Abstract

Creation of National Cyber Defense Strategy, is the only security and the best protection against cyber-crimes. This is the starting point, from where adequate policies and necessary legal measures begin, aiming the creation of a solid ground and responsible users by implementing comprehensive measures and legal restrictions.The methodology used to achieve the recognition of users with applicable legislation and regulations on the use of the Internet, as well as legal obligations; implementation of procedures to use communication systems; signing and approval by users of their responsibilities; knowledge and information on the risks and threats stemming from the use of communication networks; certification of trained and specialized staff; classification and processing of information in a particular system; identifying unauthorized users who use classified information networks in public systems and private sector; creating barriers in distance entry networks and information systems, etc.Various Security and Intelligence institutions covering and operating in these areas are responsible for the creation and promotion of National Cyber Defense Strategy, analyzing the risk to implement protective measures for preventing attacks on Cybercrime (Cyber Crimes).

Highlights

  • IntroductionCyber attacks against the infrastructure of a country have targeted several key areas of life and society of a country such as energy, drinking water, fuel, gas, economic capital, etc,

  • Usually cyber attacks against the infrastructure of a country have targeted several key areas of life and society of a country such as energy, drinking water, fuel, gas, economic capital, etc,. Such actions may be carried out by criminals, by states or by individual criminals, who operate remotely from another state. Such attacks are categorized as cyber crimes, cyber terror or cyber war (NATO, 2009)

  • Attacks on information technology are classified as the third largest risk for US security, ranking immediately after the threats of nuclear war and weapons of mass destruction. These definitions are provided by the Center for Strategic and International Studies in Washington, report of 2009 (NATO, 2009)

Read more

Summary

Introduction

Cyber attacks against the infrastructure of a country have targeted several key areas of life and society of a country such as energy, drinking water, fuel, gas, economic capital, etc,. Attacks on information technology are classified as the third largest risk for US security, ranking immediately after the threats of nuclear war and weapons of mass destruction These definitions are provided by the Center for Strategic and International Studies in Washington, report of 2009 (NATO, 2009). In the fight against terrorism and cyber-crime it is important to create a "dynamic policy" and the use of a strategic counter-communication plan that includes measures in law enforcement, military achievements, political, diplomatic, social and economic measures. These measures and the anti-communication plan must be implemented at all levels of government in collaboration with international partners to harmonize international achievements within a main strategy. These measures and the anti-communication plan must be implemented at all levels of government in collaboration with international partners to harmonize international achievements within a main strategy. (Magazine for Defense and European Security, 2010, pg. 19)

International policies in Cybercrime prevention
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call