International Doctrine And The Cybersecurity Landscape

Read Complete Research Material

INTERNATIONAL DOCTRINE AND THE CYBERSECURITY LANDSCAPE

International Doctrine and the Cybersecurity Landscape



International Doctrine and the Cyber security Landscape

Topic 1: Impact of Retention Standards

We need to secure our data from sniffing and spoofing as we cannot afford to lose it. We have to do all what it takes to secure our database and files. These files can be sniffed or corrupted by any of our enemies or any blackmailer who wants to earn money with that. We need to make the security at the level best extent to make our data safety possible. There are many options i.e. antivirus encryption and so on, but we need to have something more suitable than these options.

Database Security contains two meanings: the first layer is the system is running security system safe operation of the usual threats are as follows, network criminals through a network, LAN, and other ways through the invasion of the computer system does not start properly, or overload the machine running a large number of algorithms, and turn off the CPU fan, CPU overheating burn and other destructive activities.

The second layer is the information systems security, system security is usually the threats are as follows hacker intrusion on the database, and steal the information you want. Database system security features for data, including data independence, data security, data integrity, concurrency control, fault recovery. Management system is responsible to avoid concurrent access to the database. This registration also contains information relevant to the recovery of the database, if a failure thereof or a system crash. Although this mechanism does not prevent unauthorized access, is a deterrent to potential attackers, allowing also found weaknesses in security mechanisms. In addition to all these mechanisms, the physical medium that is stored on the database may be protected cryptographically. Also backups can these well defended against attacks.

Cybercrime is criminal activity, using computers and the Internet to steal, whether directly or indirectly, from consumers or businesses. The global scale of the cybercrime problem is not known, although by most estimates it is running at several billion dollars (USD) per year. This paper focuses solely on ensuring that cybercrime is contained. Even within cybercrime, there are different subcategories, such as direct theft of money from bank or credit card accounts, identity theft, as well as theft of intellectual property where the financial costs are indirect (potential loss of sales revenue). Another key challenge is to ensure cost-effectiveness in the functioning of the cybercrime lab. This is a major challenge, since the development of investigative skills and the assurance of optimal expenses in the functioning of the cybercrime lab are two tasks, which are significantly of varying nature (Goldberg, 2000).

It is possible to build the agencies investigative skills through the low cost project by engaging in assignments and tasks that are complicated and challenging in nature. Needless to highlight, a cybercrime lab comes up with something new in every challenge it encounters. As a result, the essential characteristics that need to be developed in the ...