صاحب امتیاز
دکتر ساقی باقری نیا
بنیان‌گذار و مدیر مسئول
جاویدنام ایرج جمشیدی
سردبیر وبسایت
نوید جمشیدی
صاحب امتیاز: دکتر ساقی باقری نیا،    بنیان‌گذار و مدیر مسئول: جاویدنام ایرج جمشیدی،   سردبیر وبسایت: نوید جمشیدی
پنج شنبه / ۲۵ خرداد ۱۴۰۲ / ۱۴:۰۸
کد خبر: 15156
گزارشگر: 2
۱۲۱۲
۰
۰
۱۳
Cyber theory

Behzad Qasemi; Cyberbullying, a cyber anomaly that is more destructive than malware

Behzad Qasemi; Cyberbullying, a cyber anomaly that is more destructive than malware
Behzad Qasemi, an expert in cyber security, has presented a theory about this cyber anomaly with more than 5 years of analysis on cyber bullying or cyber bully, which we will discuss further.

Cyberbullying or cyber harassment are all words that refer to a single action, an action that sometimes leads to the destruction of the legal identities of brands or organizations with a specific goal, and sometimes leads to the destruction of different individuals and people in society.
This model of destructions, which has grown over the last few years, has spread globally due to the spread of social communication platforms and has been able to bring irreparable damage. From the suicides of famous and non-famous people due to cyberbullying, to the closure of companies that have been attacked by their competitors' cyberbullying.
According to Behzad Qasemi, the dangers caused by cyberbullying are more destructive than computer malware, and the difference can be easily weighed by comparing the amount of financial and non-financial damage of a computer malware to the suicides committed by cyberbullies to date.

 

Cyber bullies

 

Cyberbullying or cyber bullies are formed in different scales, each of which has its own behavioral model. On a small scale with surface engineering, it is possible to engage in cyberbullying between individuals with various destructive intentions.
This model of cyber harassment is done by spreading fake and false news, trying to tarnish the credit and discredit people. In this model of destruction, they first combine some correct information about the target along with predetermined lies and spread it in different social levels with the aim of discrediting the target. In the next steps, if they have more private information, they publish private pictures or information such as people's contact numbers, residential addresses, etc., and cause the target person a negative psychological burden.
We may consider these cases simple, but there is a long list of suicides caused by individual cyberbullies around the world who have used these simple methods, a seemingly simple behavior with extremely high destructive power.

cyberbullying

Inciting cyberbullying without information

 

In another part, Behzad Qasemi has examined another component of cyberbullying and it shows the unknowing and inadvertent cooperation of people active in social media.
Qasemi points out that due to the engineered streams of destruction of people or brands that mix false information with a little bit of correct information, the public users do not have the power to separate false information from correct information and the same ignorant people make such information more and more powerful. It becomes destructive currents.
Failure to teach and understand media literacy to the general public at different levels can make the cyberspace of a country fragile and unstable. Cyberbullies cannot be found and neutralized with anti-malware tools and the like, but the best and strongest tool to deal with them is the awareness of all people in a society.

 

Duties of cyber security experts in dealing with cyberbullying

 

Real cyber security experts are people who don't just know how to navigate cyber security tools, but are familiar with deeper concepts of cyber events and have the power to design specific solutions tailored to each cyber threat. Behzad Qasemi describes the duties of a cyber security expert in dealing with cyberbullying on an organizational, individual and social group scale as follows:
A security expert, regardless of a beautiful and attractive job image, must have a different character and perspective compared to other elements of an organization or business company. In addition to mastering cyber security tools, he needs to have a deep view and understanding of cyber security, be aware of the threats of the day and take steps in line with its preparations. Navigating multiple security tools does not make a security expert or engineer, and the future of cyber security will involve more individual cyber security methods than a hard or soft cyber tool.
For this reason, cyber future research will be the most important principle and component to secure a collection, a research that requires an understanding of security. Experts who understand this important concept before the occurrence of incidents will be able to deal with unpleasant cyber incidents before they occur and will prevent financial and moral losses.

https://www.asianews.ir/u/aoi
اخبار مرتبط
طی دهه اخیر با پیداش معماری‌های نوین امنیت سایبری در زیر ساخت‌های صنعتی و تجاری، و ظریب نفوذ بالای شبکه‌های نامتمرکز، کارشناسان متعددی در حوزه امنیت داده نظرات مختلفی را پیرامون امنیت سایبری مطرح کرده اند.
آسیانیوز (وبسایت روزنامه آسیا) هیچگونه مسولیتی در قبال نظرات کاربران ندارد.
ایمیل را وارد کنید
تعداد کاراکتر باقیمانده: 1000
نظر خود را وارد کنید