Thursday, December 12, 2019

Policing Cyber Crime Cyberspace Infrastructure

Question: Describe about the Policing Cyber Crime for Cyberspace Infrastructure. Answer: The previous research conducted on the existing subject reflects that the cyberspace and its underlying infrastructure are highly vulnerable to the wider range of risk stemming from the cyber threats and hazards. In the circumstance of the similar statement, it is inferred that the sophisticated cyber actors and the nations states tend to exploit the vulnerabilities if the technical manipulations[1]. Therefore, the current records signify that the percentages of the cyber securities in the global context have increased at a rapid pace. The cyberspace is particularly difficult to secure due to the discrepancies like the linkage between cyberspaces and the physical system. Moreover, complexity in reducing the vulnerability and the consequences in the complex cyber networks has also been the primary reason which tends encourages the occurrence of the cyber crime. The worldwide cyber security market is defined by the market size that is estimated between the ranges of $77 billion in 2015 6 to $ 170 billion in 2020[2]. The Venture Capitalist firms have proclaimed the indifferent recent hundred-million dollar plus cyber security speculation funds during the year 2015. The corporate investors have been identified as the major funding sources for the cyber security start-ups, alongside the Venture Capitalist firms. For example, the US governing authority has managed to spend $100 billion in the cyber security matter. The past records show that the government has kept a budget for $14 billion for the cyber security purpose[3]. The previous records reflect that the cyber attacks are costing the ventures $400 - $500 billion per year, it does not even include the large percentages of the cyber attacks that are not even registered. Moreover, the Heatbleed has been recognised as the catastrophic security bug, which led the entire IT (Information Technology) to experience a strong by the end of 2014[4]. Therefore, the current study evaluates on the concept of privacy that has become redundant of the present age. It aims to finds out the security measures the administrative authority is taking to increase the cyber-related standards. The government has set up a cyber forensic training in different regions. In the collaboration with the Data Security Council, the cyber forensic labs have been set up to track the exact rate of the cyber discrepancies. Different organisations are taking the initiatives of providing the online training to the employees to increase the expertise regarding the data security measures. The specific approach can benefit the enterprises to understand the cyber threats and the online frauds[5]. It has been inferred that the government has started working with the leading industry partners to advance the free e-learning courses to enlighten the internal members of the organisations to increase the awareness regarding the cyber-related threats. In the different situation, it has been assessed the competitors manage to introduce the similar types of products in the market at a lower price range[6]. The specific action occurs due to the ineffective cyber security measures within the organisations. The data and the products related formulas often get leaked in the market. Therefore, the competitors receive the benefits of receiving better reactions with fewer percentages of efforts. The past records signify that the government of different regions have managed to launch the BIS Cyber Essentials accreditation scheme in the year 2014. The specific installation helps to demonstrate the cyber resilience concept. The specific scheme has been designed to support the basic set of the security standards to prevent the major forms of the common attacks[7]. The strategy of introducing the accreditation also leads to encouraging the consumer confidence within the business. In 2014, the digital sector witnessed the launch ofCyber Streetwise,the campaign that is primarily intended for improving the cyber security amongst the public and SMEs (Small Medium Enterprises). The specific set of the campaign might extend to facilitate the larger businesses for reducing the adversities of the online fraud. Law and accountancy enterprises are the attractive sources of information for the criminal based activities. The past researches conducted by the professionals reflect that the property information, sensitive client data and the commercial data are majorly targeted. The survey conducted in 2014 by Information Security Breaches, bespoke by the Department for Business, found that 81% of large enterprises and 60% of small firms have been a victim of the security breach during the tenure of the previous year[8]. The average expenditure of an enterprises' worst breach has been between the range of 65,000 and 115,000, for the small businesses. The leading Giants have to invest between the figure of 600,000 and 1.15 million for large organisations. With the emerging speed of the internet access, the attack attempts have also increased simultaneously. The existing report of the current digital situation states that the maximum percentages of the population are exchanging the conversation through the