Cybersecurity and cybercrime prevention: strategies, policies, and programs
Module 12 critically explores the cybersecurity strategies used to protect information and communication technology (ICT) in response to the ever-increasing interdependence of digital devices within countries, as well as growing network connections with the digital systems of other countries. The module also explores the concept of risk by discussing several epochs of computer development, as each presents its own set of risks and somewhat functional risk management responses. Finally, the art of risk analysis is discussed and applied to information security and infrastructure protection.
Learning Objectives
After completing this module, you should be able to:
- Describe the basic features of cybersecurity strategies and differentiate between cybersecurity and cybercrime prevention strategies
- Explain and evaluate the objectives and lifecycle of national cybersecurity strategies
- Identify, examine, and evaluate frameworks for international cooperation on cybersecurity matters
- Assess national and international efforts to enhance our countries’ cybersecurity posture
- Understand the concept of risk as applied to information security and infrastructure protection
- Discuss the major principles of risk analysis
- Identify and define the primary security technologies used to protect information
Summary
Cybersecurity and cybercrime prevention are critical in our increasingly digital and interconnected world. To address these issues effectively, governments, organizations, and individuals must implement a range of strategies, policies, and programs.
Many countries have developed national cybersecurity strategies that outline their approach to protecting critical infrastructure and securing cyberspace. These strategies often involve collaboration between government agencies, the private sector, and other stakeholders.
Laws and regulations play a crucial role in deterring cybercriminals. Governments enact cybersecurity laws that define cybercrimes and outline penalties. Regulations may also require organizations to adhere to certain security standards.
Collaboration between government entities and private sector organizations is essential. Public-private partnerships facilitate the sharing of threat intelligence, best practices, and resources for a more robust defense against cyber threats.
Raising awareness about cybersecurity is key to preventing cybercrimes. Programs that educate individuals and organizations about safe online practices, phishing awareness, and data protection are crucial.
Developing and regularly testing incident response plans is essential. These plans help organizations minimize the damage from cyberattacks and recover swiftly.
ISACs are organizations that facilitate information sharing among industry peers and government agencies. They help organizations stay informed about emerging threats and vulnerabilities.
Regular security audits and risk assessments help organizations identify vulnerabilities and weaknesses in their cybersecurity posture. These evaluations can inform necessary improvements.
Implementing advanced cybersecurity technologies, such as intrusion detection systems, firewalls, antivirus software, and encryption, is critical. Emerging technologies like AI and machine learning are also being used to enhance security.
Cyber threats are not limited by borders, so international collaboration is essential. Sharing threat intelligence, harmonizing cybersecurity standards, and cooperating on cybercrime investigations are ways to combat transnational cybercriminals.
There is a growing need for skilled cybersecurity professionals. Training programs, certifications, and initiatives to attract and retain cybersecurity talent are crucial.
Encouraging individuals and organizations to practice good “cyber hygiene” is fundamental. This includes regular software updates, strong password management, and multi-factor authentication.
Securing the technology supply chain is becoming increasingly important. Organizations should verify the security of hardware and software components and assess their vendors’ cybersecurity practices.
Keeping abreast of the evolving threat landscape is vital. Continuous monitoring of networks and the collection of threat intelligence allow organizations to detect and respond to new threats in real-time.
Strong data protection laws, such as the European Union’s GDPR, help safeguard personal information. Compliance with these laws is a critical aspect of cybersecurity.
Regularly testing systems through penetration testing and red teaming exercises can identify vulnerabilities and weaknesses before cybercriminals do.
The prevention of cybercrimes and the enhancement of cybersecurity require a multifaceted approach that combines government policies, private sector cooperation, technological solutions, public awareness, and international collaboration. It’s an ongoing effort that needs to adapt to the evolving threat landscape, and it requires a collective commitment to mitigating cyber risks.
Key Terms/Concepts
Administrative controls
Cybersecurity strategy
Cybersecurity risk management (RM)
Enterprise risk management (ERM)
Internet of Things (IoT)
Password policy
Physical controls
Risk appetite
Risk exposure
Risk tolerance
Technical controls
Read, Review, Watch and Listen
- Read 5 elements to include in a cybersecurity strategy for any size business
- Read the United Nations Office on Drugs and Crime’s (UNODC) National cybersecurity strategies: Lifecycles, good practices and repositories
- Review Executive Order on Improving the Nation’s Cybersecurity (The White House Briefing Room, May 2021)
- Read What is risk management and why is it important? (Linda Tucci, Industry Editor — CIO/IT Strategy):
- Review The 12 Best Risk Management Software and Programs for 2023 (December 14, 2021 by Tess Hanna in Best Practices)
- Watch Internet of Things (IoT) | What is IoT | How it Works | IoT Explained | Edureka: (also embedded below)
- Watch Cisco’s What is IT Security?
- Watch Cisco’s Women in Cybersecurity (Dec. 2018) [also embedded below]
- Review What Are Security Controls? An overview of the types of countermeasures security practitioners use to reduce risk (By Debbie Walkowski, August 2019)
PURPOSE
The single greatest problem in computer security is password protection. Although there are some basic do’s and don’ts, there are also sophisticated software programs that address the issue. The purpose of this activity is to explore challenges associated with passwords protection.
OVERVIEW
Several approaches to enhance password security have been taken, including password creation software, onetime password generators, and user authentication systems, e.g., biometric devices. There are a variety of software programs that system administrators can use to improve password security. Some programs force users to change their passwords on a regular basis. For example, every month or few months, or even every week.
INSTRUCTIONS
- Read 6 Practices to Strengthen Your Password Hygiene in 2020 (CISCOMAG, Dec. 2019): https://cisomag.eccouncil.org/6-practices-to-strengthen-your-password-hygiene-in-2020/
- Read Password hygiene fortifies defense against cyberattacks (VentureBeat, Nov. 2021): https://venturebeat.com/2021/11/02/password-hygiene-fortifies-defense-against-cyber-attacks/
- Watch How Your Passwords Were Stolen And Why You Were Hacked (see below): https://youtu.be/XXV7PDHTnas
- Visit the Password Meter website (http://www.passwordmeter.com/) and test a couple of your own passwords
ANSWER THE FOLLOWING QUESTIONS:
- Per Password Meter, what was the Score for used passwords?
- Per Password Meter, what was the reported Complexity for used passwords?
- Based on the information within Chapter 14 and the Password Meter, would you consider updating your password? Why or why not? Explain.
- From an information security and infrastructure protection position, explain why passwords are a dynamic challenge for both companies and end users.
KEY TERMS/CONCEPTS
Password hygiene – The degree to which a user’s passwords are selected and managed according to secure best practices.
Two-factor authentication – Also known as 2FA is a process which requires two steps to verify a user. Rather than just asking for a single piece of information – such as a password — two factor authentication goes a step further to enhance the level of security within the system.
Passphrase vs. password – Using a passphrase over a password will give you maximum security for your account. But make sure the passphrase you choose is easy-to-remember and complex, e.g., “I love my Computers & Criminal Justice class.” Pick a line from your favorite song or quotation, but preferably not a common one that can be simply guessed by someone who knows you.
Refer to the course learning management system (LMS); that is Blackboard (BB), for the correct due date. In addition, submit your work via BB for grading
Supplemental Resources
- Cyber Capabilities and National Power: A Net Assessment (International Institute for Strategic Studies (IISS) [June 2021]
Refers to policies, procedures, or guidelines that define personnel or business practices in accordance with the organization's security goals. These can apply to employee hiring and termination, equipment and Internet usage, physical access to facilities, separation of duties, data classification, and auditing.
Explains how the government will ensure that all public sector organizations will be resilient to cyber threats.
An ongoing process of identifying, analyzing, evaluating, and addressing your organization's cybersecurity threats. Cybersecurity risk management is not simply the job of the security team; everyone in the organization has a role to play.
The practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited by malicious actors and campaigns. Endpoint security systems protect these endpoints on a network or in the cloud from cybersecurity threats
Refers to a system of interrelated, internet-connected objects that can collect and transfer data over a wireless network without human intervention.
A set of rules created to improve computer security by motivating users to create dependable, secure passwords and then store and utilize them properly.
Anything tangible that is used to prevent or detect unauthorized access to physical areas, systems, or assets. This includes things like fences, gates, guards, security badges and access cards, biometric access controls, security lighting, CCTVs, surveillance cameras, motion sensors, fire suppression, as well as environmental controls like HVAC and humidity controls.
The amount of risk it is willing to accept to realize its objectives.
The quantified potential loss from business activities currently underway or planned. The level of exposure is usually calculated by multiplying the probability of a risk incident occurring by the amount of its potential losses. The most common forms of risk exposure are brand damage, compliance failures, security breaches, and liability issues.
The amount of acceptable deviation from an organization's risk appetite. While risk appetite is a broad, strategic philosophy that guides an organization's risk management efforts, risk tolerance is a much more tactical concept that identifies the risk associated with a specific initiative and compares it to the organization's risk appetite.
Also known as logical controls, include hardware or software mechanisms used to protect assets. Some common examples are authentication solutions, firewalls, antivirus software, intrusion detection systems (IDSs), intrusion protection systems (IPSs), constrained interfaces, as well as access control lists (ACLs) and encryption measures.