Cybersecurity and cybercrime prevention: strategies, policies, and programs

Module 12 provides a comprehensive overview of the fundamental principles, objectives, and strategies involved in national and international cybersecurity efforts. Learners will begin by exploring the essential features of cybersecurity strategies, gaining a clear understanding of the distinctions between cybersecurity and cybercrime prevention. The course will delve into the core objectives and lifecycle stages of national cybersecurity strategies, equipping students with the skills to analyze and evaluate how these strategies protect critical infrastructure and information assets.

The module also provides a global perspective, introducing frameworks for international cooperation on cybersecurity. By assessing both national and international cybersecurity initiatives, learners will develop a nuanced understanding of how countries work both independently and collaboratively to strengthen their cybersecurity postures.

A critical component of the course involves the concept of risk in the context of information security, focusing on the key principles of risk analysis and risk management. Therefore, this module’s review and discussions on identifying, assessing, and mitigating risks to information and infrastructure, emphasizing the importance of these practices in enhancing overall security is an essential element.

Finally, the module covers the primary technologies used in cybersecurity, such as firewalls, encryption, intrusion detection systems, and other tools essential for information protection. By the end, students will be equipped to understand and evaluate the complexities of cybersecurity at both national and international levels and be prepared to contribute meaningfully to cybersecurity planning and policy efforts, the basic features of cybersecurity strategies and differentiate between cybersecurity, and cybercrime prevention strategies.


Learning Objectives

After completing this module, you should be able to:

  • describe the basic features of cybersecurity strategies and differentiate between cybersecurity and cybercrime prevention strategies.
  • explain and evaluate the objectives and lifecycle of national cybersecurity strategies.
  • identify, examine, and evaluate frameworks for international cooperation on cybersecurity matters.
  • assess national and international efforts to enhance our countries’ cybersecurity posture.
  • understand the concept of risk as applied to information security and infrastructure protection.
  • discuss the major principles of risk analysis.
  • identify and define the primary security technologies used to protect information.

Summary

Cybersecurity and cybercrime prevention are critical in our increasingly digital and interconnected world. To address these issues effectively, governments, organizations, and individuals must implement a range of strategies, policies, and programs.

Many countries have developed national cybersecurity strategies that outline their approach to protecting critical infrastructure and securing cyberspace. These strategies often involve collaboration between government agencies, the private sector, and other stakeholders.

Laws and regulations play a crucial role in deterring cybercriminals. Governments enact cybersecurity laws that define cybercrimes and outline penalties. Regulations may also require organizations to adhere to certain security standards.

Collaboration between government entities and private sector organizations is essential. Public-private partnerships facilitate the sharing of threat intelligence, best practices, and resources for a more robust defense against cyber threats.

Raising awareness about cybersecurity is key to preventing cybercrimes. Programs that educate individuals and organizations about safe online practices, phishing awareness, and data protection are crucial.

Developing and regularly testing incident response plans is essential. These plans help organizations minimize the damage from cyberattacks and recover swiftly.

ISACs are organizations that facilitate information sharing among industry peers and government agencies. They help organizations stay informed about emerging threats and vulnerabilities.

Regular security audits and risk assessments help organizations identify vulnerabilities and weaknesses in their cybersecurity posture. These evaluations can inform necessary improvements.

Implementing advanced cybersecurity technologies, such as intrusion detection systems, firewalls, antivirus software, and encryption, is critical. Emerging technologies like AI and machine learning are also being used to enhance security.

Cyber threats are not limited by borders, so international collaboration is essential. Sharing threat intelligence, harmonizing cybersecurity standards, and cooperating on cybercrime investigations are ways to combat transnational cybercriminals.

There is a growing need for skilled cybersecurity professionals. Training programs, certifications, and initiatives to attract and retain cybersecurity talent are crucial.

Encouraging individuals and organizations to practice good “cyber hygiene” is fundamental. This includes regular software updates, strong password management, and multi-factor authentication.

Securing the technology supply chain is becoming increasingly important. Organizations should verify the security of hardware and software components and assess their vendors’ cybersecurity practices.

Keeping abreast of the evolving threat landscape is vital. Continuous monitoring of networks and the collection of threat intelligence allow organizations to detect and respond to new threats in real-time.

Strong data protection laws, such as the European Union’s GDPR, help safeguard personal information. Compliance with these laws is a critical aspect of cybersecurity.

Regularly testing systems through penetration testing and red teaming exercises can identify vulnerabilities and weaknesses before cybercriminals do.

The prevention of cybercrimes and the enhancement of cybersecurity require a multifaceted approach that combines government policies, private sector cooperation, technological solutions, public awareness, and international collaboration. It’s an ongoing effort that needs to adapt to the evolving threat landscape, and it requires a collective commitment to mitigating cyber risks.

Key Takeaways

Click on the > to expand the related statement.

Key Terms/Concepts

Click on the following key term/concept to view the definition:

Administrative controls
Cybersecurity strategy
Cybersecurity risk management (RM)
Enterprise risk management (ERM)
Internet of Things (IoT)
Password policy
Physical controls
Risk appetite
Risk exposure
Risk tolerance
Technical controls

Read, Review, Watch and Listen

  1. Read 5 elements to include in a cybersecurity strategy for any size business
  2. Read the United Nations Office on Drugs and Crime’s (UNODC) National cybersecurity strategies: Lifecycles, good practices and repositories
  3. Read What is risk management and why is it important? (Linda Tucci, Industry Editor — CIO/IT Strategy)
  4. Review Executive Order on Improving the Nation’s Cybersecurity (The White House Briefing Room, May 2021)
  5. Review What Are Security Controls? An overview of the types of countermeasures security practitioners use to reduce risk (By Debbie Walkowski, August 2019)
  6. Review The 12 Best Risk Management Software and Programs for 2024 (December 14, 2021 by Tess Hanna in Best Practices)
  7. Watch Internet of Things (IoT) | What is IoT | How it Works | IoT Explained | Edureka!: (also embedded below)
  8. Watch Ring, Amazon sued over string of hacked security cameras | ABC News (Dec. 2019) [also embedded below]
  9. Watch Cisco’s What is IT Security?click on Watch overview (2:17)
  10. Watch Cisco’s Women in Cybersecurity (Dec. 2018) [also embedded below]

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.
Contact the professor with any course-related questions. Report any broken links to Dr. Ramirez-Thompson (thompsne@cod.edu).

Activity – Password Protection within the Context of Computer Security

STOP!!

Students should review the course syllabus to determine the assignment of this activity.

This is a copy of the module’s activity that students find within Blackboard. For that reason, refer to the Activities page to submit your work for review.

PURPOSE

The single greatest problem in computer security is password protection. Although there are some basic do’s and don’ts, there are also sophisticated software programs that address the issue. The purpose of this activity is to explore challenges associated with passwords protection.

OVERVIEW

Several approaches to enhance password security have been taken, including password creation software, onetime password generators, and user authentication systems, e.g., biometric devices. There are a variety of software programs that system administrators can use to improve password security. Some programs force users to change their passwords on a regular basis. For example, every month or few months, or even every week.

INSTRUCTIONS

  1. Read 6 Practices to Strengthen Your Password Hygiene in 2020 (CISCOMAG, Dec. 2019)
  2. Read Password hygiene fortifies defense against cyberattacks (VentureBeat, Nov. 2021)
  3. Read Davey Winder’s, Smart Guessing Algorithm Cracks 87 Million Passwords In Under 60 Seconds (Forbes, June 2024)
  4. Watch How Your Passwords Were Stolen And Why You Were Hacked (see below)
  5. Visit the Password Meter website and test a couple of your own passwords

 

ANSWER THE FOLLOWING QUESTIONS:

  • Per Password Meter, what was the Score for used passwords?
  • Per Password Meter, what was the reported Complexity for used passwords?
  • Based on the information within Module 12 and the Password Meter, would you consider updating your password? Why or why not? Explain using key terms and concepts presented within this module.
  • From an information security and infrastructure protection position, explain why passwords are a dynamic challenge for both companies and end users. Be specific.

KEY TERMS/CONCEPTS

Password hygiene – The degree to which a user’s passwords are selected and managed according to secure best practices.
Two-factor authentication – Also known as 2FA is a process which requires two steps to verify a user. Rather than just asking for a single piece of information – such as a password — two factor authentication goes a step further to enhance the level of security within the system.
Passphrase vs. password – Using a passphrase over a password will give you maximum security for your account. But make sure the passphrase you choose is easy-to-remember and complex, e.g., “I love my Computers & Criminal Justice class.” Pick a line from your favorite song or quotation, but preferably not a common one that can be simply guessed by someone who knows you.

Refer to the course learning management system (LMS); that is Blackboard (BB), for the correct due date. In addition, submit your work via BB for grading

Supplemental Resources

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Click HERE to report any needed updates, e.g., broken links.

 

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Computers and Criminal Justice Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book