internet mediums[9]. The social networking sites have become the most efficient and the widely used platforms that increase the communication methods between the individuals. However, high percentages of the population trends have grown excessive knowledge regarding the programming language and the digital specifications. Therefore, the certain percentages of the populations are leading to make misuse of the internet based knowledge. During the year 1989, Robert Morris set free the fist computer virus on the internet platform, which led to destroy several computers in the similar point of time[10]. Luckily, in the late 80s, the internet has not been a high part day-to-day life as it is now, and thus, the effects have not been pronoun ced as the current period. The worm virus has become the first crime, which has been convicted under the legal statement of 1986 Computer Fraud and Abuse Act.The virus case has managed to gain the publicity after a certain unleashes of the early viruses. The records reflect that the worm had been unleashed in the early 1980s, which is similar to the Brain virus of the year 1986. The recent data signify that the credit card details have become extremely vulnerable due to the huge amount of online banking and shopping transaction. The data has become extremely vulnerable. The credit and the debit cards are almost used by 70% of the worlds population[11]. Moreover, the populations are always remaining in a certain rush, which often tends the majority of the users to fail to implement the security process. Therefore, due to the certain discrepancy in the security process, the hackers get the opportunities of misusing the e-information. The final users become the victim of the cyber crime. The governing authorities are taking different advanced measures to stop the cyber-based crimes in the similar context[12]. The research was done by certain scholars conveyed that the UK government has taken several initiatives to increase the cyber security measures. For example, the UK government has already conducted the Cyber Streetwise camping to reduce the cyber-related crimes[13]. The specific campaign has been initiated to spread the precautionary measures, which can often increase the awareness amongst the population. The specific campaign has involved various IT professionals to design the event layouts. The specific aspects have helped the governments to increase the awareness by promoting the further probable mistakes that often leads the populations to be the victim of the cyber crimes. Moreover, the government has already set a target of 2 billion of the cyber security exports in the year 2016. The specific initiation has been taken by forming joint venture initiatives by the cyber growth partnership to establish the cyber security business cluster in the internal region. The government has also promoted the cyber security expertise in the international market to reduce the discrepancies. A clear trend of cyber attack has emerged in the past couple of years. The cyber attackers are increasingly target the important data such as business deals, mergers, property deals and the contracts. For an example the point of sale interruption, denial of service attacks and the web application attacks are majorly responsible for 76% of cyber security incidents in case of the retail industry [14]. Inference can be drawn from the latter context that the figure of expenditure in military protection around the web application attacks, payment card duplication and rejection of service attacks, most of the financial services firms can cover 75% of cyber security incidents[15]. Supervisory Control and Data Acquisition (SCADA) system are one of the major methods in cyber security risk assessment. The SCADA is a type of Industrial Control System (ICS) that controls the process in the industrial sector[16]. This process is helpful to identify the threats that enable most of the security att acks. It has been identified that there several threat patterns that the users faced due to the issues of cyber security. Majority of the threat patterns are as follows: Malware aimed Insider misuse Physical theft or loss Web app attacks Denial of service attacks Cyber spying Point-of-sale interruption Payment card skimmers Apart from this, there are several errors such as sending an email to the wrong personnel. While most of the organisations are deteriorating to keep up the cyber crime, the latest report on cyber crime indicates that big data analytics can reduce the security risk. By adopting the big data analytics into the security risk management, the organisation can turn the wave[17]. Therefore, this approach becomes helpful to the organisation to identify contravene for reducing the time of attackers. This process is helpful to infiltrate the data which is undetected. The cyber spinning is more complex and diverse in nature is continuously increasing since 2007. For an instance, since 2013, China continues to lead in cyber spinning as the most of the website faces the espionage activity [18]. Adding to this, the Eastern Europe region faces the 20% cyber spinning attacks. It has been observed that the Distributed Denial of Service (DDoS) attacks to make the networks and subsystem inaccessible so that the website becomes useless. This type of problems are very frequent to the retail, financial services, information, professional and public sector industries[19]. The NetFlow protocol originated in the 90s is an essential for networking equipment like the routers in order to precise the information on IP (Internet Protocol) activity. MTD system theory is based on the concept of a configurable system which is defined as the configuration parameters. Each configurable system is the aggregation of the current system for all the configuration parameters related to the MTD system. As per the scholars, an MTD system allows to modify the values of the configuration parameters within the configuration state[20]. The MTD system theory is an adaptive system that captures the goal both for the operational and security measures. It has been speculated that adaptations are defined as a sequence of actions to change the system from the starting configuration state to another suitable configuration state. The fundamental system definition of MTD system theory is varied for different cyber security circles. Configuration is one of the first steps that set the valid states of MTD system. The concepts of diversification indicate the diversified system spaces while configuring the system[21]. The randomization helps to randomise th e techniques to adapt the system configuration for improving the system effectiveness. Furthermore, the success of the cyber attack theory depends on its information possessed by the attacker when the attack is commenced. Thus, it has been revealed that information is one of the essential elements of the theory of any cyber attacks [22]. The MTD system theory includes the notion of the configuration of the parameters that incarcerate the information about the configuration of the computer system. Cyber Attack Theory defines the attacks and the attackers knowledge regarding the information parameters [23]. The association between an MTD system's configuration parameters and attack's information parameters, the system administrator, can officially analyse the interactions between the attackers and MTD systems. The operational cyber security theory describes how an organisation develops and maintains a measurement of a program regarding the security. For an instance ISO/IEC standard, 27000-4 and NISTs security metric guide are the potential examples of operational cyber security theory. Adding to this, a general qualitative models has presented over there to describe the set of variables and the required concepts in the security domain [24]. The CORAS consists with a metamodel over the security field to support the security system. For an example, it has been identified that the qualitative model has a special attention on SCADA (Supervisory Control and Data Acquisition) systems to control the complete energy system. Thus, an inference can be drawn that these methods, security metamodels, technical references and the conceptual can support the cyber security assessment program [25]. It is also helpful to define the operational cyber security metrics. Therefore, it can be inferred that IT sy stem cyber security is also important to assess the cyber security measures. The examples of the operational cyber security theory include attack trees, threat trees, protection trees and defence trees attack [26]. Furthermore, the theory of combined cybers security values of a single system to a value for a different system-of-systems. It works as a network and actual trees together for the attack success probabilities. The operational cyber security theory has an inherent quantitative constituent that makes the metrication and estimates the required effort to achieve an attack in a straightforward way. The rapid technological development has provided a vast area of new opportunity and the potential sources for all types of organisation. The Cyber Security is the protection of the system, networks and the data in cyberspace. It is essential to preserve the critical security system of the business. It has been observed that the cyber security industry is growing rapidly. More malware, viruses are being launched by the hackers and specialists day by day [27]. The current statistics indicates that 230,000 new malware samples are being launched on a regular basis [28]. Thus, the more potential resources are being deployed for the counter cyber attacks. The following facts describe the current cyber security related information and problems to define the current information security landscape. Amongst the several facts of cyber crime, one of essential facts is the estimated annual cost for the cyber crime which is almost up to 100 billion dollars. These types of monetary fund come to the hackers by targeting the corporations, banks, other wealthy celebrities and even the individual general users. The Zero Day attack is one of the most powerful malware warnings that can be very dangerous for the users [29]. In this current scenario, it has been guided by the different scholars that the users require to keep up to date the software and the news regarding the cyber security system. It is expected that this process would be helpful to identify the cyber attack for securing the financial and confidential information. Furthermore, the most expensive computer virus is MyDoom which was identified in 2004. This is one of the most expensive fastest spreading email worms across the world. It has been speculated that the estimated financial damage for this virus is $38.5 billion [30]. MyDoom is transmitted via email and hidden as spam email. The cybercriminals get access to the personal computer through this virus. In the addition, the social media is the other option that is the most favourite place for the hackers. The in-depth statistic reflects that more than 1.6 billion social network users are there in the worldwide and more than 64% are the users of the internet and have chances to get infected though email worm and viruses [31]. The link-jacking, phishing and the social spam are the most unwanted problems faced by the users while the people used the social media option. The past scholars advised that do not click on any strange link could be the feasible decision to avoid the cyber attack on soc ial media. Policing in cyber security is significant apart from the Policing Suite of programmes. This programme helps the student with a strong and predominant grounding in policing. The policing suit provides the opportunity for each of the students top specialise in police and policing associated with the related context. As per the opinion of the previous scholars, this is helpful to enable a more intensive understanding regarding the current context. Policing is important for the students to learn the emerging trends in the cyber crime and the international, borderless crime [32]. The evidence-based policing, crime scene and the police governance practices has to be understood by the learners. As per the knowledge of the practical example, the students are encouraged to become volunteers within the criminal justice system. For an example, the opportunities include the volunteering in local police organisation, special constable and the other offenders within the community. The local and st ate level cyber officer would have a degree in cyber security to handle the forensics and the other information networking. The telecommunication factor is one of the minor justices in this type of study. The computer networks and the technology enable the officers to create and maintain the protect law enforcement database. This contains the vital information for avoiding the cyber attack. On the other hand, the Telephony-Denial-of-Service attacks (TDoS) are the other function that maintains the standard DoS attacks. The cyber criminals follow this type of attack to extort the government agencies. Furthermore, the cyber hackers are being successful by exploiting the poor security level. The poor tracking opportunity with the spyware can create a fake employee IDs to gather all the required information. The current statistic on cyber crime indicates that 60% of the businesses are losing the valuable IP and the associated records for the problem of cyber crime [33]. The Internet of Things (IoT) introduces a new cyber security challenges and the vulnerabilities for the aircraft. In this current scenario, the annual IBM X Force Cyber Security Intelligence Index report indicates that the business industries are the most affected region for the cyber attacks [34]. The key factors that enable the attackers is the current threat landscape. The team of IBM X Force Cyber Security intelligence works dedicatedly to keep the records of the clients and the latest cyber security threats. In the context of Cyber Security Policy, the National Research Council Computer Science and Telecommunication Board provide the nexus of cyber security policy and the required public policy. The six major findings provided in the informed discussion possess the policies and the events to avoid the cyber crimes [35]. In this regards, it has been speculated that the US has invested a lot amount of money for a proactive Public Policy per cyber security. Monitoring applications with access to the data would be the best effective methods to improve the cyber securities. It has already been assessed that the applications create an enormous impact on the software. It tends to provide the business with the necessary required for the functioning and productivity purpose. The application also bears the sensitive data at risk[36]. When the IT security attempts to defend the critical information, it usually tends to include by raising up the firewalls and edifice the infrastructure around the data that the enterprise prefers to protect. After which the IT experts provides the applications access to this data. The moment the hackers look attempts to hack the data, the security measures in the database system creates an alert. This often tends to minimise the risk of the data-stealing action. A collection of the detailed logs is other precautionary measures that often tend to protect the cyber leakage actions. It is extremely important to make sure that the IT network is secure[37]. The management of the enterprise needs to be very careful enough to hand over the IT related works to the concerned employee. Since, the IT expert would have a detailed knowledge regarding the cyber transactions and the overall data of the firm. Therefore, the expert needs to receive the advice of creating an access control of the entire internal database. By establishing the specific access controls for