The impact of security and intelligence policy in the era of cyber crimes
Creation of National Cyber Defense Strategy, is the only security and the best protection against cyber-crimes. This is the starting point, from where adequate policies and necessary legal measures begin, aiming the creation of a solid ground and responsible users by implementing comprehensive measures and legal restrictions.
The methodology used to achieve the recognition of users with applicable legislation and regulations on the use of the Internet, as well as legal obligations; implementation of procedures to use communication systems; signing and approval by users of their responsibilities; knowledge and information on the risks and threats stemming from the use of communication networks; certification of trained and specialized staff; classification and processing of information in a particular system; identifying unauthorized users who use classified information networks in public systems and private sector; creating barriers in distance entry networks and information systems, etc.
Various Security and Intelligence institutions covering and operating in these areas are responsible for the creation and promotion of National Cyber Defense Strategy, analyzing the risk to implement protective measures for preventing attacks on Cybercrime (Cyber Crimes).
About Today, “Introduction to LANs, WANs, and Other Kinds of Area Networks”, Available from: http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.htm [last accessed 05.04.2016]
Arquilla John, Ronfeldt David and Zanini Michele, (2000), Information-Age Terrorism, Current History. Available from: http://www.nps.edu/Academics/Centers/CTIW/files/info_age_terrorism.pdf [last accessed 28.03.2016]
Beka Rudina, (2013), Thesis, “Role of new information technologies in national security assistance”. Available from:
www.uamd.edu.al/new/wp-content/uploads/2013/01 [last accessed 25.02.2016]
Cabinet Office Detica “The Cost of Cyber Crime”. 02.11.DET.CCR.001
Charles Kegley Jr., (2010), Global political trends and transformation, UFO University Press, 12th edition,
Council of Europe, (2001), “Convention on Cybercrime”, Budapest. Available from: http://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf [last accessed 11.05.2016[
E. Rothenberg Laurence (2002-2003), “Issues in Global Education”, No. 176. Available from: http://www.globaled.org/issues/176.pdf [last accessed 11.02.2016]
Magazine for Defense and European Security, (2010), "Concordian", Publication of the Center for International Studies G. Marshall and security in Garmisch. Terrorist Using of information technology, Germany.
NATO, (2009), Parliamentary Assembly, Report. Available from: http://www.nato-pa.int/default.asp? last accessed 20.02.2016
OECD- Reducing Systemic Cybersecurity Risk” (2011). Available from: www.oecd.org/dataoecd/3/42/46894657.pdf last accessed 13.02.2016.
Metrics powered by PLOS ALM
- There are currently no refbacks.
Copyright (c) 2016 Bahri Gashi, Fadil Zendeli
This work is licensed under a Creative Commons Attribution 4.0 International License.