A new role for ‘the public’? Exploring cyber security controversies in the case of WannaCry

Author(s):  
Kristoffer Kjærgaard Christensen ◽  
Tobias Liebetrau
Keyword(s):  
2015 ◽  
Vol 4 (1) ◽  
pp. 135-142 ◽  
Author(s):  
Nimisha Singh ◽  
Abha Rishi

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.


2018 ◽  
Author(s):  
Peter M. Shane

This critique of Karson K. Thompson’s note, "Not Like an Egyptian: Cybersecurity and the Internet Kill Switch Debate," argues that the U.S. lacks a framework of laws and regulations, "smart" or otherwise, that adequately incentivizes the parties with the greatest capacity to improve our cyber security to do so. It attributes the poor state of U.S. cyber policy to the "bewildering array of overlapping responsibilities" scattered among government offices and departments; the difficult imperative of sharing responsibility among military and civilian authorities; the fact that most of the networks (and the dependent critical infrastructures) that need protecting are in private hands; and the lack of public understanding of the kinds of regulation that are necessary or appropriate. The essay argues that meaningful progress towards an adequate legal framework depends on a broad national debate aimed at defining the public good with regard to cyber-security, and the inevitable trade-offs among security, privacy, productivity, economic growth, organizational flexibility, military effectiveness, government transparency, and accountability that must be confronted in making sensible cyber-security policy.


SEEU Review ◽  
2020 ◽  
Vol 15 (1) ◽  
pp. 71-85
Author(s):  
Adrian Besimi ◽  
Visar Shehu

Abstract In the last period, especially during the COVID-19 pandemics, individuals as well as institutions globally and in North Macedonia particularly, have failed to correctly respond to the new challenges related to cyber security, online attacks, and fake news. Being that in a state of isolation and quarantine most governmental institutions have heavily relied on online tools to communicate among each other and with the public, it is quite evident that they have not been well prepared to adopt new technologies. This paper aims to bridge together the needs for technology during the COVID-19 pandemics versus the security challenges that many forget to mention. The primary focus of this paper is to elaborate on the security challenges associated with technology with several examples from incidents around the world and from North Macedonia. As such, it represents a perspective paper with focus on current and emerging advances on IT security for running the “new normal” world.


2022 ◽  
Vol 7 (1) ◽  
Author(s):  
Muh Yusuf S

Indonesia is currently ranked 24th in the Global Cybersecurity Index (GCI) 2020. Indonesia's ranking can be improved by improving the assessment pillars of the GCI survey, one of the efforts is to improve the cyber security system of government agencies through Security Assessment. For this reason, the purpose of this study is to provide alternative solutions in order to optimize the public services of the State Intelligence Agency (BIN) in the form of Security Assessment in the perspective of the GCI 2020 survey. This research is a qualitative research using data related to BIN public services and then juxtaposed with data from the Global Cybersecurity survey. Index 2020 as a reference. The results of the study indicate that the optimization of the Security Assessment can be done by implementing cyber counterintelligence and optimizing the publication of services by paying attention to the rules of intelligence secrecy. With the optimization of the Security Assessment, it will affect the assessment of the Technical and Organizational pillars in the GCI survey so that it is expected that Indonesia's ranking will increase in the next survey.


Author(s):  
Thokozani Ian Nzimakwe

Cybersecurity is the practice of making the networks that constitute cyber space secure against intrusions. The aim is to maintain the confidentiality, the availability and integrity of information, by detecting interferences. Traditionally, cybersecurity has focused on preventing intrusions and monitoring ports. The evolving threat landscape, however, calls for a more dynamic approach. It is increasingly clear that total cybersecurity is impossible, unless government develops a cyber-security strategy. The aim of this chapter is to discuss government's dynamic approach to addressing challenges of cybersecurity. The chapter looks at the co-ordination of cyber-security activities so as to have a coordinated approach to cyber-crime. This chapter also highlights the idea of protecting sensitive data for the public good. It is generally accepted that technology has become indispensable in modern society. Government's cybersecurity presents a unique challenge simply because of the volume of threats that agencies working for government face on a daily basis.


2018 ◽  
pp. 132-150
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


2020 ◽  
pp. 446-464
Author(s):  
Suhaila Ismail ◽  
Elena Sitnikova ◽  
Jill Slay

Past cyber-attacks on Supervisory Control and Data Acquisition (SCADA) Systems for Critical infrastructures have left these systems compromised and caused financial and economic problems. Deliberate attacks have resulted in denial of services and physical injury to the public in certain cases. This study explores the past attacks on SCADA Systems by examining nine case studies across multiple utility sectors including transport, energy and water and sewage sector. These case studies will be further analysed according to the cyber-terrorist decision-making theories including strategic, organisational and psychological theories based on McCormick (2000). Next, this study will look into cyber-terrorist capabilities in conducting attacks according to Nelson's (1999) approach that includes simple-unstructured, advance-structured and complex-coordinated capabilities. The results of this study will form the basis of a guideline that organisations can use so that they are better prepared in identifying potential future cybersecurity attacks on their SCADA systems.


2019 ◽  
Vol 34 (3) ◽  
pp. 395-408 ◽  
Author(s):  
Kristoffer Kjærgaard Christensen ◽  
Tobias Liebetrau
Keyword(s):  

2018 ◽  
Vol 13 (5) ◽  
pp. 957-966
Author(s):  
Shigeo Mori ◽  
◽  
Atsuhiro Goto

The damages caused by cyber-attacks are becoming larger, broader and more serious and to include monetary losses and losses of lifeline. Some cyber-attacks are arguably suspected to be parts of national campaigns. Under such circumstances, the public sector must endeavour to enhance the national cybersecurity capacities. There are several benchmarks for national cybersecurity, i.e., a snapshot relative assessment of a nation’s cybersecurity strength at a global level. However, by considering the development of technology, attackers’ skills and capacities of other nations, we believe that it is more important to review the national strategy for cybersecurity capacity enhancement and to ensure that the national capacity advances adequately in the coming years. We propose a method of reviewing national strategies. Additionally, we performed a trial review of the Japanese cybersecurity strategy using the Cybersecurity Capacity Maturity Model for Nations (CSCMMN) developed by the Global Cyber Security Capacity Centre. This trial proved to be workable because it detected various possibly inadequate (insufficient, inappropriate or inefficient, although further investigation is needed) approaches in the Japanese strategy. Moreover, the review also discovered the shortcomings of the capacity areas in the CSCMMN. We plan to improve the reviewing method and develop the improvement process of national strategies for cybersecurity capacity enhancement.


Sign in / Sign up

Export Citation Format

Share Document