the entire user base, the entire data can be maintained within a strict security measure[38]. Finally, the users would have the choice of expositing the sensitive data to the before the preferred account holder. Maintaining the security patches is a significant action for preventing the cyber crimes[39]. The researchers have claimed that the cyber criminals are persistently investing on new tools to hack ion the database of the existing users and mentally assaulting the users. In the same manners, the Governments are also executing a persistent effort in innovating the tools and the precautionary measures to futile the efforts of the cyber-criminals. The moment theHome Depots POS systems have been hackedin the last summer, the systems have been in the process of installing the new security patch that would have creates a complete protection over the data[40]. The maintain the entire server network protected, it is essential to make sure that both the hardware and the hardware security is up to date with its new antimalware signatures or the patches. The cyber security related framework can connect the architecture models to assess the cyber security. To the specialist audience, cyber security is important to reduce the risk of the organisation for building the capabilities in three significant areas such as prevention, detection and response. As per the view of the scholars, prevention is a most significant option for governing the problem. This process includes the installation of the fundamentals requirements and the responsibility to deal with the cyber attackers within the organisation. Thus, it is important for everyone to identify the cyber attackers efficiently. Adding to this, detection is important to monitor the incidents. It has been speculated that the organisation can strengthen the technological detection to identify the cyber attacks. On the other hand, excellent equipment facility for data mining would be helpful to detect the data traffic and the other sudden strange patterns within the data parity [41]. This pr ocess is also helpful to monitor and control the system performance within the organisation. Furthermore, being responsive is the other significant part to activate a well-designed plan to resist the cyber attackers. The organisation can only be responsible for activating and deactivating the technological module as per the requirement of the scenario. It is essential to preserve a prospective recovery plan while developing the response to make a counter attack against the cyber criminals [42]. Moreover, it is a continuous process and required more staffs to execute the plan successfully. Understanding the cyber risk is also necessary for the non-specialist person to avoid social damage. The illegal digital activities targeted the organisation and the individual personnel for making harm. The users require understanding the hacking activity and the categories of hacking to keep safe the society and the community. The users can learn various mode of cyber security through a website and from the technical personnel to keep the information safe. To avoid social media hacking users do not click on any link to the website and the personal email. The people has to follow the safe website like government registered site while making an online financial transaction [43]. This process can save the banking information and data. The most internet users need to use the anti-malware application to keep the personal computer safe from the hackers and the other cyber attackers. The use of interconnected devices and the other technical safeguards like the firewall in the home network would be an effective step to avoid the hacker's activities. Moreover, use of common sense is highly essential to be saved and the keep the data secured. The quick cyber security tips provided by the scholars demonstrate that double cheeking the appliances and the devices can raise the user awareness for the security measures. The users would also require to safe the smart TV for avoiding the hacking activities [44]. Additionally, use of trusted DNS services such as OpenDNS would be beneficial for minimising the cyber crime issues. The users also have to be very careful with the mobile devices and the personal computers. In the circumstance of the existing subject matter, the researchers have expressed that the complex server networks have penetrated towards the mobile devices. Therefore, the virtualised environment is pushing the demand for the cyber security professionals to extend the outside perimeter within the system[45]. The Smartphone revolution is throwing more complexities into the mix. The risk to secure the data and system is severely multifold, since, the customers are registering on the mobile applications by enterprise the sensitive data. The cyber criminals have the gets the personal information from the specific vulnerable applications and create harassment over the users[46]. Therefore, the engineers require designing the application software that hardly demands the sensitive information of the users. It is highly understandable that the application demands the personal information to maintain a thorough track of the user numbers using the individual applications. Therefore, the det ails of the users are highly essential to maintain the cyber securities. However, the hackers are targeting on the specific set of the personal information of the users and leading to humiliation. 82% of the employees have reported of not having the appropriate IT experts within the business[47]. Therefore, the managements are required to train the IT professionals regarding the innovative method stat often lead to provide the premium end security services to its users. Using the secure remote access methods is highly essential to cut short on the practices of the cyber criminals. It has been assessed that the ability to connect remotely to a network has included a huge deal of expediency for the end users. However, a preventive access method, for example, the Virtual Private Network (VPN), needs to be used in case the remote access is necessitated. The VPN is considered as the encrypted data channel for the securely sending and receiving the data through the public IT infrastructure. With the support of a VPN, the users are enabled to remotely access the internal resources like printers, files, databases and the websites[48]. The specific set of the remote access can further be made strong by reducing the integer of Internet Protocol (IP) addresses. This can be obtained it by using the network devices and the firewalls to the specific IP addresses. O n the other hand, it has been inferred that the VPN is exclusively a security measure that gets con nected to devices[49]. In case a laptop or a computer gets infected with the malware can lead to introducing those vulnerabilities into the network. This often led to introduce the new infections and negating the security of the VPN. Maintaining the awareness regarding vulnerability would be the arrival of the new situation to increase the practices of the professionals. The majority of the vendors work diligently to establish the patches for recognising the vulnerabilities. However, even after the patches and the updates are released, different systems remain vulnerable due to the casual approach of the management towards the server related issues[50]. As per the Data Breach Investigations Report of 2015, the Verizon figured out that several breaches have enabled by hardly addressing the common vulnerabilities. The statistic expressed that 99.9% of exploited vulnerabilities have been compromised in the specific year after the public disclosure of the problems. Moreover, the Ciscos 2015 Annual Security Report figures out that 40% of CISO employees interviewed in a survey claimed that the company has no system patching programs in the place[51]. The specific set of the unpatched vulnerabilities often leads to incl ude the low-hanging fruit of which the cyber criminals can easily take advantage of. Enforcing policies on the mobile devices is another additional measure to uplift the cyber securities. The previous studies reflect that the proliferation of the laptops, tablets, smartphones, and other several mobile gadgets within the workplace bears the significant security challenges[52]. The mobile nature of the specific smartphone devices displays that the devices are potentially exposed to the external users, compromised with the applications and networks and malicious actors. Further supporting the certain challenge organisations are allowing the increasing trend to its employees to use the personal electronic devices for the professional purposes, which is termed as the Bring Your Own Device (BYOD) phenomenon[53]. Thus, it is highly essential to establish the policies on the verge of certain reasonable limits of mobile devices in the professional networks. The particular sets of measures need to be strictly enforced for all the employees base, as well as for the IT engineers[54]. The devices also need to be password protected to make certain that only the authorised users can log-in. I n the case of discrepancies, an unauthorised user can easily access the restricted networks and files can be misused to the authorised user's device. The preset study emphasises the importance of having security measures to reduce the rate o the cyber-related crimes. Evaluating the study, an inference can b drawn that the governing authorities of remote regions are providing the relative financial support to increase the cyber security measures. However, certain percentages of the industrial firms are taking are filing to take the precautionary measures even after receiving the virus-related symptoms. Moreover, the casual attitude of the IT experts often leads the brand to have unknown data exposure actions. Therefore, the organisations and the government need to make a persistent effort in developing the security tools to decrease the cyber-related issues. Reference: Amoroso, Edward G. Cyber Security. Kingston, NY, United States: Silicon Press, 2006. Awan, Imran and Brian Blakemore. Policing Cyber Hate, Cyber Threats and Cyber Terrorism. United Kingdom: Ashgate Publishing, 2012. Bayuk, Jennifer L. Cyber Attacks. Computers Security 31, no. 2 (March 2012): 251. Carpentier, Deborah. NERC and Enforcement Issues: NERC Gains in Vegetation Management, Cyber and Physical Security, and Reliability Assurance. Natural Gas Electricity 30, no. 10 (April 16, 2014): 2932. Chen, Dong. A Survey on Security Issues of M2M Communications in Cyber-Physical Systems. KSII Transactions on Internet and Information Systems 3, no. 2 (2012): 69103. Clarke, Richard A. and Robert K Knake. Cyber War: The Next Threat to National Security and What to Do about It. New York: HarperCollins Publishers, 2011. DeVilliers, Meiring. Enabling Technologies of Cyber Crime: Why Lawyers Need to Understand It. Pittsburgh Journal of Technology Law and Policy 11, no. 3 (April 1, 2011): 118. Ghernaouti, Solange and Solange Ghernaouti-Helie. Cyber Power: Crime, Conflict and Security in Cyberspace. Boca Raton, FL, United States: EFPL Press, 2013. Grabosky, Peter. Requirements of Prosecution Services to Deal with Cyber Crime. Crime, Law and Social Change 47, no. 4-5 (October 13, 2007): 20123. Greenbaum, D. Cyber Crime 2.0. Science 348, no. 6231 (April 9, 2015): 19394. Healey, Jason, Jeffrey Schmidt, Jennifer L Bayuk, Joseph Weiss, Marcus H Sachs, and Paul Rohmeyer. Cyber Security Policy Guidebook. United States: John Wiley Sons, 2012. Jones, David. Cyber-Crime How Much Is There and What Is Anyone Doing about It? Card Technology Today 19, no. 11-12 (November 2007): 16. Kizza, Joseph Migga. Computer Network Security and Cyber Ethics. New York, NY, United States: McFarland Company, 2006. Kowalski, Robin M., Susan P Limber, and Patricia W Agatston. Cyber Bullying: Bullying in the Digital Age. 2nd ed. Malden, MA: Wiley-Blackwell (an imprint of John Wiley Sons Ltd), 2012. Lehto, Martti. The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 118. Lewis, Coleen. Social Media - Cyber Trap Door to Defamation. Masaryk University Journal of Law and Technology 9, no. 1 (June 30, 2015): 3544. Li, Tao, Jiannong Cao, Junbin Liang, and Junhao Zheng. Towards Context-Aware Medical Cyber-Physical Systems: Design Methodology and a Case Study. Cyber-Physical Systems 1, no. 1 (November 10, 2014): 523. Liu, Jing, Yang Xiao, Shuhui Li, Wei Liang, and C. L. Philip Chen. Cyber Security and Privacy Issues in Smart Grids. IEEE Communications Surveys Tutorials 14, no. 4 (2012): 98197. McCusker, Rob. Transnational Organised Cyber Crime: Distinguishing Threat from Reality. Crime, Law and Social Change 46, no. 4-5 (March 23, 2007): 25773. McGuire, Mike and Samantha Dowling. Cyber Crime [electronic Resource]: A Review of the Evidence: Summary of Key Findings and Implications. United Kingdom: Home Office, 2013. Medlin, B. Dawn. Social Engineering Techniques and Password Security: International Journal of Cyber Warfare and Terrorism 3, no. 2 (2013): 5870. Mohd Ali, Maziah. Determinants of Preventing Cyber Crime: A Survey Research. International Journal of Management Science and Business Administration 2, no. 7 (2015): 1624. Pegram, Bob. 10 Alarming Cyber Security Facts That Threaten Your Data [Updated]. May 12, 2016. Accessed September 26, 2016. https://heimdalsecurity.com/blog/10-surprising-cyber-security-facts-that-may-affect-your-online-safety/. Power, Andrew. The Psychology of Cyber Crime: Concepts and Principles. Edited by Grainne / Kirwan. United States: Information Science Reference, 2012. Reyes, Anthony, Richard Brittson, Kevin OShea, and Jim Steel. Cyber Crime Investigations: Bridging the Gaps Between, Security Professionals, Law Enforcement, and Prosecutors. United States: Syngress Publishing, 2007. Robinson, Michael, Kevin Jones, and Helge Janicke. Cyber Warfare: Issues and Challenges. Computers Security 49, no. 2 (March 2015): 7094. Rogers, Michael. A Challenge for the Military Cyber Workforce. Military Cyber Affairs 1, no. 1 (December 2015): 22829. Seam, Neelam. Cyber Crime Against Women. IMS Manthan (The Journal of Innovations) 8, no. 2 (September 15, 2015): 4769. Security, IBM. IBM Cyber Security Intelligence Index - United States. September 19, 2016. Accessed September 26, 2016. https://www-03.ibm.com/security/data-breach/cyber-security-index.html. Shah, Niral and Naveen Vaswani. Cyber Crime and Security- Challenges and Security Mechanisms. International Journal of Engineering Trends and Technology 36, no. 7 (June 25, 2016): 36771. Shrivastava, Anshul. Cyber Security: Issues and Privacy. Communications on Applied Electronics 3, no. 4 (November 25, 2015): 1216. States, United. Cyber Security: Responding to the Threat of Cyber Crime and Terrorism: Hearing Before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, First Session, April 12, 2011. Washington: Government Printing Office, 2011. Terrorism, Nonproliferat Subcommittee on. The Evolution of Terrorist Propaganda: The Paris Attack and Social Media. San Bernardino, CA, United States: Createspace, 2015. Vacca, John R. Cyber Security and IT Infrastructure Protection. Waltham, MA: Syngress Media,U.S., 2013. Voelker, Rebecca. FDA Tackles Cyber Drug Crime. JAMA 316, no. 5 (August 2, 2016): 48586. Wang, Shiuh-Jeng. Measures of Retaining Digital Evidence to Prosecute Computer-Based Cyber-Crimes. Computer Standards Interfaces 29, no. 2 (February 2007): 21623. Yeboah-Boateng, Ezer Osei and Elvis Akwa-Bonsu. Digital Forensic Investigations: Issues of Intangibility, Complications and Inconsistencies in Cyber-Crimes. Journal of Cyber Security and Mobility 4, no. 2 (2016): 87104. Zhang, Yanping, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang, and Hongmei Deng. A Survey of Cyber Crimes. Security and Communication Networks 5, no. 4 (July 13, 2011): 42237.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.