SlideShare a Scribd company logo
1 of 16
Download to read offline
1
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
Essay writing | Online Assignment help | Homework help service
www.studentsassignmenthelp.com
Email: info@StudentsAssignmentHelp.com
2
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
Cyber Security Issue- Part B
3
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
International Cooperation in combating with cyber crime
In existing period of time, cyber crime has become one of major threats in front of the
government of different country. The Increasing severity of cyber crime has attracted the
significant attention of international community. As the nature and landscape of cyber crimes has
become quite changed in recent period of time as cyber crimes have become more organized.
Moreover the span of such kind of crimes has also become quite expanded at global level. Owing
to this reason, there is a need of an intensive cooperation of the entire international society.
In direction to have some significant and effective combat with cyber crime at
international level, international society is making some crucial and integrated efforts. In the
same series, International Criminal Police Organization – INTERPOL has started some crucial
efforts of combining strategies of different countries against cyber crime so that an effective and
universal problem can be found out. Among such efforts of INTERPOL, establishment of
INTERPOL Global Complex for Innovation (IGCI) in Singapore in 2014 is one of the most
mentionable efforts. The IGCI will work as the center of excellence for addressing different and
critical cyber crime across the globe. This complex will be directed to create an alliance with
internet security specialists from different nations and develop an international model for
ensuring the prevention of cyber crimes at international level. Moreover, administration of global
law and its enforcement is also one of the major responsibilities of this international complex1.
1
John E Dunn. Interpol should lead global cybercrime fight, says director. (Apr 2013)
<http://news.techworld.com/security/3438714/interpol-should-lead-global-cybercrime-fight-says-
director/>
4
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
Unlike other types of crimes, prevention of cyber crimes requires an intensive amount of
technical efficiency and expertise, highly developed and updated infrastructure, and integration
of the strengths of different nations. From the perspective of international security, it is quite
essential to have better and effective exchange of information and technologies among different
nations. In such scenario, an intensive cooperation among countries at international level
becomes quite essential. Along with such reason, the international cooperation is also required to
have better and effective enforcement of law, prioritization of resources and buildings cross-
sectorial and cross-jurisdictional collaboration2.
Another crucial example of international cooperation for fighting against cyber crime can
be seen in the operational partnerships developed by the United States and the European Union
for developing an informal but effective model for cyber security. For the purpose of fighting
against cyber crime, in 2001, the Council of Europe has proposed a treaty, which is known as the
Budapest Convention on Cybercrime. This convention was ratified by the US and other 30
different nations later. The prime highlight of this treaty is that it prepares a unified legal
framework on which crucial information can be shared among member countries of the treaty so
that different types of critical cyber crimes such as network or computer breaches, copyright
infringement, Cyber spying, Hacking of data, and child pornography can be prevented in the
most effective manner. Since, the USA and European Union can be considered as major powers
2
Imran Awan,and Brian Blakemore. Policing Cyber Hate Cyber Threatsand Cyber Terrorism (Ashgate
Publishing, Ltd., 2012).
5
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
in the context of information technologies across the world, this cooperation can be proved quite
effective and crucial for prevention of organized cyber crime at international level3.
Another crucial example of international cooperation for preventing cyber crimes is the
strategic partnership between the US and China. In the year, 2012, defense ministers of both the
nations become agreed on enhancing mutual coordination in the context of technical expertise so
that an effective framework for preventing cyber attacks and crimes related to national security
can be minimized in the most effective manner. As the US and China is the prime locations for
cyber criminals, this partnership may be prove quite potential from the perspective of
international cyber crime prevention. However, this partnership came after the political tension
between both the country regarding cyber attack and spying4.
In addition to this, the NATO (North Atlantic Treaty Organization) has also undertaken
some of the critical steps for the purpose of ensuring cyber security across the globe. In the same
series, there are some countries, namely Bulgaria, Estonia, Poland, Slovakia, Turkey, the United
Kingdom, and the United States which has signed agreement with NATO to have international
cooperation for fighting against cyber crime. Among such efforts, the NATAO has strengthened
the powers and responsibilities of Cooperative Cyber Defence Centre of Excellence. This center
is serving as a hub for different countries across the globe to integrate and apply their strengths
for controlling cyber crime in the most effective manner. Different European and Latin American
3
Richard Schaffer,Filiberto Agusti, and Beverley Earle. International BusinessLaw and Its Environment
South-Western legal studies in business(Cengage Learning,2008).
4
Cyber Espionage: The Chinese Threat (2010). CNBC < http://www.cnbc.com/id/47962225>
6
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
countries such as Germany, Hungary, Italy, Latvia, Lithuania Spain, and the Netherlands are the
active partners of this center, which work together for improving cyber defense interoperability
among them5.
Although, there are some crucial examples available regarding international integration of
different countries for preventing cyber crimes, yet still such efforts are not quite enough. As the
span of the international cyber crime is too broad for such types of cooperation. There is a need
of having integrated and combined efforts from different communities across the world. In
existing period of time, although different countries and groups across the globe are making
alliances for fighting with such crimes, yet there is a lack proper organization and integration of
such efforts at international level. Moreover, it has also been evident that only developed
countries, which are more exposed towards the threat of cyber crime, are interested in such type
of integration of power and expertise. There is a lack of participation of developing and under
developed nation in such type of crucial international integration. This scenario can be proved
quite harmful in preparing a unified protection shield at international level against cyber threats.
In direction to this, the role of international organizations such as the United Nations,
International court or the WTO becomes quite vital in pursuing member countries including
developing and developed to integrate their strengths towards prevention of cyber security
crime6.
5
NATO opens new centre of excellence on cyber defence. (May 2008). NATO <
http://www.nato.int/docu/update/2008/05-may/e0514a.html >
6
Imran Awan, and Brian Blakemore. Policing Cyber Hate Cyber Threatsand Cyber Terrorism (Ashgate
Publishing, Ltd., 2012).
7
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
In addition to this, another critical problem faced by international players in maintaining
effective coordination towards cyber crime prevention is related with unclear and confusing role
of government in preventing such types of serious threats. In existing period of time, there is no
any clear rule defined in any of the law that can be able to define the role and responsibilities of
government of a country in the prevention of cyber crime. As per one view, internet can be taken
as private sector innovation on which there is no role of the government, while as per the other
view since the crimes committed on the internet are presenting some serious threat to the
national security, the intervention of the government becomes quite essential. Along with this,
cyber security sometime judged as job of the military while, sometime its nature advocates its
civil domain. This confusing role of the government has made the international integration of
different countries over preparing an effective and strategic partnership over prevention of cyber
crime7.
On the basis of the analysis of the findings of the essay, it can be revealed that there are
some of the critical threats related with cyber security at global level. In direction to this, there is
a need of having some intensive amount of international cooperation. In this context,
international society has undertaken some integrated steps which can be proved quite effective in
making the international arena free from cyber crimes. Although, there are some critical issues in
maintaining an effective environment for international security against cyber crime, yet different
7
Bernadette Hlubik Schell. The Internet and Society: A Reference Handbook. (ABC-CLIO,2007).
8
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
efforts of international society for maintaining international cooperation can be proved quite
effective from the long term perspective.
9
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
Government Control over Internet Content
In existing period of time Internet has been emerged as one of the major ways of
information exchange. Internet based applications have started to be used as the major means of
information creation, manipulation, up-gradation, transfer and dissemination among people.
Although there are a number of different security related threats such as distortion of the
information and hacking of important and confidential information, yet because of intensive
benefits of internet, usage of internet for information exchange has become quite popular.
However, because of different issues there is a need of keep control over contents published on
the internet so that maximum advantages of internet can be availed8.
In recent period of time, a number of different cases related with information leakage
from the internet have come into lime light, which has highlighted the requirement of scrutiny of
information and content available on internet. In direction to this, for the government of a nation,
it is quite essential to have some crucial guidelines for deciding the viability of the content
available on the internet so that misuse and misinterpretation of information cannot be possible.
As per the local law, the government of a particular country can ban any objectionable material
published on the internet, which can be proved harmful for financial, social, cultural or political
sovereignty of that country. As at international standards there no any specific guidelines or law
8
Jeremy Malcolm. Consumers in the Information Society: Access,Fairnessand Representation
(Consumers International 2007).
10
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
that decides that what content on the internet should be banned or not, it all depends upon the
understanding and decision of the local government to ban any content available on internet9.
There are some common types of material that should be banned on the internet by the
government of different countries. In this context, all the websites and web based servers that
engage in spying on individual and other nations should be banned. Such type of contents directs
to leak some crucial and confidential information data regarding political, economic and defense
of a country. The nature of such information is quite exclusive as the misuse of such information
can harm the sovereignty and sustainability of the country. The open availability of such type of
information with the help of internet can be proved quite helpful for competitive or rival
countries to harm that country. Recently, the USA has alleged China for unauthorized access and
hacking of its highly confidential data. As per the USA official with the help of cyber spying,
China has acquired some crucial confidential information regarding economic status of the
country, which can present a significant threat to economic security of the country. This incident
presents some crucial example of the harmfulness of publishing country specific confidential
data on the internet10. In this way, it can be considered that availability of such type of crucial
information on the open network should be monitored and controlled by the government of the
country.
9
Jeremy Malcolm. Consumers in the Information Society: Access,Fairnessand Representation
(Consumers International 2007).
10
Cyber Espionage: The Chinese Threat (2010). CNBC < http://www.cnbc.com/id/47962225>
11
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
In addition to this, the government should also ban the content available on the website
that can spread rumors and fear among common people. The availability of some provocative
speeches, literatures and contents including criminal activity or accidents and footage of real or
simulated violence can lead to ignite riots and civil mutiny within the society that can be proved
quite harmful from the perspective of the sustainability of the society. In this context it becomes
quite essential for the local government to control the availability of such type of harmful
contents on the internet. Many governments undertake such type of steps in the conditions of
political violence within the country. For instance, in the recent political crisis in Egypt, the
president has imposed ban on social media sites, such as Facebook, twitter for the purpose
controlling civil war. Moreover the government has banned websites that promotes and
intensively publishes extreme political views against the government as such views are generally
undertaken for the radicalizing of vulnerable members of the society and ignite riots and civil
war within the country11.
Moreover in the process of policy formulation by the government of a country, the
unauthorized access of some crucial information via internet can be proved quite harmful and
problematic. Sometime government publishes it strategic intentions and visions regarding some
particular project on the internet so that common public can also be aware about the actions of
the government regarding overall development and growth of the society. However, sometimes
availability of such type of strategic information can be proved quite harmful as hackers can
misuse such information to disturb the strategic planning of the government of that country. In
11
Michael Hatamoto. Egypt Internet Ban Lingers, Users Adjusting. (Feb 2011). Daily Tech
<http://www.dailytech.com/Egypt+Internet+Ban+Lingers+Users+Adjusting+/article20799.htm>
12
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
this regard, it can be considered that availability of such crucial type of strategic information
should also be restricted on the internet12.
Along with some crucial benefits, internet can also be proved as a source of different
issues of crimes related to monetary frauds and cheatings. In this context, there are a number of
websites available on the websites that engages in activities like online gaming, bidding, bating
and gambling. These websites entice innocent people by showing fake offers on websites. Under
the influence of such offers, people invest their hard earned money on such sites. In this way,
with the help of internet, such type of unlicensed, illegal and unauthorized websites cheat
innocent users easily. Due to such incidents, people have to bear some intensive amount of
monetary and non-monetary loss, which resulted to high degree of stress to the user. Owing to
this, reason, the government of the country should intervene in such conditions and undertake
some effective and applicable actions13. Among such actions, the ban on such type of
unauthorized, illegal and unlicensed websites of online gaming and gambling should be implied
so that the degree of financial frauds and cheating can be controlled in the most effective
manner.
Another crucial issue related to internet usage is related with the social degradation
because of unethical and objectionable contents widely and openly available on the different
12
Andrea Millwood Hargrave, and Sonia M. Livingstone. Harmand Offence in Media Content: A Review
of the Evidence (Intellect Books, 2009).
13
Should Offensive material be banned from the Internet? (May 2009). Eponymous. <
http://www.liamalexander.com/edublog/2009/05/should-offensive-material-be-banned-from-the-
internet/>
13
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
websites. Among such content, pornography is one of the most objectionable material available
of different open websites on internet. In existing period of time, different sexually explicit and
adult contents are easily available on internet. Majority of users of such contents are children or
teenagers. Such type of contents leads to decrease the ethical and moral value of a person down
since from his childhood. From the perspective of sustainability of the society this situation can
be proved quite harmful. In addition to this, contents that support social differences on the basis
of race, religion, caste, sexual preference or other social/cultural factors can also leads the
society towards destruction14. The government should take some effective and focused efforts for
controlling such factors in the most effective manner. Imposition of ban over such contents can
be proved effective measures from the side of the government.
On the basis of findings of the entire paper it can be revealed that along with positive
impacts, there are some negative impacts of the internet over individual and society.
International society and local government is required to have significant intervention to keep
control over such issues.
14
Offensive or illegal content. (2013). Cyber Smart
<http://www.cybersmart.gov.au/Parents/Cyber%20issues/Offensive%20or%20illegal%20content.aspx>
14
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
References
Imran Awan, and Brian Blakemore. Policing Cyber Hate Cyber Threats and Cyber Terrorism
(Ashgate Publishing, Ltd., 2012).
Richard Schaffer, Filiberto Agusti, and Beverley Earle. International Business Law and Its
Environment South-Western legal studies in business (Cengage Learning, 2008).
Bernadette Hlubik Schell. The Internet and Society: A Reference Handbook. (ABC-CLIO, 2007).
NATO opens new centre of excellence on cyber defence. (May 2008). NATO <
http://www.nato.int/docu/update/2008/05-may/e0514a.html >
John E Dunn. Interpol should lead global cybercrime fight, says director. (Apr 2013)
<http://news.techworld.com/security/3438714/interpol-should-lead-global-cybercrime-
fight-says-director/>
Offensive or illegal content. (2013). Cyber Smart
<http://www.cybersmart.gov.au/Parents/Cyber%20issues/Offensive%20or%20illegal%20
content.aspx>
Cyber Espionage: The Chinese Threat (2010). CNBC < http://www.cnbc.com/id/47962225>
Should Offensive material be banned from the Internet? (May 2009). Eponymous. <
http://www.liamalexander.com/edublog/2009/05/should-offensive-material-be-banned-
from-the-internet/>
15
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
Michael Hatamoto. Egypt Internet Ban Lingers, Users Adjusting. (Feb 2011). Daily Tech <
http://www.dailytech.com/Egypt+Internet+Ban+Lingers+Users+Adjusting+/article20799
.htm>
Andrea Millwood Hargrave, and Sonia M. Livingstone. Harm and Offence in Media Content: A
Review of the Evidence (Intellect Books, 2009).
Jeremy Malcolm. Consumers in the Information Society: Access, Fairness and Representation
(Consumers International 2007).
Xiang Li, and Jianhua Li. Quality-Based Content Delivery over the Internet (Springer, 2011).
16
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
Essay writing | Online Assignment help | Homework help service
www.studentsassignmenthelp.com
Email: info@StudentsAssignmentHelp.com

More Related Content

What's hot

Marriage of Cyber Security with Emergency Management - Congress
Marriage of Cyber Security with Emergency Management  - CongressMarriage of Cyber Security with Emergency Management  - Congress
Marriage of Cyber Security with Emergency Management - CongressDavid Sweigert
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copysmita mitra
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
Technology Against Trafficking
Technology Against TraffickingTechnology Against Trafficking
Technology Against TraffickingClair Deevy
 
Marriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementMarriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementDavid Sweigert
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017NgocHaBui1
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of warMark Johnson
 
Cybersecurity commission-report-final-post
Cybersecurity commission-report-final-postCybersecurity commission-report-final-post
Cybersecurity commission-report-final-postRob Wilson
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Indonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionIndonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionICT Watch
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
 

What's hot (20)

Marriage of Cyber Security with Emergency Management - Congress
Marriage of Cyber Security with Emergency Management  - CongressMarriage of Cyber Security with Emergency Management  - Congress
Marriage of Cyber Security with Emergency Management - Congress
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Technology Against Trafficking
Technology Against TraffickingTechnology Against Trafficking
Technology Against Trafficking
 
1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main
 
Marriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementMarriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency Management
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
Welcome Address by H.E Tifatul Sembiring Minister for Communication and Infor...
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of war
 
Cybersecurity commission-report-final-post
Cybersecurity commission-report-final-postCybersecurity commission-report-final-post
Cybersecurity commission-report-final-post
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Welcome Address by Director General of Informatic Application Ministry of Com...
Welcome Address by Director General of Informatic Application Ministry of Com...Welcome Address by Director General of Informatic Application Ministry of Com...
Welcome Address by Director General of Informatic Application Ministry of Com...
 
Security in a Mobile World
Security in a Mobile WorldSecurity in a Mobile World
Security in a Mobile World
 
Indonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionIndonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online Protection
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
 

Similar to Cyber security issue part b

CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Ministersegughana
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber DiplomacyPetar Radanliev
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
CYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxCYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxalanrgibson41217
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfVincent Mwando
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...Igor Britchenko
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5mataharitimoer MT
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 

Similar to Cyber security issue part b (20)

CTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security MinisterCTO Cyber Security Conference Key Note Address by UK Security Minister
CTO Cyber Security Conference Key Note Address by UK Security Minister
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Introduction to Cyber Diplomacy
Introduction to Cyber DiplomacyIntroduction to Cyber Diplomacy
Introduction to Cyber Diplomacy
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
CYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docxCYBER PEACE PROPOSALRunning head.docx
CYBER PEACE PROPOSALRunning head.docx
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
 
Cyber Diplomacy
Cyber DiplomacyCyber Diplomacy
Cyber Diplomacy
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...State Management Mechanisms for the Exchange of Information Regarding Cyberat...
State Management Mechanisms for the Exchange of Information Regarding Cyberat...
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 

More from www.StudentsAssignmentHelp.com

Sample assignment on impact of cruise tourism in coastal areas
Sample assignment on impact of cruise tourism in coastal areas Sample assignment on impact of cruise tourism in coastal areas
Sample assignment on impact of cruise tourism in coastal areas www.StudentsAssignmentHelp.com
 
Review the effectiveness of constructed wetlands for the treatment of either ...
Review the effectiveness of constructed wetlands for the treatment of either ...Review the effectiveness of constructed wetlands for the treatment of either ...
Review the effectiveness of constructed wetlands for the treatment of either ...www.StudentsAssignmentHelp.com
 
Free sample assignment on customs regulatory compliance management
Free sample assignment on customs   regulatory compliance managementFree sample assignment on customs   regulatory compliance management
Free sample assignment on customs regulatory compliance managementwww.StudentsAssignmentHelp.com
 
Essay and homework help on sociology, race &amp; ethnic inequality
Essay and homework help on sociology, race &amp; ethnic inequalityEssay and homework help on sociology, race &amp; ethnic inequality
Essay and homework help on sociology, race &amp; ethnic inequalitywww.StudentsAssignmentHelp.com
 
Discussion forum assignment help on environmental social governance
Discussion forum assignment help on environmental social governanceDiscussion forum assignment help on environmental social governance
Discussion forum assignment help on environmental social governancewww.StudentsAssignmentHelp.com
 

More from www.StudentsAssignmentHelp.com (20)

Social responsibility and brand strength
Social responsibility and brand strengthSocial responsibility and brand strength
Social responsibility and brand strength
 
Sample assignment on impact of cruise tourism in coastal areas
Sample assignment on impact of cruise tourism in coastal areas Sample assignment on impact of cruise tourism in coastal areas
Sample assignment on impact of cruise tourism in coastal areas
 
Sample assignment on employee engagement
Sample assignment on employee engagementSample assignment on employee engagement
Sample assignment on employee engagement
 
Review the effectiveness of constructed wetlands for the treatment of either ...
Review the effectiveness of constructed wetlands for the treatment of either ...Review the effectiveness of constructed wetlands for the treatment of either ...
Review the effectiveness of constructed wetlands for the treatment of either ...
 
