The impact of security and intelligence policy in the era of cyber crimes
Creation of National Cyber Defense Strategy, is the only security and the best protection against cyber-crimes. This is the starting point, from where adequate policies and necessary legal measures begin, aiming the creation of a solid ground and responsible users by implementing comprehensive measures and legal restrictions.
The methodology used to achieve the recognition of users with applicable legislation and regulations on the use of the Internet, as well as legal obligations; implementation of procedures to use communication systems; signing and approval by users of their responsibilities; knowledge and information on the risks and threats stemming from the use of communication networks; certification of trained and specialized staff; classification and processing of information in a particular system; identifying unauthorized users who use classified information networks in public systems and private sector; creating barriers in distance entry networks and information systems, etc.
Various Security and Intelligence institutions covering and operating in these areas are responsible for the creation and promotion of National Cyber Defense Strategy, analyzing the risk to implement protective measures for preventing attacks on Cybercrime (Cyber Crimes).
About Today, “Introduction to LANs, WANs, and Other Kinds of Area Networks”, Available from: http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.htm [last accessed 05.04.2016]
Arquilla John, Ronfeldt David and Zanini Michele, (2000), Information-Age Terrorism, Current History. Available from: http://www.nps.edu/Academics/Centers/CTIW/files/info_age_terrorism.pdf [last accessed 28.03.2016]
Beka Rudina, (2013), Thesis, “Role of new information technologies in national security assistance”. Available from:
www.uamd.edu.al/new/wp-content/uploads/2013/01 [last accessed 25.02.2016]
Cabinet Office Detica “The Cost of Cyber Crime”. 02.11.DET.CCR.001
Charles Kegley Jr., (2010), Global political trends and transformation, UFO University Press, 12th edition,
Council of Europe, (2001), “Convention on Cybercrime”, Budapest. Available from: http://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf [last accessed 11.05.2016[
E. Rothenberg Laurence (2002-2003), “Issues in Global Education”, No. 176. Available from: http://www.globaled.org/issues/176.pdf [last accessed 11.02.2016]
Magazine for Defense and European Security, (2010), "Concordian", Publication of the Center for International Studies G. Marshall and security in Garmisch. Terrorist Using of information technology, Germany.
NATO, (2009), Parliamentary Assembly, Report. Available from: http://www.nato-pa.int/default.asp? last accessed 20.02.2016
OECD- Reducing Systemic Cybersecurity Risk” (2011). Available from: www.oecd.org/dataoecd/3/42/46894657.pdf last accessed 13.02.2016.
Copyright (c) 2016 Bahri Gashi, Fadil Zendeli
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeThe Effect of Open Access).