.

Best of all, there is no cost to join InfraGard.

All persons who apply to join InfraGard are vetted by the FBI.

Paul Joyal believes that education and continuous updates on the threat are a very important tool in countering the threat of cyber crime and cyber terrorism. Obviously, for critical infrastructure protection, it is important for all Americans involved in these organizations and operations can receive constant training and updated information. In this sense InfraGard is an important initiative that deserves support and encouragement.

Related Articles - FBI, Phishing, Cyber, Security, InfraGard,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
STEPHEN BYE

Stephen Bye is a fiction writer. His most recent novels are a 5-book “The Developer” series which be...more
LEVAL AINAH

I am an internet marketer and also an educator. My goal is to help others who are looking to improve...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
MICHAEL BRESCIANI

Rev Bresciani is the author of two Christian books. One book is an important and concisely written b...more
PAUL PHILIPS

For more articles, blog messages & videos and a free e-book download go to www.NewParadigm.ws your p...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2025, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license