{"id":193854,"date":"2017-05-20T06:29:17","date_gmt":"2017-05-20T10:29:17","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/why-nigerian-cios-should-care-about-the-dark-web-itweb-africa\/"},"modified":"2017-05-20T06:29:17","modified_gmt":"2017-05-20T10:29:17","slug":"why-nigerian-cios-should-care-about-the-dark-web-itweb-africa","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/why-nigerian-cios-should-care-about-the-dark-web-itweb-africa\/","title":{"rendered":"Why Nigerian CIOs should care about the dark web &#8211; ITWeb Africa"},"content":{"rendered":"<p><p>Published on 19 May 2017                            By Wale Ogunyemi<\/p>\n<p>    The dark web is an increasingly lawless place where    cybercriminals trade hacks, passwords, and stolen corporate    data. While international regulation was sought to stamp out    such practices, the online environment that allowed the    Internet to spread so widely and so quickly has also allowed    the dark web to stretch even further, and carve out new places    to hide and operate from.  <\/p>\n<p>    As the Nigerian economy expands, and more multinational    businesses move into the region, the country's ever-increasing    cybercrime statistics are a key concern. The Cyber Security Experts    Association of Nigeria (CSEAN) has gone as far as to state that    the Nigerian government is ill prepared to face cybercrime in    2017 and beyond.  <\/p>\n<p>    The so-called dark web, buried in the deep web, utilises a    different protocol and is not indexed by mainstream search    engines. Users go about their business anonymously, their    locations protected by encryption and a host of privacy    features baked into the free and readily available Tor browser,    which is the most common way of accessing it. This makes it a paradise    for cybercriminals.  <\/p>\n<p>    Dark web threats loom in today's complex, ever-changing    environment, for companies all over the world. To shore up    their own cyber defences, CIOs need to take a more proactive    approach to monitoring threats in its hidden depths.  <\/p>\n<p>    Exposing these illicit transactions is almost impossible as    many take place in invitation-only forums and are authenticated    to stop anyone tracking them. However, it seems that even the    dark web is not invincible when it comes to vulnerabilities.    The hack of Freedom Hosting II, the largest host of dark    websites, shows that there are holes in the deepest abyss of    the Internet.  <\/p>\n<p>    According to a Palo Alto Networks report (2016), the Nigeria    419 cybercrime gangs specialise in using advanced malware tools    common with sophisticated criminals and espionage groups. To    illustrate the threat that cybercrime poses to Nigerian    individuals and businesses, the Leadership.ng (2016) reported    that Nigeria loses nearly half-a-billion dollars to cybercrime    annually.  <\/p>\n<p>    The publication also predicted that in 2017, five categories of    cybercrime would dominate the country: the CEO email scam,    ransomware, assisted online kidnapping, cyber bullying, and    impersonation.  <\/p>\n<p>    In addition, Alphabay, reputably the biggest dark web    marketplace, recently issued a statement on Pastebin confirming    that it had rewarded a hacker after they had found bugs that    had enabled them to steal 218,000 unencrypted messages between    buyers and sellers. This hack highlights the scale of business    being done on the dark web and underlines why CIOs need to    understand its dangers and minimise their organisations'    exposure.  <\/p>\n<p>    It could be argued that these vulnerabilities in the dark web    makes it easier for ethical hackers to get a better view of    what data sits where, while making the dark web a more    dangerous place for cybercriminals to operate. In this case    stolen data, which included names and addresses, were handed    over to law enforcement agencies, but only a minute percentage    of stolen data is handled responsibly.  <\/p>\n<p>    Take Yahoo, for example. Data from a breach involving one    billion Yahoo accounts back in 2013, which the company only    went public about last year, is still being openly sold on the    dark web. The stolen data for sale includes personal data    including names and birth dates.  <\/p>\n<p>    Scanning for threats  <\/p>\n<p>    CIOs are beginning to understand that a more proactive approach    must be taken to protecting their organisations from cyber    crime, which includes scanning the dark web for threats.  <\/p>\n<p>    However, due to the make-up of dealings and the trust required    between buyers and sellers on the dark web, human intelligence    is essential in monitoring the dark web - automated tools alone    are not enough.  <\/p>\n<p>    Granted, monitoring the dark web is an enormous task. It    requires a global team of cyber experts to analyse massive    volumes of data and linguists who can impersonate    cybercriminals to gain their trust.  <\/p>\n<p>    Threat monitoring the dark web gives CIOs intelligence that can    act as an early warning system. It can uncover, for example, if    cybercriminals are planning an attack, so the organisation can    pre-empt a breach and take immediate action to protect their    digital identities and servers.  <\/p>\n<p>    One of the biggest threats of the dark web is that dissatisfied    employees can use it to sell their services to cybercriminals,    according to Avivah Litan, VP distinguished analyst at Gartner.    A report by RedOwl and InSights claims that the active    recruitment of insiders in the dark web is growing fast, with    insider outreach going up nearly 50 percent from 2015 to 2016.  <\/p>\n<p>    The report maintains that the dark web has created an active    market for employees to easily monetise insider access. It says that    sophisticated cybercriminals are using the dark web to find and    engage insiders to help them get malware over organisation's    perimeter security and trigger it.  <\/p>\n<p>    Gartner's Litan says that its clients blame the ease in which    discontented employees can download the Tor browser and log    into the dark web. Litan accepts that insider threats are a    sensitive issue and that companies do not want pry and encroach    on employee privacy, but at the same time must protect their    business assets. \"Organisations must be the judge of how high    their risks are and how far they need to go fighting it,\" she    says.  <\/p>\n<p>    The RedOwl and Insights report recommends that enterprises    \"create, train and enforce consistent security policies while    protecting employee privacy\". This includes making sure    employees and contractors understand penalties involved in    insider action on the dark web.  <\/p>\n<p>    The dark web provides a rich source of cyber threat    intelligence for any CIO looking to bolster their cyber    defences. By monitoring its inner workings, organisations can    find out what data or IP may has been stolen, or leaked by    insiders to use against them.  <\/p>\n<p>    Tor, however, has made no secret of the fact it is doing more    to safeguard its users this year, making the dark web even more    difficult to penetrate. This will include sandboxing Tor at the    application level and investigating the use of quantum    computing.  <\/p>\n<p>    There isn't an organisation out there who can claim it will    never be compromised. Threat detection is paramount.  <\/p>\n<p>    If CIOs know what they are up against, they can take the    appropriate steps to protect their organisations.  <\/p>\n<p>    Having an ear to what is being discussed in the chambers of the    dark web is invaluable in the war against cybercrime.  <\/p>\n<p>    By Wale Ogunyemi, Senior Solution Architect for    Orange Business Services.  <\/p>\n<p>      ALSO ON ITWEB AFRICA    <\/p>\n<p>                    GE executive speaks on energy resource management on the          continent.        <\/p>\n<p>                    Bruce van Wyk director at PaySpace writes that          accountancy practices have a lot to gain from mobile,          cloud-based technologies.        <\/p>\n<p>                    ISPA says attempts to eradicate hateful\/harmful content          from social networks are often hindered by the global          nature of these networks.        <\/p>\n<p>                    Wale Ogunyemi, Senior Solution Architect for Orange          Business Services, says threat monitoring the murky world          of the dark web empowers CIOs to act.        <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.itwebafrica.com\/home-page\/opinion\/237873-why-nigerian-cios-should-care-about-the-dark-web\" title=\"Why Nigerian CIOs should care about the dark web - ITWeb Africa\">Why Nigerian CIOs should care about the dark web - ITWeb Africa<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Published on 19 May 2017 By Wale Ogunyemi The dark web is an increasingly lawless place where cybercriminals trade hacks, passwords, and stolen corporate data. While international regulation was sought to stamp out such practices, the online environment that allowed the Internet to spread so widely and so quickly has also allowed the dark web to stretch even further, and carve out new places to hide and operate from <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/why-nigerian-cios-should-care-about-the-dark-web-itweb-africa\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-193854","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193854"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=193854"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/193854\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=193854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=193854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=193854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}