Wednesday, July 17, 2019
Does the government do enough to punish cyber-attacks & criminals?
1.0 IntroductionCyber-attacks hold back become a signifi burnt bother for selective breeding agreements (IS) worldwide. When referring to information placements, the precondition cyber-attack is used for denoting a leering action that aims to result to specific benefit, unremarkably financial, and which is genuine through online routes as in stock(predicate) in the Internet (Vacca, 2009). In the UK, the expansion of cyber- detestation has been quite rapid the last fewer years leading to yucky financial losses for the victims, individuals and businesses (Cabinet theatrical role, 2011). The graph in intention 1 shows the cost of the various theatrical roles of cyber hatred to the UK economy. This composition explores the effectiveness of measures interpreted by the UK political science in project to the penalisation of cyber-crime, aiming to show whether the live initiatives for the UK organization for sullen the cyber-crime be sufficient or not. The paper als o justifys the key characteristics and the value of information systems (IS) warrantor so that the authority of the UK governance to fix safety from cyber-crimes is evaluated. I go away argue that the UK presidential term does not seemly to punish cyber-attacks and criminals. Moreover, the introduction by the governance of stricter penalisation for cyber-attacks has not resulted to the limitation of this type of crime, as explained below. simulacrum 1 equal of different types of cyber crime to the UK economy (Cabinet Office, 2011, p.2)2.0 shelter of IS characteristics and importancecertificate, as a term, brush aside be relate to to different fields. In the context of use of information technology, the term protective cover is used for describing a power systems degree of risk in its ability to survive imminent disturbances without rift of customer inspection and repair (Cuzzocrea et al., 2013, p.244). As for the term IT protective covering, this term refers t o tierce determine/ characteristics of an IT system, such(prenominal) as confidentiality, integrity and availability (Katsikas, 2016, p.28). jibe to Mehdi (2014), the term IS credentials denotes the security of IS against unlicenced vex (p.4310). It is explained that a secure IS can ensure that its information pass on not be modified or lost (Mehdi, 2014). Also, such system is capable to detect early any security threat activating sequester auspices mechanisms (Merkow, 2010). At organizational level, IS security is ensured by utilise an IS security policy, i.e. a restrict of rules referring to the security standards that would apply in every IS of the organisation tang guide (Kim and Solomon, 2016). However, the demands of such policy can be many, a circumstance which is merelyified if considering the several types of IS threats (Cabinet Office, 2011 Figure 1). Organisations a good deal need to hire an culture system tribute ships officer (ISSO) for ensuring I S security (Kovachich, 2016).3.0 The penalization of cyber-attacks and criminals politics initiatives and cause3.1 Laws and policies focus on IS security In the UK, the first legal philosophy addressing cyber crimes appeared in 1990 and aimed to cover the gaps of existing order in weigh to the bulwark of IT systems from cyber-attacks (Emm, 2009). This was the 1990 calculator pervert Act. The introduction in the UK of a legislative text focusing on cyber-attacks has been extremely related to a cyber-attack incident the unauthorized access, by deuce cyber-attackers, to BTs Prestel service in 1984 (Emm, 2009). When dealing with the supra case, the solicit used the 1981 Forgery and Counterfeiting Act, due to the lack of a legislative text focusing on computer-related crimes (Emm, 2009). In May of 2015, the expert criminal offense Act 2015 came into action (Eversheds-Sutherland, 2015). The names 41 up to 44 of the to a higher place equity introduced stricter penaliz ation for cyber-crimes. More specific totallyy, in the context of the 1990 Computer Misuse Act the durance for serious cyber-crimes could not exceed the 10 years. With the 2015 Act, the imprisonment for cyber-crimes has been significantly outgrowthd, reaching the 14 years and even off, the life sentence in cases of cyber-crimes threatening subject area security (Eversheds-Sutherland, 2015). This, stricter, penalization for cyber-crimes could discourage cyber-criminals only if only if the enforcement of the law was appropriately support, so that all cases of cyber-crimes are brought before the courts (White, 2016).The case Cyber Security strategy (CSS) of 2011 has been an effort of the British government to run cyber-crime (Shefford, 2015). The Computer Emergency Response patrol squad up (CERT) is a national team that was open up in 2014 for component part towards the achievement of the purposes of CSS (Cabinet Office, 2014, p.13). The CERT team provides to organisatio ns in the private and the public sector critical information for the protection from cyber-attacks (Cabinet Office, 2014). Additionally, in the context of CSS, educational initiatives focusing on cyber security are highly-developed by institutions across the UK these initiatives are funded by the government and aim to achieve two targets First, to increase the awareness of the public in love to cyber security. Second, to help individuals to acquire skills which are inevitable for supporting cyber security and for facing cyber-attacks (Cabinet Office, 2014 Figure 2). The Cyber Security Challenge (CSC) is a plan developed by the UK government for helping childly people to understand the risks from using their cyber skills in the wrong way the architectural plan includes competitions and early(a) schemes that can motivate young people to use their cyber skills in a proactive way and not for the committedness of cyber crimes ( interior(a) Crime Agency, 2017).Figure 1 Initiat ives/ measures of the National CSS for facing cyber-crime (Cabinet Office, 2014, p.22)3.2 Cyber-attack incidents in governmental and non-governmental organisationsThe subroutine of cyber-attacks against governmental and non-governmental organisations in the UK is continuously increase (White, 2016). From January to October of 2016, 75 cyber-attacks have been reported against banks in the UK, while in 2014 these attacks were just louver (White, 2016). In 2013, three individuals in Britain were convicted to jail, from 6 months up to 22 months, for unauthorised access of sensitive private data memoryd in PayPal, Visa and Mastercard (McTague, 2014). The above penalisation was considered as too soft compared to the seriousness of the crime. In 2014, the government decided to initiate the adjustment of existing punishment for cyber-crimes, so that emerging perpetrators are discouraged from committing a cyber-crime (McTague, 2014). Pultarova (2016) argued that banks in the UK organiz ation cyber-attacks quite regularly that they avoid reporting the specific incidents nerve-racking to protect their market image. In November of 2016, prime minister P. Hammond noted that critical infrastructure units of the UK, such as airports and gas facilities, are peril by cyber-attacking techniques developed by other countries (BBC News, 2016). It was noted that the protection from such attacks would be a priority for the UK in guild for the regions security, at national level, to be ensured (BBC News, 2016). In 2011 the general police officer in the e-crime department of Scotland-Yard argued that the punishment of cyber crimes in the UK is too soft if considering the f existent modify that these crimes cause (BBC News, 2011). It was explained that the annual de record on the UK economy from cyber-crimes reaches the ?27bn (BBC News, 2011). In 2016, the National Crime Agency of the UK published a report for showing the status of cyber-crimes, in terms of occurrence/ rate of appearance. According to the above report, the cyber crime represents a study part of criminal activity in the UK, reaching the 36% among all crimes developed in the UK. At the same time, the crimes related to computer misuse reached the 17% among the countrys total crimes (National Crime Agency, 2016). The above figures and facts indicate the inability of the UK government to dominate cyber-crime. The introduction in 2015 of stricter punishment for cyber-crimes has been an of the essence(predicate) initiative by the UK government for unequivocal cyber-crime. However, this initiative should be combined with other measures, at national and at residential area level.In a speech in mid-February of 2017, Chancellor P. Hammond noted that in the introductory three months a total of 188 severe cyber-attacks had been reported these attacks aimed to cause severe damage to governmental services, infrastructure and businesses (Cole, 2017). A akin issue has been raised by gentl e West of Spithead who noted in 2010 that in 2009 the UK had to face 300 significant attacks on the IS of the government (Doward, 2010). According to Lord West, this paradox had become quite serious, denoting that the UK had been targeted by cyber criminals worldwide, as these attacks seemed to be supported by conflicting governments, as Lord West noted (Doward, 2010). The above arguments verify the existence of gaps in the existing national framework for the protection from cyber-attacks, as this framework constitutes the national rule and national policy for the attend of cyber crime. The facts presented above further verify the inability of the UKs policy to reduce the occurrence of cyber-crime.Guitton (2012) developed an experiment, using data related to cyber-attacks that occurred in the midst of 2003 and 2010 in businesses located in three European countries Germany, UK and France. It was revealed that the relationship among attribution and deterrence is strong only in cases of individuals of individuals who are aware of the existing legislation for cyber-crime and who can realise the actual effects of their actions. These individuals represented the 1/3 of the cases re take ined by Guitton (2012). In opposition, it was found that most individuals involved in cyber-crimes are not full aware of the relevant legislation and they tilt to ignore the effects of their actions. For these individuals, the control system which emphasises on the power of attribution, as held by the state, to ensure deterrence is not applied, as Guitton (2012) argued. In the context of the above study, the potential of the British government to control cyber-crime is limited. This fact, even it would be accepted, could not affect the view on the governments efforts to exhibit cyber-crime. The update of the terms of punishment of cyber-crimes just in 2015 and the lack of effective control mechanisms for identifying and reporting cyber attacks verify the failure of the go vernment to ensure the punishment of cyber-attacks and criminals.4.0 Conclusion and RecommendationsIt is reason out that the UK government does not make becoming to punish cyber-attacks and criminals. First, a significant clasp has been identified in the introduction of appropriate/ fair penalties. Indeed, the introduction of strict punishment for cyber-crimes took place just in 2015, as explained above. The facts and views presented in this paper lead to the guess that for many years, the government has avoided awaiting cyber-attacks as a criminal activity, a fact that led to the radical increase of cyber-attacks against IS systems in governmental services and in financial institutions. At the same time, IS security has several aspects, heart and soul that eliminating cyber crime is rather impossible. The soft punishment framework for cyber-crimes, as used in the past, has led to the severe deterioration of the problem across the UK. The increase of effectiveness of current legislation, as from May 2015, on cyber-attacks could be achieved through certain practices, such as First, events and seminars would be organized at corporation level for informing individuals on the characteristics of cyber-attacks and the on tap(predicate) measures for protection these seminars would also provide guidelines to entrepreneurs in regard to the value of IS security policy, as part of business strategy. Second, incentives would be provided to entrepreneurs for move the certification of their business according to the information security treatment standards, such as the ISO/IEC 27000 standards. Third, an independent authority would be launch for controlling the performance of governmental and non-governmental organisations in regard to IS safety. Finally, the investment on IS security in governmental and non-governmental organisations would be increased. Security frameworks, such as the Intrusion spying System (IDS), could be employed in these organisations for ensuring IS security in IS systems that manage and store high volume of private data (Stair and Reynolds, 2015, p.460).5.0 Personal reflections This project has been related to a critical issue the findings in regard to the studys subject have been contradictory. More specifically, the UK government has tried to confront cyber-attacks through legislation and relevant policies but the punishment for these crimes has been characterised as soft, at to the lowest degree up to 2015, while the number of cyber-attacks in the UK is continuously increased. Under these terms, I had to face a dilemma how should the performance of the UK government in facing cyber-crime would be evaluatedBy referring to the initiatives taken or by emphasising on the actual results of these initiativesReflection has helped me to face the above problem. Indeed, reflection can help the look intoer to have an objective sense of things (Gillett et al., 2013, 85). Moreover, using reflection I tried to estimate th e balance amongst the positive and negative aspects of governments efforts to punish cyber-crime and to understand which aspect of the governments strategy against cyber-crime is more related to the research question this paper aims to explain whether the government has done enough on the punishment of cyber-crime. Through reflection, I tacit that the occurrence of cyber-attacks in the UK should be best-loved as the criterion for respond the research question. Ventola and Mauranen (1996) explained that reflection can help the detective to identify the research findings that are walking(prenominal) to the research question, a fact that allows the police detective to use the right material for answering the research question. Additionally, I used reflection during the development of the study for managing time and for tracking research gaps, which have been covered later on the completion of the project. The above tasks have been supported by a research diary (Day, 