Question

In: Operations Management

companies and countries need to have defense polices and store data more securely. cybersecurity is both...

companies and countries need to have defense polices and store data more securely. cybersecurity is both cultural and psychological. based on the cultural differences in russia and brazil, what are cybersecurity threats and how would you defend agsinst tgose threats ?

Solutions

Expert Solution

Each countries cybercrime is unique as it is not only affected by culture but also psychological. They have their own pattern. They also differs in the codes, modes etc. In order to address the cybercrime the strategies should have a solid base.

Ignorance and misperceptions often result in a failure to address cyber-security threats directly. Strategies, if they are adopted at all, tend to be cobbled together on the basis of spurious and untested premises. There is seldom robust data to drive decision-making. a more evidence-based approach is urgently needed in order to assess cyber threats.Unfortunately, already scarce time and resources are frequently allocated to less important areas rather than actual primary threats. There are number of cybercrime zhat includes

Complex cybercrime is a type of cyber crime consists of so-called complex cyber-offenses especially threats to government institutions. Their extent and nature in Brazil are still not at all clear. There is a lack of both quantitative and qualitative research shedding light on the scale of these threats, though specialists are nevertheless worried. Instead, there are occasional anecdotal insights of complex offenses that can serve as an indication of wider phenomena. These offenses are typically of most concern to national, state and municipal governments, as well as the armed forces and, to some extent, law enforcement. They also inform and shape choices adopted by governments in relation to the formation of cyber security infrastructure. Those most concerned with complex cyber offenses often reproduce statistics and anecdotes that are repeated incessantly, but lack evidence or corroborating data.

conventional cybercrime:-These are the most widespread forms of cyber-offenses in the world .Illegal access (cracking), data interception, child pornography, spam, hate speech, banking fraud, identity theft, copyright infringements.Exclusively law enforcement, since it normally embraces traditional crimes that are already categorized in criminal codes.There are two major subsets of conventional cybercrime: economically-motivated (especially banking fraud) and content-related (e.g. racism and child pornography in social media networks) .

Emerging threats:-

Threats related to the expansion of cyberspace that do not fit well in the ITU categories, whether because they are emerging or are more related to the developing world.Brazil suffers from high levels of interpersonal and organized violence, especially related to gangs and organized crime profiting from drug trafficking. These have already learned the power of ICTs to expand and strengthen their businesses.

Brazil is doubling down on its cyber-security architecture while simultaneously consolidating its emerging power status. public authorities are focusing not just on domestic cyber-criminality and cyber-activism but also expanding the state´s capability to mitigate cyber threats internationally. a central pillar of Brazil´s strategic response to both kinds of risks is CDCiber. and yet the emphasis on a militarized response may be incommensurate with the real (as opposed to existential) threats facing the country and society as a whole. The fact is that Brazil has comparatively few external cyber threats from foreign governments or terrorist groups. and yet, the rise of digital protest and cyber criminality is patently obvious, but receiving comparatively less attention and investment. There is an urgent need for a more informed and evidence-based reading of the threats confronting Brazil and engaging them with a careful consideration of balancing public safety and individual rights.

Filling the knowledge gaps.

Debate on the strategies to engage cyber threats.

Cyber education

Strong institutions.

Russia is struggling to control its cybercrime. Most of the time it also faced the charges of cyber warfare.


The Register®

Security
Russia is struggling to keep its cybercrime groups on a tight leash
Cryptocurrencies, globalisation erode Kremlin's coercive power
By John Leyden 6th June 2017 09:05 GMT
18 SHARE ▼
Russia's control of cybercrime groups that have come to play a part in its espionage activity is crumbling, according to Cybereason.

The security intelligence outfit reached this conclusion after reviewing the latest tactics and procedures associated with high-profile cyber-espionage pops blamed on the Kremlin. Russia has made use of contractors to run intelligence operations for many years. These criminals-turned-spies offer a resource to the state while enjoying a cloak of semi-protected "status" for their extracurricular malicious activities, providing they are directed against foreign targets.


Related Solutions

If companies have both a BCP and a DRP in place do they need to have...
If companies have both a BCP and a DRP in place do they need to have an incident response plan? Please explain.
Many U.S. companies have moved to other countries where tax rates are more favorable. Corporations argue...
Many U.S. companies have moved to other countries where tax rates are more favorable. Corporations argue that they owe it to their stockholders to locate where net profit is maximized. Corporations face double taxation in the United States since corporate profits and dividends paid to stockholders are taxable. Should we reduce or eliminate taxes on corporate profits in the United States to lure more of these companies back to the U.S.? Please address the arguments on both sides of this...
Manipulating data, I need more detail explanation. Manipulating data, I need more explanation in detail
Manipulating data, I need more detail explanation. Manipulating data, I need more explanation in detail
Steinberg Corporation and Dietrich Corporation are identical companies except that Dietrich is more levered. Both companies...
Steinberg Corporation and Dietrich Corporation are identical companies except that Dietrich is more levered. Both companies will remain in business for one more year. The companies' economists agree that the probability of the continuation of the current expansion is 70 percent for the next year, and the probability of a recession is 30 percent. If the expansion continues, each company will generate earnings before interest and taxes (EBIT) of $3.4 million. If a recession occurs, each company will generate earnings...
Steinberg Corporation and Dietrich Corporation are identical companies except that Dietrich is more levered. Both companies...
Steinberg Corporation and Dietrich Corporation are identical companies except that Dietrich is more levered. Both companies will remain in business for one more year. The companies' economists agree that the probability of the continuation of the current expansion is 90 percent for the next year, and the probability of a recession is 10 percent. If the expansion continues, each company will generate earnings before interest and taxes (EBIT) of $4.2 million. If a recession occurs, each company will generate earnings...
Consider the two island countries of Sodor and the Isle of Mann. Both countries have linear...
Consider the two island countries of Sodor and the Isle of Mann. Both countries have linear production possibility frontiers and have 1000 workers. Further each country is capable of producing, and consuming both Trains and Agricultural goods. The costs of production for each country are displayed below in terms of how many workers are needed to produce each good. Trains(L/Train) Agriculture(L/Kg) Sodor 6 2 Isle of Mann 20 4 Graph the PPF (assuming linearity) for each region. Be sure to...
Businesses today have the capability to record and store data more rapidly than ever before, leading...
Businesses today have the capability to record and store data more rapidly than ever before, leading to large quantities of data, which has the potential to be used to initiate data-driven decision-making. However, many businesses are facing the problem of siloed data, which can hinder their ability to integrate data from across the departmental structures. Answer the following questions related to siloed data, and the risks associated with siloed data. Ensure that your answers do not exceed 80 words per...
Marketing companies have collected data implying that teenage girls use more ring tones on their cellular...
Marketing companies have collected data implying that teenage girls use more ring tones on their cellular phones than teenage boys do. In one particular study of 40 randomly chosen teenage girls and boys (20 of each) with cellular phones, the average number of ring tones for the girls was 3.4 with a standard deviation of 1.7. The average for the boys was 1.6 with a standard deviation of 0.7. Conduct a hypothesis test at the 5% level to determine if...
Does trade in goods between countries have to be balanced to be beneficial for both countries? Why or why not?
  Does trade in goods between countries have to be balanced to be beneficial for both countries? Why or why not?
Merchandising companies need to have inventory available to sell to the consumer, creating a need to...
Merchandising companies need to have inventory available to sell to the consumer, creating a need to identify how to account for the purchase and sales of the inventory. In addition, there are costs associated with having inventory. You have been asked to propose an inventory system to handle the accounting for the purchasing and selling of merchandise. The company needs to also understand how to handle the accounting for the costs of inventory. PLEASE PROPOSE AN INVENTORY SYSTEM FOR PURCHASING...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT