Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet123/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   119   120   121   122   123   124   125   126   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

115
 
Strategic responses to cyber attacks
curiosity or a method for testing weaknesses in security systems, Calce' DDoS at-
tacks are thought to have costs companies in excess of $1 billion (CAD) according to 
various media sources (
Niccolai, 2000
).
STRATEGIC RESPONSES TO CYBER ATTACKS
Having explored the different cyber cases above it is also important to highlight that 
different countries use different strategies for dealing with these attacks. Below is a 
brief overview of the UK, USA's, and EUs strategies for dealing with cybercrime.
The Comprehensive National Cyber security Initiative set up by the US gov-
ernment in 2008 consists of the following goals which are designed to help secure 
the US:
• To establish a front line of defense against today's immediate threats
• To defend against the full spectrum of threats
• To strengthen the future cyber security environment
The document also lists 12 key initiatives:
• Manage the Federal Enterprise Network as a single network enterprise with 
trusted internet connections
• Deploy an intrusion detection system of sensors across the Federal enterprise
• Pursue deployment of intrusion prevention systems across the Federal enterprise
• Co-ordinate and redirect research and development (R&D) efforts.
• Connect current cyber ops centers to enhance situational awareness
• Develop and implement a government-wide cyber counterintelligence (CI) plan
• Increase the security of our classified networks
Expand cyber education
• Define and develop enduring “leap-ahead” technology, strategies, and programs
• Define and develop enduring deterrence strategies and programs
• Develop a multi-pronged approach for global supply chain risk management
• Define the Federal role for extending cyber security into critical infrastructure 
domains (
The White House, 2009
).
The Department of Defense Strategy for Operating in Cybercrime (2011) has Five 
Strategic Initiatives:

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   119   120   121   122   123   124   125   126   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish