Vol. 16, Issue 1, Jul-Dec 2023
Page: 58-67
AN IN DEPTH ANALYSIS OF THE CYBER SECURITY THREATS TO ASCERTAIN THE NATIONAL SECURITY SAFEGUARDS AND ALLIED PERSPECTIVES OF LAW
Yashika Nagpal
Received Date: 2018-02-14
Accepted Date: 2018-03-19
Published Date: 2018-03-28
While looking at federal agencies' approaches to computer crime investigations, this paper examines how they may help shape an effective law enforcement strategy for dealing with cyber threats. This project aims to identify how federal agencies conduct investigations related to cyber security and how they define operational success through interviews with experienced computer crime investigators from the Federal Bureau of Investigation, the INDIA Secret Service, and the Air Force Office of Special Investigations. Our findings suggest that the investigation's objective was to focus on threat minimization rather than quantitative prosecution valuation. Fortifying potential targets and identifying repeat offenders need strategies that make use of intelligence collecting and sharing. To tackle the greatest national security threats, traditional investigation is increasingly turning to an intelligence-led policing paradigm.
Back
Download PDF
References
- International Organization for Standardization. ISO/IEC 27032:2012. Infor mation technology—Security techniques— Guidelines for cybersecurity. 2012
- Chowdhury A. Recent cyber security attacks and their mitigation approaches–An Overview. In International conference on applications and techniques in information security, Springer, Singapore. 2016; pp 54-65.
- Passeri P. Cyber Attacks Statistics Paolo Passeri, May 2016. http://www. hackmageddon.com/category/security/cyberattacks-statistics/. Accessed 07 October 2016
- Fischer EA. Creating a national framework for cybersecurity: an analysis of issues and options. Technical report. Congressional Research Service. 2005.
- The Open Web Application Security Project (OWASP). 2018. Available online: https:// www.swasc an.com/owasp/
- The Open Web Application Security Project OWASP Top 10—the ten most critical web application security risks. The OWASP Foundation. 2018.
- Check Point Research Survey of IT Security Professionals, sample size: 443 participants. 2018.
- Check Point Mobile Threat Research Publications. 2017. Available Online: https:// research.checkpoint.com/check-pointmobile-research-team-looks-back-2017/
- Cyber Attack Trends Analysis Key Insights to Gear Up for in 2019. Available Online: http://www.snt.hr/boxcontent/ CheckPointSecurityReport2019_vol01.pdf
- Check Point C-Level Perspective Survey. 2017. sample size: 59 C-Level Executives. Available Online: https://www.checkpoint. com/downloads/product-related/report/2018-security-report.pdf
- Drucker H. Wu D. Vapnik VN. Support vector machines for spam categorization. IEEE Trans Neural Netw Publ IEEE Neural Netw Counc 1999; 10(5):1048–54
- Cranor LF. Lamacchia BA. Spam!. Commun ACM. 1998; 41(8):74–83
- SANS Institute. Top 15 Malicious Spyware Actions. 2018. Available Online: https://www. sans.org/secur ity-resou rces/
- Wang Z.J., Liu Y., Wang Z.J. E-mail filtration and classification based on variable weights of the Bayesian algorithm. Appl Mech Mater. 2014; 513–517:2111–2114.
- Hsu W.C., Yu T.Y. E-mail spam filtering based on support vector machines with Taguchi method for parameter selection. J Converg Inf Technol 2010. 5(8):78–88.
- Caruana G., Li M., Qi M. A MapReduce based parallel SVM for large scale spam filtering. In: IEEE 2011 eighth international conference on fuzzy systems and knowledge discovery (FSKD), 2011; pp 2659–2662.
- Wu C.H. Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks. Expert Syst Appl. 2009: 36(3):4321–4330.
- Hazza Z.M., Aziz N.A. A new efficient text detection method for image spam filtering. Int Rev Comput Softw. 2015; 10(1):1–8.