ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

How Criminals Use Google Maps Street View to 'Case The Joint'

How Criminals Use Google Maps Street View to 'Case The Joint' | ICT Security-Sécurité PC et Internet | Scoop.it
Learn how criminals are using Google Maps Street View to help them 'case the joint' before they rob your house.

 

Criminals can use Google Maps Street View to:

Locate entrances to buildingsDetermine locations of security cameras, gates, etcFind good hiding places such as in shrubs and other areasFind holes or weak spots in perimeter fencesLocate utility boxes (power, water, gas, etc)See what make, model, and color of vehicle a building occupant or resident drivesSee if locks, guards, dogs, etc, are normally presentMeasure distances between objects (using Google Earth) to determine how quickly it would take to run or drive from one point to another.
Gust MEES's insight:

 

One more point to learn about Cyber-Security, on an holistic view...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

First holistic security platform unveiled at Black Hat

First holistic security platform unveiled at Black Hat | ICT Security-Sécurité PC et Internet | Scoop.it

“In the age of Stuxnet and Flame, organizations need the visibility and response capabilities CIRT provides,” commented Jason Mical, Director of Network Forensics at AccessData. “It’s not just another platform that provides a mound of data to sift through. It delivers the threat intelligence you need and it remediates.”

 

Using CIRT, organizations can continuously monitor network traffic, computers and removable media to detect threats and more quickly acquire actionable intelligence in the event of a cyber incident. In addition, with CIRT’s “check in” feature, CIRT users can monitor the laptops of traveling employees, even when they are not logged on to the organization’s network.

 

Read more:

http://www.net-security.org/secworld.php?id=13327

 

No comment yet.