Thursday, February 22, 2024
HomeNewsThe Ministry of Public Security points out the trends of cybercriminals stealing...

The Ministry of Public Security points out the trends of cybercriminals stealing data

In the framework of the International Conference and Exhibition on Cybersecurity on the morning of June 2, leaders of the Department of Cybersecurity and High-Tech Crime Prevention and Control, the Ministry of Public Security shared the trends of cybercrime. data theft in the past. ## Outstanding Cybersecurity Issues The event took place under the chairmanship of the Ministry of Information and Communications, Ho Chi Minh City People’s Committee and other units in coordination. With the theme “Data Safety: Protecting National Digital Resources”, the event aims to become a prestigious forum for policymakers and strategists, leading experts, to meet, exchange and discuss new trends in the field of information security, and propose strategies and solutions to prevent and respond to potential risks in today’s cyberspace. Attending the event, Major General Nguyen Van Giang, Deputy Director of the Department of Cybersecurity and High-Tech Crime Prevention and Control, Ministry of Public Security shared about four current trends in data theft. The first trend is that cybercriminals attack and distribute malicious code to appropriate, steal and encrypt data, thereby using it for fraud and appropriation purposes; debt collection, ransom; serve as a springboard for attacks to escalate and appropriate data containing state secrets on socio-economic, national defense, security, etc. The second trend is cybercriminal attacks through the supply chain of enterprises. enterprise (through its suppliers and partners). Many businesses allow suppliers to access “sensitive” information and data, which may affect the business and its customers when exposed. outside. Mr. Giang also pointed out the trend of criminals attacking administrative server systems and data servers using cloud computing platforms (Cloud); attacks based on vulnerabilities on server operating system platforms, especially servers using Windows Server, Microsoft Exchange Mail server platforms, protocols that support IoT connection of surveillance camera devices , smart home appliances such as TVs, air conditioners… ## Solutions To protect the legitimate rights and interests of organizations and individuals in cyberspace, the Ministry of Public Security advises the Ministry’s leaders , The Government builds a legal system such as the Law on Cybersecurity, Decree No. 53/2022/ND-CP dated August 15, 2022 of the Government detailing a number of articles of implementation of the Law on Cybersecurity… Ministry of Public Security also fight fiercely with cybercriminals; buying and selling personal data (recently, the authorities have prosecuted 5 cases with thousands of GB of data and billions of personal information being traded). In addition, the Ministry also coordinated with units to propagate and guide people to raise vigilance. Also at the event, Mr. Tran Dang Khoa, Deputy Director in charge of Information Security Department, Ministry of Information and Communications recommended 3 principles to ensure the safety of information, personal data as well as that of businesses. , organization. “The first rule is Security First, which means if a system is not secure, don’t put it into use,” he said. The second principle is Security by default, that is, network security must be taken care of right from the beginning, from the design, construction and operation of the information system. The third principle is that experimental information systems that use real data and information should ensure information security like a real operating information system so that there is no risk of information insecurity. personal information, personal data insecurity”. In addition, at the event, the Ministry of Information and Communications and related units launched the Digital Investigation Support Platform (DFLabs), promoting measures and technologies to support timely identification and application. effectively deal with cases of organizational leaks, data breaches, etc.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments