Cybersecurity and cybercrime prevention: strategies, policies, and programs

Module 12 critically explores the cybersecurity strategies used to protect information and communication technology (ICT) in response to the ever-increasing interdependence of digital devices within countries, as well as growing network connections with the digital systems of other countries. The module also explores the concept of risk by discussing several epochs of computer development, as each presents its own set of risks and somewhat functional risk management responses. Finally, the art of risk analysis is discussed and applied to information security and infrastructure protection.

Learning Objectives

After completing this module, you should be able to:

  • Describe the basic features of cybersecurity strategies and differentiate between cybersecurity and cybercrime prevention strategies
  • Explain and evaluate the objectives and lifecycle of national cybersecurity strategies
  • Identify, examine, and evaluate frameworks for international cooperation on cybersecurity matters
  • Assess national and international efforts to enhance our countries’ cybersecurity posture
  • Understand the concept of risk as applied to information security and infrastructure protection
  • Discuss the major principles of risk analysis
  • Identify and define the primary security technologies used to protect information

Summary

Cybersecurity and cybercrime prevention are critical in our increasingly digital and interconnected world. To address these issues effectively, governments, organizations, and individuals must implement a range of strategies, policies, and programs.

Many countries have developed national cybersecurity strategies that outline their approach to protecting critical infrastructure and securing cyberspace. These strategies often involve collaboration between government agencies, the private sector, and other stakeholders.

Laws and regulations play a crucial role in deterring cybercriminals. Governments enact cybersecurity laws that define cybercrimes and outline penalties. Regulations may also require organizations to adhere to certain security standards.

Collaboration between government entities and private sector organizations is essential. Public-private partnerships facilitate the sharing of threat intelligence, best practices, and resources for a more robust defense against cyber threats.

Raising awareness about cybersecurity is key to preventing cybercrimes. Programs that educate individuals and organizations about safe online practices, phishing awareness, and data protection are crucial.

Developing and regularly testing incident response plans is essential. These plans help organizations minimize the damage from cyberattacks and recover swiftly.

ISACs are organizations that facilitate information sharing among industry peers and government agencies. They help organizations stay informed about emerging threats and vulnerabilities.

Regular security audits and risk assessments help organizations identify vulnerabilities and weaknesses in their cybersecurity posture. These evaluations can inform necessary improvements.

Implementing advanced cybersecurity technologies, such as intrusion detection systems, firewalls, antivirus software, and encryption, is critical. Emerging technologies like AI and machine learning are also being used to enhance security.

Cyber threats are not limited by borders, so international collaboration is essential. Sharing threat intelligence, harmonizing cybersecurity standards, and cooperating on cybercrime investigations are ways to combat transnational cybercriminals.

There is a growing need for skilled cybersecurity professionals. Training programs, certifications, and initiatives to attract and retain cybersecurity talent are crucial.

Encouraging individuals and organizations to practice good “cyber hygiene” is fundamental. This includes regular software updates, strong password management, and multi-factor authentication.

Securing the technology supply chain is becoming increasingly important. Organizations should verify the security of hardware and software components and assess their vendors’ cybersecurity practices.

Keeping abreast of the evolving threat landscape is vital. Continuous monitoring of networks and the collection of threat intelligence allow organizations to detect and respond to new threats in real-time.

Strong data protection laws, such as the European Union’s GDPR, help safeguard personal information. Compliance with these laws is a critical aspect of cybersecurity.

Regularly testing systems through penetration testing and red teaming exercises can identify vulnerabilities and weaknesses before cybercriminals do.

The prevention of cybercrimes and the enhancement of cybersecurity require a multifaceted approach that combines government policies, private sector cooperation, technological solutions, public awareness, and international collaboration. It’s an ongoing effort that needs to adapt to the evolving threat landscape, and it requires a collective commitment to mitigating cyber risks.

Key Terms/Concepts

Administrative controls
Cybersecurity strategy
Cybersecurity risk management (RM)
Enterprise risk management (ERM)
Internet of Things (IoT)
Password policy
Physical controls
Risk appetite
Risk exposure
Risk tolerance
Technical controls

Read, Review, Watch and Listen

  1. Read 5 elements to include in a cybersecurity strategy for any size business
  2. Read the United Nations Office on Drugs and Crime’s (UNODC) National cybersecurity strategies: Lifecycles, good practices and repositories
  3. Review Executive Order on Improving the Nation’s Cybersecurity (The White House Briefing Room, May 2021)
  4. Read What is risk management and why is it important? (Linda Tucci, Industry Editor — CIO/IT Strategy):
  5. Review The 12 Best Risk Management Software and Programs for 2023 (December 14, 2021 by Tess Hanna in Best Practices)
  6. Watch Internet of Things (IoT) | What is IoT | How it Works | IoT Explained | Edureka: (also embedded below)
  7. Watch Cisco’s What is IT Security?
  8. Watch Cisco’s Women in Cybersecurity (Dec. 2018) [also embedded below]
  9. Review What Are Security Controls? An overview of the types of countermeasures security practitioners use to reduce risk (By Debbie Walkowski, August 2019)

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.
Contact the professor with any course-related questions. Report any broken links to Dr. Ramirez-Thompson (thompsne@cod.edu).
REFER TO THE COURSE SYLLABUS TO DETERMINE ASSIGNMENT AND DUE DATE
ACTIVITY 12 – Password Protection within the Context of Computer Security
Note: This is a copy of the module’s activity that students find within Blackboard. For that reason, refer to the Activities page to submit your work for review.

PURPOSE

The single greatest problem in computer security is password protection. Although there are some basic do’s and don’ts, there are also sophisticated software programs that address the issue. The purpose of this activity is to explore challenges associated with passwords protection.

OVERVIEW

Several approaches to enhance password security have been taken, including password creation software, onetime password generators, and user authentication systems, e.g., biometric devices. There are a variety of software programs that system administrators can use to improve password security. Some programs force users to change their passwords on a regular basis. For example, every month or few months, or even every week.

INSTRUCTIONS

  1. Read 6 Practices to Strengthen Your Password Hygiene in 2020 (CISCOMAG, Dec. 2019): https://cisomag.eccouncil.org/6-practices-to-strengthen-your-password-hygiene-in-2020/
  2. Read Password hygiene fortifies defense against cyberattacks (VentureBeat, Nov. 2021): https://venturebeat.com/2021/11/02/password-hygiene-fortifies-defense-against-cyber-attacks/
  3. Watch How Your Passwords Were Stolen And Why You Were Hacked (see below): https://youtu.be/XXV7PDHTnas
  4. Visit the Password Meter website (http://www.passwordmeter.com/) and test a couple of your own passwords

ANSWER THE FOLLOWING QUESTIONS:

  • Per Password Meter, what was the Score for used passwords?
  • Per Password Meter, what was the reported Complexity for used passwords?
  • Based on the information within Chapter 14 and the Password Meter, would you consider updating your password? Why or why not? Explain.
  • From an information security and infrastructure protection position, explain why passwords are a dynamic challenge for both companies and end users.
KEY TERMS/CONCEPTS

Password hygiene – The degree to which a user’s passwords are selected and managed according to secure best practices.
Two-factor authentication – Also known as 2FA is a process which requires two steps to verify a user. Rather than just asking for a single piece of information – such as a password — two factor authentication goes a step further to enhance the level of security within the system.
Passphrase vs. password – Using a passphrase over a password will give you maximum security for your account. But make sure the passphrase you choose is easy-to-remember and complex, e.g., “I love my Computers & Criminal Justice class.” Pick a line from your favorite song or quotation, but preferably not a common one that can be simply guessed by someone who knows you.

Refer to the course learning management system (LMS); that is Blackboard (BB), for the correct due date. In addition, submit your work via BB for grading

Supplemental Resources

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Computers and Criminal Justice Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book