
.
.
.
.
Introduction
.In previous articles WE discussed already about the responsibility that everyone is responsible for a safer and more secure Internet, that the weakest link in the security chain is the human and I provided you also with some great FREE tools to get protected, as well that I gave you advice such as learning to become “Proactive -Thinking“, “Critical-Thinking” and I provided you also a plan on how to learn to get a maximum protection in a week time by applying protection on a step by step guide, as different other important articles… Just check the navigation menu on right hand side to find out, please…
BUT, I agree with people who are telling me that they can’t see the dangers nor can they touch it! Hard to believe what I teach you here about Cyber-Security, isn’t it!? That is probably ALSO what the IT-Security professionals thought and they developed real time online maps where people can follow each day in real time the attacks worldwide. WE need to know ALSO about DDoS-Attacks, attacks WHO are done through OUR own computers and devices ( BYOD, mobile devices…)
Learn more about DDoS attacks below:
- Of course, it’s not just the owners of the websites themselves who are the victims in this kind of online bombardment. Regular computer users suffer too – both by not being able to visit particular sites, but also by having their own computer participating in the attack.
So I will present to you those important and very interesting animated, interactive maps and you will realize (I am sure about…) how important it is to have a good protection on any device connecting to the Internet, so let’s go…
.
Image credit ===> http://map.norsecorp.com/#/ <===
.
This MAP shows ALSO the ports, very interesting!
.
.
===> Denial-of-service (DDoS) attacks in real time <===
.
Real Time Web Monitor
.
Check here to go to the website ===> AKAMAI Real Time Web Monitor <===
.
Should I give you more explications? I don’t think so, just go to the website by clicking the above link and try it out! Make some ===> PracTICE <=== 😉
.
THE F-Secure Globe – See Malware Detections In 3D And In Real Time
.
Click the link here to go to the source ===> F-Secure Globe
.
Read more about the project here:
.
Kaspersky Cyberthreat Real-Time Map
.
Click the link here to go to the source ===> Kaspersky Cyberthreat Real-Time Map <===
..
Overview of current cyber attacks (logged by 97 Sensors )
.
Click link ===> Real Time Overview of current cyber attacks (logged by 97 Sensors )
.
ThreatMetrix CyberCrime Threat Map
.
Click the above image to access the service, please.
.
CIRCL map – potential network attacks targeting IP addresses in Luxembourg
.
Click ===> CIRCL map – potential network attacks targeting IP addresses in Luxembourg
.
As already most of you know that I am from Luxembourg (Europe), so above ALSO our country’s attacks in real time provided by CIRCL and CASES.
.
Who is CIRCL?
CIRCL (Computer Incident Response Center Luxembourg) is the national Computer Security Incident Response Team (CSIRT – CERT) coordination center for the Grand-Duchy of Luxembourg. A CSIRT (or CERT) is like a fire brigade which can react when computer security incidents occur.
CIRCL is operated by SMILE (“security made in Lëtzebuerg”), a State funded “groupement d’intérêt économique” (GIE), designed to improve information security and create new opportunities for Luxembourg.
.
.
.
![]() The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure) |
.
Stay tuned for next free courses and tutorials
.
.
Philip V. Ariel (@PVAriel)
July 27, 2013 at 10:33 am
Hi Gust,
Good to be here,
I am sorry, a bit late,
Hey, this looks like the Knol pages!!!
Well Done!! Gust
Keep inform
Best Regards
Phil