ALL >> Computers >> View Article
French Finance Ministry Suffers Cyber-attack
Recently, French government confirmed reports of cyber-attacks on the country’s finance, economy and unemployment ministry since December last year. The attacks were allegedly targeted at information related to France’s presidency of Group 20 (G20) countries. Cybercriminals intruded into around 150 computer systems at the Ministry and gained unauthorized access to several confidential documents.
Computer systems and networks of government departments and ministries face frequent attacks from political hacktivists, organized cybercrime syndicates and foreign spy agencies. In this case, the attackers launched sustained attacks for over 2 months on the French ministry. The attack is reported to be the first cyber-attack of such magnitude on any French government body. Documents breached also included information on international economic affairs. The ministry is situated in Bercy, in 12th administrative division of Paris. Information security professionals are investigating the attack. Cyber-attacks are often traced to servers in China and Russia, but intelligence agencies find it difficult to establish state involvement ...
... in attacks. Cybercriminals may gain unauthorized control of computers based in different countries and use them for launching attacks on targeted agencies.
G20 economic bloc consists of nineteen nations from different regions of the world and the European Union (EU). Leakage of classified documents pertaining to national and international agencies may not only cause strategic loss, but also threaten the economic and national security of the concerned countries. The recent WikiLeaks exposure, attack on industrial installations across the world through Stuxnet worm, repeated attacks on websites of government and private companies by anonymous group, attack on Canadian government bodies and more recently on South Korean government sites highlight the imminent threats in the cyber space. There is also a danger of countries using the cyberspace for information warfare against rival nations. The threat of corporate espionage and use of cyberspace by terrorists to disrupt critical infrastructural facilities also looms large. The vibrant threats emanating from the Internet require proactive action. Therefore, cyber education assumes high significance. Online computer degree and e-learning programs may help in creating cyber security awareness among employees.
The growing number of cyber threats has led to increased demand for cyber security experts certified in IT masters degree, penetration testing, computer forensics, security audit, ethical hacking and security analysis. Introducing online technology degree programs in Universities may help working security professionals to upgrade themselves with latest tools, procedures and technologies.
Add Comment
Computers Articles
1. What Identity Governance Really Means In Modern EnterprisesAuthor: Mansoor Alam
2. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates
3. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma
4. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions
5. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights
6. Power Bi Tutorial For Beginners: Learn Business Intelligence Step By Step
Author: Tech Point
7. Spark Matrix™: Data Governance Solutions
Author: Umangp
8. How Prediction Market Software Development Is Transforming Data-driven Decision Making
Author: david
9. Naming Development & Management
Author: brainbell10
10. Mysql Database Development & Management Services
Author: brainbell10
11. Mongodb Development & Management
Author: brainbell10
12. Spark Matrix™: Conversational Automation
Author: Umangp
13. How Care Home Software Helps Improve Daily Operations In Care Homes
Author: Centrim Life UK
14. Pc & Tech Stores: Latest Trends In Hardware And Accessories
Author: Jack Williams
15. The Infozed Blueprint: Powering The Modern Workspace
Author: suma






