01.06.2020 Views

Cyber Defense eMagazine June 2020 Edition

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

carefully prepared and conducted cyber operations could cause some kind of drama and trauma in the<br />

business arena. Even the most experienced IT security professionals are not fully immune to these<br />

scenarios as they need the huge concentration to take control over their irrational drives and let their<br />

rational thoughts get their place in their awareness. So, the question is what the chances of the common<br />

employee to handle all those are. Practically, any competitive employer would try to offer the suitable<br />

working conditions to all its staffs, but the bad guys simply must keep us in fear – so, if anyone wants to<br />

use anyone in the business sense, he should provide some kind of support to all about all unwanted and<br />

unpredictable situations and events coming on.<br />

Assumption #5. The traumatic syndrome is a manifestation of the negative emotions about some<br />

event, person or relation from the survived experiences.<br />

Explanation #5. Dealing with the crime scene could be the quite unpleasant experience. Even the law<br />

enforcement professionals tackling some crime in the physical environment could not be fully resilient to<br />

those insights. Apparently, they need to get developed the stress management skills at some level, but<br />

sometimes it’s so hard to cope with all the challenges of such a career. The cyberspace itself could also<br />

get correlated with the crime scene and indeed, so many high tech offenses have been committed there.<br />

The cyber defense specialists who would assure the digital devices being in the network would cope with<br />

some amount of the stress management capacities, but the common employees not being that familiar<br />

with the IT world would easily become the victims of the cybercrime and hacker’s attacks, so they could<br />

develop the quite inconvenient condition, so far. The traumatic syndromes are frequently linked with the<br />

victims of the crime and those persons could struggle about some survived experiences from their past<br />

getting correlated with the persons, events or relations on. The masterminds of the cybercrime and high<br />

tech terrorism are so dangerous guys providing so harmful strategies and tactics in order to make the<br />

psychological impact on their victims. In addition, these malicious actors would see the ordinary people<br />

as their targets and especially in the sense of the terrorism – there would be a lot of offenses that should<br />

push the victims into the crisis. The cybercrime groups would commonly work for the profit, but as the<br />

armed robbery could be the nightmare to anyone being present on the crime scene – the similar case is<br />

with the cybercrime victims. They could stay deeply frustrated about what happened in their virtual<br />

environment. On the other hand, the cyber terrorists are far more frightening for a reason they would try<br />

to conduct the cyber operation in order to shake someone’s confidence or leave so deep impact on his<br />

mental health condition. In other words, it’s not only about who would annoy whom – in the case of the<br />

terrorism, the bad guys would go far more beyond the typical bullying and they would literally attempt to<br />

intimidate their victims, so far. In such a case, the fear could go deeply into your bones and if you choose<br />

to attend your doctor, he could diagnose you with some traumatic syndrome. These sorts of attacks are<br />

happening every single day at so many places and it’s important to build on the adequate response<br />

techniques and methodologies to these kinds of crimes. The cyberspace is never safe enough and does<br />

not matter how hard the IT security professionals would work to assure all of us – the bad guys would<br />

always find the holes in the system to approach us. So, if we talk about the traumatic experiences, we<br />

could mention so obvious case of losing data and passing through so requiring procedure in order to<br />

prove that you have done something that day, but you remained without such an effort due to the hacker’s<br />

operations. In the business sector, we all would cope with some rules and follow the strict behavioral<br />

codex that would not let us getting so personal with our co-workers, so sometimes it’s so complicated<br />

explaining your boss that you have worked so hard to produce something and all of it just vanished in the<br />

sub-second period of time. The cybercrime investigation would probably find the clues for your story, but<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 136<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!