Academic Master

Human Resource And Management, Technology

International Cyber Security Environment Management

With the invention of the computer in 1989 by Robert Morris, the world entered into the new phase of progress. Computer changed the fate of humankind since the time of its launch. The invention of computer gears up the development of the humanity in the field of information technology. With the passage of time improvisation were made in computer and information technology. But challenges arose as well, stealing data and blackmailing others became prominent in past few decades. This issue triggers the international community to find safe ground for the networking system hence to secure their privacy and abolish cybercrime. The solution was found in the form of cyber-security.

The country under discussion here is Russia, the nature of its cybersecurity its cultural challenges, economic barriers, and international policies under the domain of international cyber laws and procedures will be discussed. Cybercrime becomes the headache of Russia, fraud in networking, ATM fraud losing of data, blackmailing through cyber are the common issues facing by Russia. The quick response by Russia to these rising issues come out in the form of new legislation under international cyber laws. These legislative laws are to protect the cyberspace in Russia. These laws are under the direct guidance of global environmental scan methods. No. 187-FZ this law ensure development and protection of critical data and infrastructural development of networking. Federal law No. 276-FZ focuses on technology regulation and access restricted sides. Federal law No. 241-FZ this law is formulated to secure data and data processing, which introduce specific rules for an instant messaging service provider. Russia is facing many cultural issues like espionage activity on cyber. Terrorism is another most common challenge Russia facing in the cyber world. To retaliate cybercrime and espionage activities, Russia runs intelligence agency to screw down the bogies and terror (John Leyden 6 Jun 2017). What are unique characteristics of country’s culture that make cybersecurity issues make more challenging?

Russia is the country having dominantly hacker culture. In facing the problem of the hacker, Russia had made improvisation in their policies and laws of using the cyber net (Trevor McDougall, 8, 1, 2015). If we look forward, few decades ahead Russia will have been in a state of cyber terrorism and espionage activities since it possesses a threatening culture of hackers and terrors on cyberspace. At every stage, the laws and policies of Russia were have been challenged by the hackers. Thus they find loopholes in every law to project espionage activity. I do not think the current rules are enough to screw down the pirates and terrorists.

What would be the catalyst for change?

After analyzing the whole scenario, I suggest that the only thing which brings out a change in the Russian cyberspace crime is improvisation in technology through innovations. Restrictions on pirated software is another step to counter the problem. The catalyst for the change Russia wants is avoiding personal mistakes while making software and apps. Because any individual error in software design can provide enough space for hackers to create intrusion into the program and hack it.

Opportunities and economic approaches the country can use to counter the cybercrime. From the economic perspective, there is enough space for the country to mend up the problem. As Russian government took some different steps to overcome the problem, like spying into the hacker through its agencies, this was spread act launch by Russia. They invest much in their agencies to improvise their activities to counter cybercrime.

From criminality perspective does the country do enough in the cyberspace area?

Enough done by Russia from the financial ground to support their agencies to uproot the bogies from the cyber world. The work done by Russia in eradicating the hackers and countering their activities is much more appreciable, as it takes on from all side on to the pirates, like financial support, legislation, retailoring the policies, and strictly following international cyber laws. But more is needed as hackers increasing culture in Russia is becoming more threatening.

What would be the change you suggest for the country if you were an ambassador for these countries and their potential impacts to that country?

The only changes I would suggest for the country if I am there as an ambassador of U.S.A are, first of all, Russia has to finish hackers’ culture that can be done through proper enforcement of cyber laws. They will have to develop such a technology that can quickly track any espionage activity with precision, third they have to band pirated software in the country and outside the country. I convinced that this impacts the security of the state to the higher degree because it can change the hacker’s culture and abolish all espionage activities and terrorism happening in the cyber world.

The response from South Africa to the increasing cybercrime and data stealing is straightforward in the forms of policies and laws they formulated. In the near past year, South Africa passed a new cybercrime bill to mitigate the issue of cybercrime within the country and across the border. In 2017 the revised form of 2015 law was adopted which was criticized by the experts in South Africa in 2015. The critiqued were on the computer-related terrorist activity, copyright offenses, and free speech. The bill contains essential steps to readying South Africa to cooperate internationally on cybercrime. Above these, all united nation plays a vital role in maintaining cybersecurity through its laws, policies, and regulations. In the session of UNIDIR, the role of information technology in economic development, social improvement, and scientific development were discussed. And future precautionary steps were considered to cope with the uprising challenges in the field of information technology.

In addition to providing security in IT, the united nation also provides a common ground for other organizations to deal the problem collaboratively. These organizations are (CFCE), and (GCSCC). Their aim is confidence building, international assistance, and capacity building. This method of the collective watch at the problem can open more doors for the solution shortly. Apart from united nation efforts, NATO’s contributions in cyber defense system are pivotal to the system security. NATO and its allies believe in strong and protective cyber defense. Their core task is to encounter the crisis, fulfill all requirements of strong safety, and high alert security. The prime objective of NATO is to apply international laws in cyberspace, to protect its network, and to create a crime-free space for the cyberspace (Toregas, Hoffman & Heller, 2016). The enforcement of laws and actions taken action can create crime-free cyberspace.

In coming decades cybercrime will be minimized by the rules and policies undertaken by NATO and united nation collectively, as well as other organization which is working with NATO and the united kingdom will contribute to their maximum to mitigate the problem and create crime-free cyber. Cybersecurity environmental scanning method is the appropriate tool used all over above mention cases. This scanning method by its very nature protects the ecological hazards case by cyberspace networking. Locky and Samas are two recently detected variant that affects healthcare and environment (Lee Kim, 2, April 2016). In that report, 3.2 million machines were identified which are targeted by the above mentioned variants. The environmental scan is the protection of humanity from the cyber modifications. Specific policies and laws apply to every nation to undertake the environmental cyber scan. Laws may vary from society to country as per requirements and social context, but their sole objective remains the same.Environmental scanning procedure precisely applies to every nation, from the Middle East to developed countries.

Reference

Toregas, C., Hoffman, L. J., & Heller, R. (2016). Exploring Ways to Give Engineering Cyber Security Students a Stronger Policy and Management Perspective.

(Toregas, Hoffman & Heller, 2016)

SEARCH

Top-right-side-AD-min
WHY US?

Calculate Your Order




Standard price

$310

SAVE ON YOUR FIRST ORDER!

$263.5

YOU MAY ALSO LIKE

Pop-up Message