A_Global_Protocol_on_Cybersecurity_and_Cybercrime.pdf

The real cybersecurity challenge is to keep security

Info icon This preview shows pages 27–29. Sign up to view the full content.

View Full Document Right Arrow Icon
The real cybersecurity challenge is to keep security handling simple, effective and effi- cient at national and international levels. Without the will to integrate all components of a security system using a systemic approach, security solutions will not be able to correctly protect a distributed and ever- more mobile ICT infrastructure. It is illusory to think that technological or legal solutions will compensate for design or management errors whether they occur at a strategic, tactical, or operational level. The legal and technological world must be in harmony. Technology is not neutral, nor is the law. Let us make it such that their development follows economic develop- ment, and that they become a driving force for the economy. Increasing awareness is fundamental but not sufficient to fight against cybercrime Increasing awareness among all information society actors and stakeholders is fundamen- tal but not sufficient to fight against cybercrime. Usual security policy prevention meas- ures consist on raising the overall level of risk taken by criminals and by deceasing profitable expectations. That implies capacities to detect criminals’ activities over the Internet, to localize, to identify and pursue criminals. To achieve it, complementary legal, organizational and technical measures and resources should exit and be efficient at local and international levels. As criminal’s exploits Internet vulnerabilities, less weaknesses should contribute to decrease criminal opportunities. That means that is necessary to improve and enforce information technologies ro- bustness and information security technical, procedural and organisational measures. Doing that, the level of difficulty of an attacks is augmented and the related cost in terms of efforts, means and know how needed to perpetrate an illicit action is increased. All in
Image of page 27

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
19 all, a global, comprehensive and integrative information security approach will contrib- ute to reduce information society threats and risks. Today, a relative deficiency still exists of: x A global and well understanding culture of cybersecurity for all the actors of the information society; x Adequate legal, organisational and technical measures; x International cooperation to fight against cybercrime and enforce ICT infrastructures security. It points out urgent requirements present at international, regional and national levels, to resolve the capacity building problem in order to obtain confidence and security in the use of ICTs, as identified by the World Summit on the Information Society 7 (Geneva 2003, Tunis 2005) and by the Global Cybersecurity Agenda ITU’s initiative launched on World Telecommunication and Information Society day 2007 by Dr Hamadoun Touré Secretary-General of ITU. 8 In a global protection strategy, fighting cybercrime effectively involves: x Increasing the level of effort the criminal has to make to perpetrate a crime by the use of effective technical and procedural cybersecurity measures; x
Image of page 28
Image of page 29
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern