A_Global_Protocol_on_Cybersecurity_and_Cybercrime.pdf

Legal dimension a cyberspace regulatory framework

Info icon This preview shows pages 19–21. Sign up to view the full content.

View Full Document Right Arrow Icon
Legal dimension A cyberspace regulatory framework could help to transform the Internet into a safer place to conduct activities. An adapted legal framework and laws that are applicable to the digital world must be operational at the national level and internationally compati- ble. Security solutions can protect a given environment in a particular context, but can- not prevent criminal behaviour altogether. Legal institutions and the law exist to dissuade criminal behaviour and to bring to justice people who carry out illegal acts. At the same time qualified justice system and police authorities skilled in new tech- nologies and cybercrime should enforce the legal aspects of information technologies and cooperate with their partners at the international level. Taking into account the legal dimension and specific needs for justice and police professionals, Global understanding of legal issues related to ICT technologies and mis- uses should be apprehended, that means the understanding of: x Legal requirements at national and international levels; x Computer investigation and forensic methodologies and tools; x How to interpret and implement existing international regulation as Cybercrime convention of Council of Europe (doctrine) that could be considered as an international reference model to develop legal frameworks and international coop- eration. This requires a common understanding of computer related crime and of international collaboration in order to fight against cybercrime and deals with global cyberthreats. They should be able to: x Define a legal framework, appropriate cyberlaws enforceable at national level and compatible at the international level; x Develop measures to fight against cybercrime and to be able to collaborate at an international level.
Image of page 19

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
11 Organizational dimension If we consider the business and organisations points of view, executive managers of any size organisation (including small and medium enterprises) should understand basic principles in ICT security management, in particular on the following topics: x Assessments of vulnerabilities and threats; x Security mission, management practices and conditions of success; x How to identify valuable assets and related risks; x How to define security policy; x How to organize security mission, to control, to evaluate, to audit, to estimate cost; x How to manage security in complex and dynamic environments. In order to be able to: x Produce effective security process and master ICT related risks and security costs; x Collaborate with legal, law enforcement and technical professionals; x Create appropriate organizational structures and procedures. Technological dimension Concerning the technology dimension of cybersecurity ICT professionals should: x Understand ICT technical vulnerabilities and misuse; x Understand ICT related risks, cyberthreats and cyberattacks; x Understand societal and organizational issues and values.
Image of page 20
Image of page 21
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern