Global security and cybercrime: An in-depth analysis
DOI:
https://doi.org/10.55312/op.v17i1.7271Abstract
Cybercrimes have increased a lot in the international arena and to date there is no international institution to take actions on the increasing number of cybercrimes. However, this concern exists for all countries in the world that face cyberattacks on a daily basis. This is a new phenomenon for all countries as a result of the increased use of the internet and the purchases that we make especially on websites anywhere in the world. Attention to cybercrimes has increased everywhere in every country in the world, the countries of the Global North have greater protection in terms of cybercrimes than the Global South, but now cybercrime knows no borders and becomes difficult to catch. What happens to all the information that is requested from us by different websites like Amazon when we buy a new product? Do they store our address, credit card, card number, and phone number on a secure and encrypted server? When you Accept User Agreement for iTunes, which you obviously don’t read, what protections does Apple offer to keep your information safe? Yes, consumers increasingly use the internet to make everyday purchases and businesses increasingly collect and store consumer information. Safeguards must be put in place to ensure that this information is stored in a way that limits and prevents cybercrime threats. An October 2015 study by the Ponemon Institute determined that the average annual cost of cybercrime in the United States is $15.42 million for United States Companies – an increase from $12.69 million just a year ago.’ As the threat of cybersecurity breaches to consumers continues to grow, and the costs associated with this threat continue to rise, businesses must find ways to protect consumers. How Countries will deal with the rise of cybercrime when there is no international organization that examines or regulates legislation regarding cybercrimes that know no borders? As happened with the taking of personal data of individuals in Albania from Iranian attacks for which no one was held responsible and leaving millions of citizens exposed to the use of their personal data on various websites or for various other crimes. Should there be higher security regarding cybercrimes in every country in the world, including Albania, in order to protect consumers or citizens who may fall prey to the use of their personal data by criminals? Should the relevant institutions have a more active role in this regard? These are some of the questions that this paper tries to answer.Keywords:
Cybercrime, internet, relevant institutions, technology, state policyDownloads
References
-
1. Choo, K.-K. R. (2011). The cyber threat landscape: Challenges and future research directions.
-
Computers & Security, 30(8), 719–731.
-
2. Kshetri, N. (2017). Cybercrime and Cybersecurity in Developing Economies. IT Profession-al, 19(2), 11–14.
-
3. Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
-
4. Mitnick, K. D., & Simon, W. L. (2011). The Art of Intrusion. Wiley.
-
5. Symantec Corporation. (2019). Internet Security Threat Report.
-
6. Libicki, M. C. (2007). Cyberdeterrence and Cyberwar. RAND Corporation.
-
7. Healey, J. (2018). A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Cyber Conflict Studies Association.
-
8. Brenner, S. W. (2010). Cybercrime: Criminal Threats from Cyberspace. Praeger.
-
9. European Union Agency for Cybersecurity (ENISA). (2022). Threat Landscape Report.
-
10. Hong, J. (2012). The State of Phishing Attacks. Communications of the ACM, 55(1), 74–81.
-
11. Anderson, R., et al. (2013). Measuring the Cost of Cybercrime. Workshop on the Economics of Information Security.
-
12. Office of the Director of National Intelligence. (2020). Annual Threat Assessment.
-
13. PwC. (2017). Global Economic Crime and Fraud Survey.
-
14. US Department of Homeland Security. (2016). Critical Infrastructure Cybersecurity.
-
15. Case, T., & Marczak, B. (2016). Analysis of the Cyberattack on the Ukrainian Power Grid.
-
SANS ICS Security.
-
16. FBI. (2016). Bangladesh Bank Cyber Heist.
-
17. Bradshaw, S., & Howard, P. N. (2019). The Global Disinformation Order: 2019 Global Inven-tory of Organised Social Media Manipulation. Computational Propaganda Research Project.
-
20. ITU. (2018). Global Cybersecurity Index.
-
21. UN Office on Drugs and Crime. (2013). Comprehensive Study on Cybercrime.
-
22. Council of Europe. (2001). Convention on Cybercrime (Budapest Convention).
-
23. Segal, A. (2016). The Hacked World Order. PublicAffairs.
-
24. Brenner, S. W. (2010). Cybercrime: Criminal Threats from Cyberspace. Praeger.
-
25. European Parliament. (2016). General Data Protection Regulation (GDPR).
-
26. Segal, A. (2016). The Hacked World Order. PublicAffairs.
-
27. United Nations Office on Drugs and Crime. (2018). Cybercrime and Cybersecurity.
-
28. Interpol. (2020). Cybercrime Reports and Operations.
-
29. ITU. (2021). Global Cybersecurity Agenda.
-
30. G7. (2021). Cybersecurity and Digital Policy.
-
31. Kurbalija, J. (2017). An Introduction to Internet Governance. DiploFoundation.
-
32. Verizon. (2018). Data Breach Investigations Report.
-
33. National Institute of Standards and Technology (NIST). (2018). Cybersecurity Framework.
-
34. ENISA. (2020). Public-Private Partnerships in Cybersecurity.
-
35. Gartner. (2021). Emerging Technologies in Cybersecurity.
-
36. Mosca, M., & Piani, M. (2019). Quantum Computing and Post-Quantum Cryptography. IEEE Security & Privacy.
-
37. 5G Americas. (2019). Security Considerations for 5G.
-
38. SolarWinds. (2020). Incident Analysis.
-
39. Council of Europe. (2001). Convention on Cybercrime.
-
40. World Bank. (2017). Building Cybersecurity Capacity.
-
41. ENISA. (2020). Public-Private Partnerships in Cybersecurity.
-
42. Gartner. (2021). Emerging Technologies in Cybersecurity.
-
43. Cybersecurity and Infrastructure Security Agency (CISA). (2021). Public Awareness Campaigns.
-
44. Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M., Levi, M., Moore, T., & Savage, S. (2013). Measuring the Cost of Cybercrime. Workshop on the Economics of Infor-mation Security.
-
45. Bradshaw, S., & Howard, P. N. (2019). The Global Disinformation Order: 2019 Global Inven-tory of Organised Social Media Manipulation. Computational Propaganda Research Project.
-
46. Brenner, S. W. (2010). Cybercrime: Criminal Threats from Cyberspace. Praeger.
-
47. Case, T., & Marczak, B. (2016). Analysis of the Cyberattack on the Ukrainian Power Grid.
-
SANS ICS Security.
-
48. Choo, K.-K. R. (2011). The cyber threat landscape: Challenges and future research directions.
-
Computers & Security, 30(8), 719–731.
-
49. Council of Europe. (2001). Convention on Cybercrime (Budapest Convention).
-
50. European Parliament. (2016). General Data Protection Regulation (GDPR).
-
51. European Union Agency for Cybersecurity (ENISA). (2022). Threat Landscape Report.
-
52. Gartner. (2021). Emerging Technologies in Cybersecurity.
-
53. Healey, J. (2018). A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Cyber Conflict Studies Association.
-
54. Hong, J. (2012). The State of Phishing Attacks. Communications of the ACM, 55(1), 74–81.
-
55. ITU. (2018). Global Cybersecurity Index.
-
56. ITU. (2021). Global Cybersecurity Agenda.
-
57. Kshetri, N. (2017). Cybercrime and Cybersecurity in Developing Economies. IT Profession-al, 19(2), 11–14.
-
58. Kurbalija, J. (2017). An Introduction to Internet Governance. DiploFoundation.
-
59. Libicki, M. C. (2007). Cyberdeterrence and Cyberwar. RAND Corporation.
-
60. McAfee. (2018). Economic Impact of Cybercrime. Center for Strategic and International Studies.
-
61. Mitnick, K. D., & Simon, W. L. (2011). The Art of Intrusion. Wiley.
-
62. Mosca, M., & Piani, M. (2019). Quantum Computing and Post-Quantum Cryptography. IEEE Security & Privacy.
-
63. National Institute of Standards and Technology (NIST). (2018). Cybersecurity Framework.
-
64. Office of the Director of National Intelligence. (2020). Annual Threat Assessment.
-
65. PwC. (2017). Global Economic Crime and Fraud Survey.
-
66. Segal, A. (2016). The Hacked World Order. PublicAffairs.
-
67. Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
-
68. SolarWinds. (2020). Incident Analysis.
-
69. Symantec Corporation. (2019). Internet Security Threat Report.
-
70. UN Office on Drugs and Crime. (2013). Comprehensive Study on Cybercrime.
-
71. UN Office on Drugs and Crime. (2018). Cybercrime and Cybersecurity.
-
72. US Department of Homeland Security. (2016). Critical Infrastructure Cybersecurity.
-
73. Verizon. (2018). Data Breach Investigations Report.
-
74. World Bank. (2017). Building Cybersecurity Capacity
References
1. Choo, K.-K. R. (2011). The cyber threat landscape: Challenges and future research directions.
Computers & Security, 30(8), 719–731.
2. Kshetri, N. (2017). Cybercrime and Cybersecurity in Developing Economies. IT Profession-al, 19(2), 11–14.
3. Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
4. Mitnick, K. D., & Simon, W. L. (2011). The Art of Intrusion. Wiley.
5. Symantec Corporation. (2019). Internet Security Threat Report.
6. Libicki, M. C. (2007). Cyberdeterrence and Cyberwar. RAND Corporation.
7. Healey, J. (2018). A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Cyber Conflict Studies Association.
8. Brenner, S. W. (2010). Cybercrime: Criminal Threats from Cyberspace. Praeger.
9. European Union Agency for Cybersecurity (ENISA). (2022). Threat Landscape Report.
10. Hong, J. (2012). The State of Phishing Attacks. Communications of the ACM, 55(1), 74–81.
11. Anderson, R., et al. (2013). Measuring the Cost of Cybercrime. Workshop on the Economics of Information Security.
12. Office of the Director of National Intelligence. (2020). Annual Threat Assessment.
13. PwC. (2017). Global Economic Crime and Fraud Survey.
14. US Department of Homeland Security. (2016). Critical Infrastructure Cybersecurity.
15. Case, T., & Marczak, B. (2016). Analysis of the Cyberattack on the Ukrainian Power Grid.
SANS ICS Security.
16. FBI. (2016). Bangladesh Bank Cyber Heist.
17. Bradshaw, S., & Howard, P. N. (2019). The Global Disinformation Order: 2019 Global Inven-tory of Organised Social Media Manipulation. Computational Propaganda Research Project.
20. ITU. (2018). Global Cybersecurity Index.
21. UN Office on Drugs and Crime. (2013). Comprehensive Study on Cybercrime.
22. Council of Europe. (2001). Convention on Cybercrime (Budapest Convention).
23. Segal, A. (2016). The Hacked World Order. PublicAffairs.
24. Brenner, S. W. (2010). Cybercrime: Criminal Threats from Cyberspace. Praeger.
25. European Parliament. (2016). General Data Protection Regulation (GDPR).
26. Segal, A. (2016). The Hacked World Order. PublicAffairs.
27. United Nations Office on Drugs and Crime. (2018). Cybercrime and Cybersecurity.
28. Interpol. (2020). Cybercrime Reports and Operations.
29. ITU. (2021). Global Cybersecurity Agenda.
30. G7. (2021). Cybersecurity and Digital Policy.
31. Kurbalija, J. (2017). An Introduction to Internet Governance. DiploFoundation.
32. Verizon. (2018). Data Breach Investigations Report.
33. National Institute of Standards and Technology (NIST). (2018). Cybersecurity Framework.
34. ENISA. (2020). Public-Private Partnerships in Cybersecurity.
35. Gartner. (2021). Emerging Technologies in Cybersecurity.
36. Mosca, M., & Piani, M. (2019). Quantum Computing and Post-Quantum Cryptography. IEEE Security & Privacy.
37. 5G Americas. (2019). Security Considerations for 5G.
38. SolarWinds. (2020). Incident Analysis.
39. Council of Europe. (2001). Convention on Cybercrime.
40. World Bank. (2017). Building Cybersecurity Capacity.
41. ENISA. (2020). Public-Private Partnerships in Cybersecurity.
42. Gartner. (2021). Emerging Technologies in Cybersecurity.
43. Cybersecurity and Infrastructure Security Agency (CISA). (2021). Public Awareness Campaigns.
44. Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M., Levi, M., Moore, T., & Savage, S. (2013). Measuring the Cost of Cybercrime. Workshop on the Economics of Infor-mation Security.
45. Bradshaw, S., & Howard, P. N. (2019). The Global Disinformation Order: 2019 Global Inven-tory of Organised Social Media Manipulation. Computational Propaganda Research Project.
46. Brenner, S. W. (2010). Cybercrime: Criminal Threats from Cyberspace. Praeger.
47. Case, T., & Marczak, B. (2016). Analysis of the Cyberattack on the Ukrainian Power Grid.
SANS ICS Security.
48. Choo, K.-K. R. (2011). The cyber threat landscape: Challenges and future research directions.
Computers & Security, 30(8), 719–731.
49. Council of Europe. (2001). Convention on Cybercrime (Budapest Convention).
50. European Parliament. (2016). General Data Protection Regulation (GDPR).
51. European Union Agency for Cybersecurity (ENISA). (2022). Threat Landscape Report.
52. Gartner. (2021). Emerging Technologies in Cybersecurity.
53. Healey, J. (2018). A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Cyber Conflict Studies Association.
54. Hong, J. (2012). The State of Phishing Attacks. Communications of the ACM, 55(1), 74–81.
55. ITU. (2018). Global Cybersecurity Index.
56. ITU. (2021). Global Cybersecurity Agenda.
57. Kshetri, N. (2017). Cybercrime and Cybersecurity in Developing Economies. IT Profession-al, 19(2), 11–14.
58. Kurbalija, J. (2017). An Introduction to Internet Governance. DiploFoundation.
59. Libicki, M. C. (2007). Cyberdeterrence and Cyberwar. RAND Corporation.
60. McAfee. (2018). Economic Impact of Cybercrime. Center for Strategic and International Studies.
61. Mitnick, K. D., & Simon, W. L. (2011). The Art of Intrusion. Wiley.
62. Mosca, M., & Piani, M. (2019). Quantum Computing and Post-Quantum Cryptography. IEEE Security & Privacy.
63. National Institute of Standards and Technology (NIST). (2018). Cybersecurity Framework.
64. Office of the Director of National Intelligence. (2020). Annual Threat Assessment.
65. PwC. (2017). Global Economic Crime and Fraud Survey.
66. Segal, A. (2016). The Hacked World Order. PublicAffairs.
67. Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
68. SolarWinds. (2020). Incident Analysis.
69. Symantec Corporation. (2019). Internet Security Threat Report.
70. UN Office on Drugs and Crime. (2013). Comprehensive Study on Cybercrime.
71. UN Office on Drugs and Crime. (2018). Cybercrime and Cybersecurity.
72. US Department of Homeland Security. (2016). Critical Infrastructure Cybersecurity.
73. Verizon. (2018). Data Breach Investigations Report.
74. World Bank. (2017). Building Cybersecurity Capacity