Report on herman street an ecommerce website
Report on  herman street an ecommerce websiteReport on  herman street an ecommerce website
Report on herman street an ecommerce website
 
Reflective essay individual
Reflective essay   individualReflective essay   individual
Reflective essay individual
 
Product development assignment help
Product development assignment helpProduct development assignment help
Product development assignment help
 
Principles of health and social practice
Principles of health and social practicePrinciples of health and social practice
Principles of health and social practice
 
Portfolio analysis (2)
Portfolio analysis (2)Portfolio analysis (2)
Portfolio analysis (2)
 
Operations management report on tesco
Operations management report on tescoOperations management report on tesco
Operations management report on tesco
 
Marketing strategy of facebook
Marketing strategy of facebookMarketing strategy of facebook
Marketing strategy of facebook
 
Marketing plan mr bean singapore
Marketing plan mr bean singaporeMarketing plan mr bean singapore
Marketing plan mr bean singapore
 
Market research report
Market research reportMarket research report
Market research report
 
Literature review assignment help
Literature review assignment helpLiterature review assignment help
Literature review assignment help
 
Free sample assignment on customs regulatory compliance management
Free sample assignment on customs   regulatory compliance managementFree sample assignment on customs   regulatory compliance management
Free sample assignment on customs regulatory compliance management
 
Essay and homework help on sociology, race &amp; ethnic inequality
Essay and homework help on sociology, race &amp; ethnic inequalityEssay and homework help on sociology, race &amp; ethnic inequality
Essay and homework help on sociology, race &amp; ethnic inequality
 
Discussion forum assignment help on environmental social governance
Discussion forum assignment help on environmental social governanceDiscussion forum assignment help on environmental social governance
Discussion forum assignment help on environmental social governance
 
Cyber security issues part a
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a
 
Cubic transportation systems
Cubic transportation systems Cubic transportation systems
Cubic transportation systems
 
Challenges faced by the uk healthcare system
Challenges faced by the uk healthcare systemChallenges faced by the uk healthcare system
Challenges faced by the uk healthcare system
 

Recently uploaded

SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?Searchable Design
 
Fueling A_B experiments with behavioral insights (1).pdf
Fueling A_B experiments with behavioral insights (1).pdfFueling A_B experiments with behavioral insights (1).pdf
Fueling A_B experiments with behavioral insights (1).pdfVWO
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceDamien ROBERT
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxarsathsahil
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx216310017
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Search Engine Journal
 
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一s SS
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfarsathsahil
 
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategyDIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategySouvikRay24
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingJuan Pineda
 
Storyboards for my Final Major Project Video
Storyboards for my Final Major Project VideoStoryboards for my Final Major Project Video
Storyboards for my Final Major Project VideoSineadBidwell
 
Influencer Marketing Power point presentation
Influencer Marketing  Power point presentationInfluencer Marketing  Power point presentation
Influencer Marketing Power point presentationdgtivemarketingagenc
 
VIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceVIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceSapana Sha
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?Juan Pineda
 
ASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationAli Raza
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfEastern Online-iSURVEY
 
Best Persuasive selling skills presentation.pptx
Best Persuasive selling skills  presentation.pptxBest Persuasive selling skills  presentation.pptx
Best Persuasive selling skills presentation.pptxMasterPhil1
 
Master the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfMaster the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfHigher Education Marketing
 
Forecast of Content Marketing through AI
Forecast of Content Marketing through AIForecast of Content Marketing through AI
Forecast of Content Marketing through AIRinky
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies bruguardarib
 

Recently uploaded (20)

SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?
 
Fueling A_B experiments with behavioral insights (1).pdf
Fueling A_B experiments with behavioral insights (1).pdfFueling A_B experiments with behavioral insights (1).pdf
Fueling A_B experiments with behavioral insights (1).pdf
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptx
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
 
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdf
 
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing StrategyDIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
DIGITAL MARKETING COURSE IN BTM -Influencer Marketing Strategy
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO Copywriting
 
Storyboards for my Final Major Project Video
Storyboards for my Final Major Project VideoStoryboards for my Final Major Project Video
Storyboards for my Final Major Project Video
 
Influencer Marketing Power point presentation
Influencer Marketing  Power point presentationInfluencer Marketing  Power point presentation
Influencer Marketing Power point presentation
 
VIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceVIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts Service
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?
 
ASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationASO Process: What is App Store Optimization
ASO Process: What is App Store Optimization
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
 
Best Persuasive selling skills presentation.pptx
Best Persuasive selling skills  presentation.pptxBest Persuasive selling skills  presentation.pptx
Best Persuasive selling skills presentation.pptx
 
Master the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfMaster the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdf
 
Forecast of Content Marketing through AI
Forecast of Content Marketing through AIForecast of Content Marketing through AI
Forecast of Content Marketing through AI
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies
 

Cyber security issue part b

  • 1. 1 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore Essay writing | Online Assignment help | Homework help service www.studentsassignmenthelp.com Email: info@StudentsAssignmentHelp.com
  • 2. 2 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore Cyber Security Issue- Part B
  • 3. 3 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore International Cooperation in combating with cyber crime In existing period of time, cyber crime has become one of major threats in front of the government of different country. The Increasing severity of cyber crime has attracted the significant attention of international community. As the nature and landscape of cyber crimes has become quite changed in recent period of time as cyber crimes have become more organized. Moreover the span of such kind of crimes has also become quite expanded at global level. Owing to this reason, there is a need of an intensive cooperation of the entire international society. In direction to have some significant and effective combat with cyber crime at international level, international society is making some crucial and integrated efforts. In the same series, International Criminal Police Organization – INTERPOL has started some crucial efforts of combining strategies of different countries against cyber crime so that an effective and universal problem can be found out. Among such efforts of INTERPOL, establishment of INTERPOL Global Complex for Innovation (IGCI) in Singapore in 2014 is one of the most mentionable efforts. The IGCI will work as the center of excellence for addressing different and critical cyber crime across the globe. This complex will be directed to create an alliance with internet security specialists from different nations and develop an international model for ensuring the prevention of cyber crimes at international level. Moreover, administration of global law and its enforcement is also one of the major responsibilities of this international complex1. 1 John E Dunn. Interpol should lead global cybercrime fight, says director. (Apr 2013) <http://news.techworld.com/security/3438714/interpol-should-lead-global-cybercrime-fight-says- director/>
  • 4. 4 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore Unlike other types of crimes, prevention of cyber crimes requires an intensive amount of technical efficiency and expertise, highly developed and updated infrastructure, and integration of the strengths of different nations. From the perspective of international security, it is quite essential to have better and effective exchange of information and technologies among different nations. In such scenario, an intensive cooperation among countries at international level becomes quite essential. Along with such reason, the international cooperation is also required to have better and effective enforcement of law, prioritization of resources and buildings cross- sectorial and cross-jurisdictional collaboration2. Another crucial example of international cooperation for fighting against cyber crime can be seen in the operational partnerships developed by the United States and the European Union for developing an informal but effective model for cyber security. For the purpose of fighting against cyber crime, in 2001, the Council of Europe has proposed a treaty, which is known as the Budapest Convention on Cybercrime. This convention was ratified by the US and other 30 different nations later. The prime highlight of this treaty is that it prepares a unified legal framework on which crucial information can be shared among member countries of the treaty so that different types of critical cyber crimes such as network or computer breaches, copyright infringement, Cyber spying, Hacking of data, and child pornography can be prevented in the most effective manner. Since, the USA and European Union can be considered as major powers 2 Imran Awan,and Brian Blakemore. Policing Cyber Hate Cyber Threatsand Cyber Terrorism (Ashgate Publishing, Ltd., 2012).
  • 5. 5 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore in the context of information technologies across the world, this cooperation can be proved quite effective and crucial for prevention of organized cyber crime at international level3. Another crucial example of international cooperation for preventing cyber crimes is the strategic partnership between the US and China. In the year, 2012, defense ministers of both the nations become agreed on enhancing mutual coordination in the context of technical expertise so that an effective framework for preventing cyber attacks and crimes related to national security can be minimized in the most effective manner. As the US and China is the prime locations for cyber criminals, this partnership may be prove quite potential from the perspective of international cyber crime prevention. However, this partnership came after the political tension between both the country regarding cyber attack and spying4. In addition to this, the NATO (North Atlantic Treaty Organization) has also undertaken some of the critical steps for the purpose of ensuring cyber security across the globe. In the same series, there are some countries, namely Bulgaria, Estonia, Poland, Slovakia, Turkey, the United Kingdom, and the United States which has signed agreement with NATO to have international cooperation for fighting against cyber crime. Among such efforts, the NATAO has strengthened the powers and responsibilities of Cooperative Cyber Defence Centre of Excellence. This center is serving as a hub for different countries across the globe to integrate and apply their strengths for controlling cyber crime in the most effective manner. Different European and Latin American 3 Richard Schaffer,Filiberto Agusti, and Beverley Earle. International BusinessLaw and Its Environment South-Western legal studies in business(Cengage Learning,2008). 4 Cyber Espionage: The Chinese Threat (2010). CNBC < http://www.cnbc.com/id/47962225>
  • 6. 6 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore countries such as Germany, Hungary, Italy, Latvia, Lithuania Spain, and the Netherlands are the active partners of this center, which work together for improving cyber defense interoperability among them5. Although, there are some crucial examples available regarding international integration of different countries for preventing cyber crimes, yet still such efforts are not quite enough. As the span of the international cyber crime is too broad for such types of cooperation. There is a need of having integrated and combined efforts from different communities across the world. In existing period of time, although different countries and groups across the globe are making alliances for fighting with such crimes, yet there is a lack proper organization and integration of such efforts at international level. Moreover, it has also been evident that only developed countries, which are more exposed towards the threat of cyber crime, are interested in such type of integration of power and expertise. There is a lack of participation of developing and under developed nation in such type of crucial international integration. This scenario can be proved quite harmful in preparing a unified protection shield at international level against cyber threats. In direction to this, the role of international organizations such as the United Nations, International court or the WTO becomes quite vital in pursuing member countries including developing and developed to integrate their strengths towards prevention of cyber security crime6. 5 NATO opens new centre of excellence on cyber defence. (May 2008). NATO < http://www.nato.int/docu/update/2008/05-may/e0514a.html > 6 Imran Awan, and Brian Blakemore. Policing Cyber Hate Cyber Threatsand Cyber Terrorism (Ashgate Publishing, Ltd., 2012).
  • 7. 7 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore In addition to this, another critical problem faced by international players in maintaining effective coordination towards cyber crime prevention is related with unclear and confusing role of government in preventing such types of serious threats. In existing period of time, there is no any clear rule defined in any of the law that can be able to define the role and responsibilities of government of a country in the prevention of cyber crime. As per one view, internet can be taken as private sector innovation on which there is no role of the government, while as per the other view since the crimes committed on the internet are presenting some serious threat to the national security, the intervention of the government becomes quite essential. Along with this, cyber security sometime judged as job of the military while, sometime its nature advocates its civil domain. This confusing role of the government has made the international integration of different countries over preparing an effective and strategic partnership over prevention of cyber crime7. On the basis of the analysis of the findings of the essay, it can be revealed that there are some of the critical threats related with cyber security at global level. In direction to this, there is a need of having some intensive amount of international cooperation. In this context, international society has undertaken some integrated steps which can be proved quite effective in making the international arena free from cyber crimes. Although, there are some critical issues in maintaining an effective environment for international security against cyber crime, yet different 7 Bernadette Hlubik Schell. The Internet and Society: A Reference Handbook. (ABC-CLIO,2007).
  • 8. 8 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore efforts of international society for maintaining international cooperation can be proved quite effective from the long term perspective.
  • 9. 9 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore Government Control over Internet Content In existing period of time Internet has been emerged as one of the major ways of information exchange. Internet based applications have started to be used as the major means of information creation, manipulation, up-gradation, transfer and dissemination among people. Although there are a number of different security related threats such as distortion of the information and hacking of important and confidential information, yet because of intensive benefits of internet, usage of internet for information exchange has become quite popular. However, because of different issues there is a need of keep control over contents published on the internet so that maximum advantages of internet can be availed8. In recent period of time, a number of different cases related with information leakage from the internet have come into lime light, which has highlighted the requirement of scrutiny of information and content available on internet. In direction to this, for the government of a nation, it is quite essential to have some crucial guidelines for deciding the viability of the content available on the internet so that misuse and misinterpretation of information cannot be possible. As per the local law, the government of a particular country can ban any objectionable material published on the internet, which can be proved harmful for financial, social, cultural or political sovereignty of that country. As at international standards there no any specific guidelines or law 8 Jeremy Malcolm. Consumers in the Information Society: Access,Fairnessand Representation (Consumers International 2007).
  • 10. 10 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore that decides that what content on the internet should be banned or not, it all depends upon the understanding and decision of the local government to ban any content available on internet9. There are some common types of material that should be banned on the internet by the government of different countries. In this context, all the websites and web based servers that engage in spying on individual and other nations should be banned. Such type of contents directs to leak some crucial and confidential information data regarding political, economic and defense of a country. The nature of such information is quite exclusive as the misuse of such information can harm the sovereignty and sustainability of the country. The open availability of such type of information with the help of internet can be proved quite helpful for competitive or rival countries to harm that country. Recently, the USA has alleged China for unauthorized access and hacking of its highly confidential data. As per the USA official with the help of cyber spying, China has acquired some crucial confidential information regarding economic status of the country, which can present a significant threat to economic security of the country. This incident presents some crucial example of the harmfulness of publishing country specific confidential data on the internet10. In this way, it can be considered that availability of such type of crucial information on the open network should be monitored and controlled by the government of the country. 9 Jeremy Malcolm. Consumers in the Information Society: Access,Fairnessand Representation (Consumers International 2007). 10 Cyber Espionage: The Chinese Threat (2010). CNBC < http://www.cnbc.com/id/47962225>
