Country: Europe | |||
Cyber Culture (i.e., How does the country view cyber threats? Is this consistent with the general country culture?) | Cybersecurity Threats | Cyber Legal Perspective/Cyber Economic Perspective | Response to Cyberterrorism/Recruiting |
On April 9, 2019. Europe introduced the Cybersecurity Act which aims at certifying schemes in EU (Coats, 2017) | Distributed Denial of Service (DDoS) attacks | A third of organizations in Europe experienced DDoS in 2017 | The attackers manipulate users to perform actions or disclose confidential information. |
Majority of the organizations in the EU are phishing information | Social engineering | Conducts investigations in network attacks | Links are sent together with emails that seem to originate from trusted sources where users reveal their information. |
The diverse threats are overwhelming the country | Terrorist threats including ISIS and al-Qa’id (Gady and Austin, 2010) | Europe has introduced counterterrorism cooperation with the United States (Gady and Austin, 2010) | The increases of immigrants are introducing a pool of unemployed persons to conduct illegal procedures. |
The budget set aside against cyber threats is less irrespective of the increasing threats facing the country. | Irregular immigration to EU | The Western cohesion is threatened by the Russian influence | Majority of youths in Europe think it cool to attack |
The aspect of Brexit is increasing the periphery stability in Europe | unstable periphery | The Office of Cyber Security and Information Assurance (OCSIA) is the leading national stakeholder in cybersecurity (Coats, 2017). | The response is through the inter-departmental model by the governmental departments. |
Country: Nigeria in Africa | |||
Cyber Culture (i.e., How does the country view cyber threats? Is this consistent with the general country culture?) | Cybersecurity Threats | Cyber Legal Perspective/Cyber Economic Perspective | Response to Cyberterrorism/Recruiting |
Nigeria has undertaken counterterrorism attacks but its fragility is affecting the country negatively | Boko Haram | Nigeria remains a politically fragile country | The domestic and international law in Nigeria challenges the identification of perpetrators outside the country |
Nigeria outlaws cyber-bullying and cyberstalking | ISIS West Africa | Nigeria is facing regional menaces which are greatly affecting its relationship with the west. | Victims of cyber-attacks are charged a fine of more than N2 million or imprisonment for more than a year |
The aspect of digitalization has led to the rise of e-crimes including lottery and other internet scams | e-crimes | Corruption is high where Nigeria is the 3rd most corrupted country in Africa which challenges cybersecurity attempts (Frank and Odunayo, 2013). | The high rate of poverty in Nigeria triggers recruitment to the industry |
Use of password hacking system is common In Nigeria where programs are installed in the user’s computers but the culture of the country is the lack of a standardized and national central control | hackers | The country newest strategy to reduce cybertatacks is cyber command | The high number of unemployment in Nigeria has promoted hacking among the youths who hack for passwords and credit information |
Many banks in Nigeria are victims of Credit card fraud where hackers crack bank systems and transfer money to their accounts. | Cyber thefts through Credit card fraud | The introduction of new technologies overwhelms the legal standing and equivalence of Nigeria | Nigeria lacks a central control which is worsened by the porous nature of the internet |
Country: Russia | |||
Cyber Culture (i.e., How does the country view cyber threats? Is this consistent with the general country culture?) | Cybersecurity Threats | Cyber Legal Perspective/Cyber Economic Perspective | Response to Cyberterrorism/Recruiting |
On April 1, 2019, Russia unplugged itself from the global internet where the domestic users were serviced by Internet Service Providers (ISPs) (Khayryuzov, 2018) | NotPetya a ransomware worm | The Russian government was attacked to be the cause of NotPetya | The Russian government is less prepared for attacks (ill-preparedness) |
Russia has introduced the draft law which controls internet trafficking in Russian territory | The WannaCry outbreak in 2017 (Khayryuzov, 2018) | Government and corporate networks were greatly affected | Applies sovereign democracy in cyberspace |
The country has a well-documented cyber-attacks records | Masquerading | Russia plans to create its worldwide web corner | The Russian and West government are rivals which make each an enemy of the other (Chaillot Paper, 2018) |
Russia has weak systems and strategies to prevent the citizens and business fro cyber-attacks | Phishing | Several internet shutdowns | Russia is a background for criminal activities. |
The application of malware software’s is grounded in Russian’s criminal underground(Chaillot Paper, 2018) | Hackers and predators | Unstable government structures pose the country to more risks | There are many pirated software in the country |
References
CHAILLOT PAPER. (2018). Hacks, leaks, and disruptions Russian cyber strategies.
Coats, D. (2017). Worldwide Threat Assessment of the US Intelligence Community Senate Select Committee on Intelligence. Director Of National Intelligence.
Frank, I., & Odunayo, E. (2013). APPROACH TO CYBERSECURITY ISSUES IN NIGERIA: CHALLENGES AND SOLUTION. International Journal Of Cognitive Research In Science, Engineering, And Education, 1(1).
Gady, F. S., & Austin, G. (2010). Russia, the United States, and cyber diplomacy. Opening the Doors, EastWestInstitute, New York.Khayryuzov, V. (2018). Russian Federation: Privacy And Cybersecurity In Russia. Noerr. Retrieved from http://www.mondaq.com/russianfederation/x/750216/Data+Protection+Privacy/Privacy+And+Cybersecurity+In+Russia
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more