31.3 C
Bangkok
Sunday, May 5, 2024

You know, it's cold! Revealing the information of Thai people leaked into the hands of cyber thieves.

I know it's cold! “Cyber ​​thieves” are with you. Revealing Thai people's data being leaked into the hands of cyber thieves Recommend that the government elevate cyber security to a national agenda. New cyber law to criminalize data leaks and provide relief to the people.

Asst. Prof. Dr. Noppadol Kannika, Advisor to the Community Happiness Research Institute Foundation, located at Mahidol University. Alumnus of Georgetown University, Washington, D.C., cybersecurity major and cybersecurity course advisor. Siam Technology College revealed that over the past two years, Thailand has had an incidence of cyber attacks, system hacking and data theft of airlines in Thailand. Customer information of mobile phone service companies Financial institution banking information Hospital VIP patient information Health applications As a result, the personal information of almost the entire country, more than 50 million people, has fallen into the hands of cyber attack groups (Kill Chain) and cyber thieves. The personal information of citizens is then classified into groups. Groups with high potential, namely those with a lot of capital, will be led to hack into the system with even more advanced technology because It is worth the investment if you are being held to a cyber ransom or having your entire online assets wiped out. As for the group with low potential, that is, having little capital, it will be used in at least three directions: The first approach is It has been used as a link to the negligence of the very wealthy. The second approach is to penetrate the network layer by layer and gain access to the cyber systems of organizations with large amounts of capital as well. And the third way is Sold to the movement to destroy national security in order to gain access to the mental lives of the masses and conduct in-depth analysis (Analytics) to instigate trends that destroy national security. Shaking up the nation's main institutions This weakens opposing politics and so on. The government should urgently put cyber security on the national agenda. There are at least three approaches. The first approach is to use international cyber security standards. The second approach is Use the strategy of taking it with salt, which is to use Kill Chain and then use Kill Chain back by enforcing the law to clean it up. And the third way is Enter to enhance cyber security awareness and skills for the organization. Institutions and the general public Because the cyber thief is with you. For the first and second approaches, it can be concluded that international cyber security standards such as NIST of the United States, ISO 27000, ISO 31000, and GDPR of Europe should be applied to improve the PDPA law and Thailand's cyber security law in a context consistent with Thai cultural society And the second way is cyber reconnaissance Creating weapons to destroy cyber thieves Hacking the cyber thieves' systems and taking over the cyber thieves' organization and then enforcing the law. Today, we should consider the third option to solve the cyber thieves problem, which is to enhance cyber security awareness and Manage risk to prevent cyber thieves from category A to category D as follows: a) Principles, guidelines, and theories of cyber security. Get to know the cyber in our hands, its meaning, the principles of maintaining cyber security. In a way that can identify the challenges, context, and goals of securing yourself and your devices in the cyber world, both for individual citizens and for organizations that possess personal data of citizens. b) Comprehensive risk management It begins with the recognition that Where are the risks? Where does the threat come from? Why might we be the target of an attack? Study how criminals think, the techniques and tools they use. The next step is to assess and identify the risks in ourselves and the devices we use. Leads to the establishment of a safety control system. Attack detection Solving problems when they occur Disaster recovery and planning ahead The essence is the ability to protect. Detect and solve problems c) The protective role of each role and individual in life and work. Risks from trading partners and partners Emphasis on defense elements, processes, and technologies that can be used to enhance self-defense capabilities. d) Overview of cyber security design. The “architecture and mindset” is the big picture of system protection. Enterprise technology and information Can be applied to the user's device Focus on prevention from the design of security architecture. Protection and surveillance of equipment in use And end-to-end data security is from the user's origin. Go to service system Until the destination is the user or the person who is the destination of the communication. In this sector, the focus is on cyber security trends. The rapid evolution and change of the attack landscape and a framework for adapting and dealing with criminals. Develop attack techniques and tools quickly and at all times in order to protect national security. National institutions National interest and safety of the entire country. However, not everyone is a target for cyber thieves. But how do we know if we are being attacked or not? Regardless of whether the answer is yes or no. Cyber ​​threats are a risk to national security. National institutions national interest and of each citizen Whether consciously or unconsciously If anyone is interested, please contact to join the said course. You can fill out information at https://www.research.net/r/cybersecurity-courses or contact the Community Happiness Research Institute Foundation, located at Mahidol University. www.richlead.org call 095 471 4444 The Foundation is a non-profit organization. FollowGood contentLike this on Facebook: https://www.facebook.com/innnews.co.th

Twitter : https://twitter.com/innnews

Youtube : https://www.youtube.com/c/INNNEWS_INN

TikTok : https://www.tiktok.com/@inn_news

LINE Official Account : @innnews

Source

Previous article
Next article

Latest Articles