  • 11. 11 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore In addition to this, the government should also ban the content available on the website that can spread rumors and fear among common people. The availability of some provocative speeches, literatures and contents including criminal activity or accidents and footage of real or simulated violence can lead to ignite riots and civil mutiny within the society that can be proved quite harmful from the perspective of the sustainability of the society. In this context it becomes quite essential for the local government to control the availability of such type of harmful contents on the internet. Many governments undertake such type of steps in the conditions of political violence within the country. For instance, in the recent political crisis in Egypt, the president has imposed ban on social media sites, such as Facebook, twitter for the purpose controlling civil war. Moreover the government has banned websites that promotes and intensively publishes extreme political views against the government as such views are generally undertaken for the radicalizing of vulnerable members of the society and ignite riots and civil war within the country11. Moreover in the process of policy formulation by the government of a country, the unauthorized access of some crucial information via internet can be proved quite harmful and problematic. Sometime government publishes it strategic intentions and visions regarding some particular project on the internet so that common public can also be aware about the actions of the government regarding overall development and growth of the society. However, sometimes availability of such type of strategic information can be proved quite harmful as hackers can misuse such information to disturb the strategic planning of the government of that country. In 11 Michael Hatamoto. Egypt Internet Ban Lingers, Users Adjusting. (Feb 2011). Daily Tech <http://www.dailytech.com/Egypt+Internet+Ban+Lingers+Users+Adjusting+/article20799.htm>
  • 12. 12 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore this regard, it can be considered that availability of such crucial type of strategic information should also be restricted on the internet12. Along with some crucial benefits, internet can also be proved as a source of different issues of crimes related to monetary frauds and cheatings. In this context, there are a number of websites available on the websites that engages in activities like online gaming, bidding, bating and gambling. These websites entice innocent people by showing fake offers on websites. Under the influence of such offers, people invest their hard earned money on such sites. In this way, with the help of internet, such type of unlicensed, illegal and unauthorized websites cheat innocent users easily. Due to such incidents, people have to bear some intensive amount of monetary and non-monetary loss, which resulted to high degree of stress to the user. Owing to this, reason, the government of the country should intervene in such conditions and undertake some effective and applicable actions13. Among such actions, the ban on such type of unauthorized, illegal and unlicensed websites of online gaming and gambling should be implied so that the degree of financial frauds and cheating can be controlled in the most effective manner. Another crucial issue related to internet usage is related with the social degradation because of unethical and objectionable contents widely and openly available on the different 12 Andrea Millwood Hargrave, and Sonia M. Livingstone. Harmand Offence in Media Content: A Review of the Evidence (Intellect Books, 2009). 13 Should Offensive material be banned from the Internet? (May 2009). Eponymous. < http://www.liamalexander.com/edublog/2009/05/should-offensive-material-be-banned-from-the- internet/>
  • 13. 13 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore websites. Among such content, pornography is one of the most objectionable material available of different open websites on internet. In existing period of time, different sexually explicit and adult contents are easily available on internet. Majority of users of such contents are children or teenagers. Such type of contents leads to decrease the ethical and moral value of a person down since from his childhood. From the perspective of sustainability of the society this situation can be proved quite harmful. In addition to this, contents that support social differences on the basis of race, religion, caste, sexual preference or other social/cultural factors can also leads the society towards destruction14. The government should take some effective and focused efforts for controlling such factors in the most effective manner. Imposition of ban over such contents can be proved effective measures from the side of the government. On the basis of findings of the entire paper it can be revealed that along with positive impacts, there are some negative impacts of the internet over individual and society. International society and local government is required to have significant intervention to keep control over such issues. 14 Offensive or illegal content. (2013). Cyber Smart <http://www.cybersmart.gov.au/Parents/Cyber%20issues/Offensive%20or%20illegal%20content.aspx>
  • 14. 14 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore References Imran Awan, and Brian Blakemore. Policing Cyber Hate Cyber Threats and Cyber Terrorism (Ashgate Publishing, Ltd., 2012). Richard Schaffer, Filiberto Agusti, and Beverley Earle. International Business Law and Its Environment South-Western legal studies in business (Cengage Learning, 2008). Bernadette Hlubik Schell. The Internet and Society: A Reference Handbook. (ABC-CLIO, 2007). NATO opens new centre of excellence on cyber defence. (May 2008). NATO < http://www.nato.int/docu/update/2008/05-may/e0514a.html > John E Dunn. Interpol should lead global cybercrime fight, says director. (Apr 2013) <http://news.techworld.com/security/3438714/interpol-should-lead-global-cybercrime- fight-says-director/> Offensive or illegal content. (2013). Cyber Smart <http://www.cybersmart.gov.au/Parents/Cyber%20issues/Offensive%20or%20illegal%20 content.aspx> Cyber Espionage: The Chinese Threat (2010). CNBC < http://www.cnbc.com/id/47962225> Should Offensive material be banned from the Internet? (May 2009). Eponymous. < http://www.liamalexander.com/edublog/2009/05/should-offensive-material-be-banned- from-the-internet/>
  • 15. 15 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore Michael Hatamoto. Egypt Internet Ban Lingers, Users Adjusting. (Feb 2011). Daily Tech < http://www.dailytech.com/Egypt+Internet+Ban+Lingers+Users+Adjusting+/article20799 .htm> Andrea Millwood Hargrave, and Sonia M. Livingstone. Harm and Offence in Media Content: A Review of the Evidence (Intellect Books, 2009). Jeremy Malcolm. Consumers in the Information Society: Access, Fairness and Representation (Consumers International 2007). Xiang Li, and Jianhua Li. Quality-Based Content Delivery over the Internet (Springer, 2011).
  • 16. 16 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore Essay writing | Online Assignment help | Homework help service www.studentsassignmenthelp.com Email: info@StudentsAssignmentHelp.com