Academic Master

Human Resource And Management, Technology

International Cyber Security Environment Management

With the invention of the computer in 1989 by Robert Morris, the world entered into a new phase of progress. Computers have changed the fate of humankind since the time of their launch. The invention of the computer gears up the development of humanity in the field of information technology.

With the passage of time, improvisations were made in computer and information technology. But challenges arose as well, stealing data and blackmailing others became prominent in past few decades. This issue triggers the international community to find safe ground for the networking system, hence securing their privacy and abolishing cybercrime. The solution was found in the form of cyber-security.

The country under discussion here is Russia; the nature of its cybersecurity, its cultural challenges, economic barriers, and international policies under the domain of international cyber laws and procedures will be discussed. Cybercrime has become a headache in Russia; fraud in networking, ATM fraud, loss of data, and blackmailing through cyber are the common issues faced by Russia. The quick response by Russia to these rising issues comes in the form of new legislation under international cyber laws. These legislative laws are to protect cyberspace in Russia. These laws are under the direct guidance of global environmental scan methods. No. 187-FZ, This law ensures the development and protection of critical data and the infrastructural development of networking. Federal law No. 276-FZ focuses on technology regulation and access restricted sides. Federal law No. 241-FZ, which is formulated to secure data and data processing, introduces specific rules for an instant messaging service provider. Russia is facing many cultural issues like espionage activity on cyber. Terrorism is another common challenge Russia faces in the cyber world. To retaliate against cybercrime and espionage activities, Russia runs an intelligence agency to screw down the bogies and terror (John Leyden 6 Jun 2017). What are the unique characteristics of a country’s culture that make cybersecurity issues more challenging?

Russia is a country that has a dominant hacker culture. In facing the problem of hackers, Russia has made improvisations in its policies and laws regarding the use of the cyber net (Trevor McDougall, 8, 1, 2015). If we look forward a few decades ahead, Russia will have been in a state of cyber terrorism and espionage activities since it possesses a threatening culture of hackers and terrors in cyberspace. At every stage, the laws and policies of Russia have been challenged by hackers. Thus, they find loopholes in every law that projects espionage activity. I do not think the current rules are enough to screw down the pirates and terrorists.

What would be the catalyst for change?

After analyzing the whole scenario, I suggest that the only thing that brings about a change in Russian cyberspace crime is the improvisation of technology through innovations. Restrictions on pirated software are another step to counter the problem. The catalyst for the change Russia wants is avoiding personal mistakes while making software and apps because any individual error in software design can provide enough space for hackers to intrude into the program and hack it.

Opportunities and economic approaches the country can use to counter the cybercrime. From an economic perspective, there is enough space for the country to address the problem. The Russian government took some different steps to overcome the problem, like spying on hackers through its agencies; this was a spread act launched by Russia. They invest a lot in their agencies to improve their activities to counter cybercrime.

From a criminality perspective, does the country do enough in the cyberspace area?

Enough has been done by Russia from the financial ground to support their agencies in uprooting the bogies in the cyber world. The work done by Russia in eradicating the hackers and countering their activities is much more appreciable, as it takes on from all sidsides the pirates, like financial support, legislation, retailoring the policies, and strictly following international cyber laws. However, more is needed as the increasing culture of hackers in Russia is becoming more threatening.

What would be the change you would suggest for the country if you were an ambassador for these countries, and what would their potential impacts be on that country?

The only changes I would suggest for the country if I am there as an ambassador of U.S.A are, first of all, Russia has to finish hackers’ culture that can be done through proper enforcement of cyber laws. They will have to develop such a technology that can quickly track any espionage activity with precision, third they have to band pirated software in the country and outside the country. I convinced that this impacts the security of the state to the higher degree because it can change the hacker’s culture and abolish all espionage activities and terrorism happening in the cyber world.

The response from South Africa to the increasing cybercrime and data stealing is straightforward in the forms of policies and laws they formulated. In the past year, South Africa passed a new cybercrime bill to mitigate the issue of cybercrime within the country and across the board. In 2017, the revised form of the 2015 law was adopted, which was criticized by the experts in South Africa in 2015. The critiqued were on computer-related terrorist activity, copyright offenses, and free speech. The bill contains essential steps to readying South Africa to cooperate internationally on cybercrime. Above these, the United Nations plays a vital role in maintaining cybersecurity through its laws, policies, and regulations. In the session, UNIDIR discussed the role of information technology in economic development, social improvement, and scientific development. Futureecutionary steps were also considered to cope with the upcoming challenges in the field of information technology.

In addition to providing security, the United Nations also provides a common ground for other organizations to deal with the problem collaboratively. These organizations are (CFCE), and (GCSCC). Their aim is confidence building, international assistance, and capacity building. This method of collectively watching the problem can open more doors for the solution shortly. Apart from United Nations efforts, NATO’s contributions to cyber defense systems are pivotal to system security. NATO and its allies believe in strong and protective cyber defense. Their core task is to encounter the crisis and fulfill all requirements of strong safety and high-alert security. The prime objective of NATO is to apply international laws in cyberspace, to protect its network, and to create a crime-free cyberspace (Toregas, Hoffman & Heller, 2016). The enforcement of laws and actions taken action can create crime-free cyberspace.

In the coming decades, cybercrime will be minimized by the rules and policies undertaken by NATO and the United Nations collectively, as well as other organizations that work with NATO and the United Kingdom, which will contribute to their maximum to mitigate the problem and create crime-free cyber. The cybersecurity environmental scanning method is the appropriate tool for all of the above-mentioned cases. This scanning method, by its very nature, protects the ecological hazards caused by cyberspace networking. Locky and Samas are two recently detected variants that affect healthcare and the environment (Lee Kim, 2, April 2016). In that report, 3.2 million machines were identified which are targeted by the above mentioned variants. The environmental scan protects humanity from cyber modifications. Specific policies and laws apply to every nation when undertaking the environmental cyber scan. Laws may vary from society to country as per requirements and social context, but their sole objective remains the same. The environmental scanning procedure applies to every nation, from the Middle East to developed countries.

Reference

Toregas, C., Hoffman, L. J., & Heller, R. (2016). Exploring Ways to Give Engineering Cyber Security Students a Stronger Policy and Management Perspective.

(Toregas, Hoffman & Heller, 2016)

SEARCH

Top-right-side-AD-min
WHY US?

Calculate Your Order




Standard price

$310

SAVE ON YOUR FIRST ORDER!

$263.5

YOU MAY ALSO LIKE

Pop-up Message