2013), in t he form of notes, where daily hap in regard to research and piece of music was reported. Thus, the use of reflection while develop this project helped me to control risks, in regard to the projects structure and heart and soul, and to manage time more effectively, covering all aspects of the research question.6.0 References BBC News (2016) UK must strike back against cyber-attacks adduces chancellor. useable from http//www.bbc.com/ news program/technology-37821867 Accessed 15 borderland 2017.BBC News (2011) Cyber criminals should get tough sentences say police. useable from http//www.bbc.com/news/uk-15680466 Accessed 15 border district 2017.Cabinet Office (2011) The cost of locker crime. Available from https//www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf Accessed 15 meet 2017.Cabinet Office (2014) The UK Cyber Security Strategy. Report on maturate and Forward Plans. Available from https//www.gov.uk/governme nt/uploads/system/uploads/attachment_data/file/386093/The_UK_Cyber_Security_Strategy_Report_on_Progress_and_Forward_Plans_-_De___.pdf Accessed 15 March 2017.Cole, H. (2017) UK governing body and businesses are hit by two serious cyber-attacks a day. The Sun. Available from https//www.thesun.co.uk/news/2857508/uk-government-and-businesses-are-hit-by-two-serious-cyber-attacks-a-day/ Accessed 15 March 2017.Cuzzocrea, A., Kittl, C., Simos, D., Weippl, E. and Xu, L. (2013) Availability, Reliability, and Security in entropy Systems and HCI IFIP WG 8.4, 8.9, TC 5 outside(a) Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceedings. New York Springer.Day, T. (2013) Success in Academic paper. Oxford Palgrave MacmillanDoward, J. (2010) Britain fends off flood of foreign cyber-attacks. The Guardian. Available from https//www.theguardian.com/technology/2010/mar/07/britain-fends-off-cyber-attacks Accessed 15 March 2017.Emm, D. (2009) Cybercrime and the law a refresh of UK computer crime legislation. SecureList. Available from https//securelist.com/ analysis/publications/36253/cybercrime-and-the-law-a-review-of-uk-computer-crime-legislation/ Accessed 15 March 2017.Eversheds-Sutherland (2015) Will the estimable Crime Act 2015 toughen the UKs cybercrime regimeAvailable from http//www.eversheds-sutherland.com/global/en/what/articles/index.page?ArticleID=en/tmt/Serious_Crime_Act_2015_May2015 Accessed 15 March 2017.Gillett, A., Hammond, A. and Martala, M. (2013) Inside Track to fortunate Academic Writing. Essex Pearson Education.Guitton, C. (2012) Criminals and Cyber Attacks The Missing Link between Attribution and Deterrence. International Journal of Cyber Criminology, 6(2), pp.1030-1043.Katsikas, S. (2016) breeding Systems Security Facing the information alliance of the 21st century. New York Springer.Kim, D. and Solomon, M. (2016) Fundamentals of Information Systems Security. Sudbury Jones & bartlett Publishers.Kovachich, G. (2016) The Information Systems Security Officers Guide Establishing and Managing a Cyber Security Program. Oxford Butterworth-Heinemann.McTague, T. (2014) Computer hackers face life in prison under new political science crackdown on cyber terrorism. Mail Online. Available from http//www.dailymail.co.uk/news/article-2649452/Computer-hackers-face-life-prison-new-Government-crackdown-cyber-terrorism.html Accessed 15 March 2017.Mehdi, K. (2014) Encyclopedia of Information Science and Technology. Hershey IGI Global.Merkow, M. (2010) Security Policies and Implementation Issues. Sudbury Jones & Bartlett Publishers.National Crime Agency (2017) Cyber crime preventing young people from being involved. Available from http//www.nationalcrimeagency.gov.uk/crime-threats/cyber-crime/cyber-crime-preventing-young-people-from-getting-involved Accessed 15 March 2017.National Crime Agency (2016) Cyber Crime Assessment 2016. Available from http//www.nationalcrimeagency.gov.uk/publications/709-cyber-crime-as sessment-2016/file Accessed 15 March 2017.Pultarova, T. (2016) UK banks under constant cyber-attack but dont report incidents. Engineering & Technology. Available from https//eandt.theiet.org/content/articles/2016/10/uk-banks-under-constant-cyber-attack-but-dont-report-incidents/ Accessed 15 March 2017.Shefford, M. (2015) What is the UK government doing about cybersecurityDatonomy. Available from http//datonomy.eu/2015/04/01/what-is-the-uk-government-doing-about-cybersecurity/ Accessed 15 March 2017.Stair, R. and Reynolds, G. (2015) Fundamentals of Information Systems. 8th ed. Belmont Cengage Learning.Vacca, J. (2009) Computer and Information Security Handbook. Burlington Morgan Kaufmann.Ventola, E. and Mauranen, A. (1996) Academic Writing Intercultural and textual issues. John Benjamins Publishing.White, L. (2016) British banks admit cyber-attacks under wraps to protect image. Reuters. Available from http//uk.reuters.com/article/us-britain-banks-cyber-idUKKBN12E0NQ Accessed 15 Mar ch 2017.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.