International Cybersecurity Threat Matrix

Country: Europe
Cyber Culture (i.e., How does the country view cyber threats? Is this consistent with the general country culture?)Cybersecurity ThreatsCyber Legal Perspective/Cyber Economic PerspectiveResponse to Cyberterrorism/Recruiting
On April 9, 2019. Europe introduced the Cybersecurity Act which aims at certifying schemes in EU (Coats, 2017)Distributed Denial of Service (DDoS) attacksA third of organizations in Europe experienced DDoS in 2017The attackers manipulate users to perform actions or disclose confidential information.  
Majority of the organizations in the EU are phishing informationSocial engineering Conducts investigations  in network attacks Links are sent together with emails that seem to originate from trusted sources where users reveal their information. 
The diverse threats are overwhelming the countryTerrorist threats including ISIS and al-Qa’id (Gady and Austin, 2010)Europe has introduced counterterrorism cooperation with the United States (Gady and Austin, 2010)The increases of immigrants are introducing a pool of unemployed persons to conduct illegal procedures.
The budget set aside against cyber threats is less irrespective of the increasing threats facing the country. Irregular immigration to EUThe Western cohesion is threatened by the Russian influence Majority of youths in Europe think it cool to attack
The aspect of Brexit is increasing the periphery stability in Europeunstable periphery The Office of Cyber Security and Information Assurance (OCSIA) is the leading national stakeholder in cybersecurity (Coats, 2017). The response is through the inter-departmental model by the governmental departments.
Country: Nigeria in Africa
Cyber Culture (i.e., How does the country view cyber threats? Is this consistent with the general country culture?)Cybersecurity ThreatsCyber Legal Perspective/Cyber Economic PerspectiveResponse to Cyberterrorism/Recruiting
Nigeria has undertaken counterterrorism attacks but its fragility is affecting the country negativelyBoko Haram Nigeria remains a politically fragile countryThe domestic and international law in Nigeria challenges the identification of perpetrators outside the country 
Nigeria outlaws cyber-bullying and cyberstalking  ISIS West AfricaNigeria is facing regional menaces which are greatly affecting its relationship with the west.Victims of cyber-attacks are charged a fine of more than N2 million or imprisonment for more than a year
The aspect of digitalization has led to the rise of e-crimes including lottery and other internet scamse-crimes Corruption is high where Nigeria is the 3rd most corrupted country in Africa which challenges cybersecurity attempts (Frank and Odunayo, 2013). The high rate of poverty in Nigeria triggers recruitment to the industry

Use of password hacking system is common In Nigeria  where programs are installed in the user’s computers but the culture of the country is the lack of a standardized and national  central controlhackersThe country newest strategy to reduce cybertatacks is cyber commandThe high number of unemployment in Nigeria has promoted hacking among the youths who hack for passwords and credit information
Many banks in Nigeria are victims of Credit card fraud where hackers crack bank systems and transfer money to their accounts.Cyber thefts through Credit card fraudThe introduction of new technologies overwhelms the legal standing and equivalence of Nigeria Nigeria lacks a central control which is worsened by the porous nature of the internet 
Country: Russia 
Cyber Culture (i.e., How does the country view cyber threats? Is this consistent with the general country culture?)Cybersecurity ThreatsCyber Legal Perspective/Cyber Economic PerspectiveResponse to Cyberterrorism/Recruiting
  On April 1, 2019, Russia unplugged itself from the global internet where the domestic users were serviced by Internet Service Providers (ISPs) (Khayryuzov, 2018)NotPetya a ransomware wormThe Russian government was attacked to be the cause of NotPetyaThe Russian government is less prepared for attacks (ill-preparedness)
Russia has introduced the draft law which controls internet trafficking in Russian territoryThe WannaCry outbreak in 2017 (Khayryuzov, 2018)Government and corporate networks  were  greatly affected Applies sovereign democracy in cyberspace  
The country has a well-documented cyber-attacks records Masquerading  Russia plans to create its worldwide web cornerThe Russian and West government are rivals which make each an enemy of the other (Chaillot Paper, 2018)
Russia has  weak systems and strategies to prevent the citizens and business fro cyber-attacks Phishing Several internet shutdownsRussia is a background for criminal activities.
The application of malware software’s is grounded in Russian’s criminal underground(Chaillot Paper, 2018)Hackers and predators Unstable government structures pose the country to more risksThere are many pirated software in the country 


CHAILLOT PAPER. (2018). Hacks, leaks, and disruptions Russian cyber strategies.

Don't use plagiarized sources. Get Your Custom Essay on
International Cybersecurity Threat Matrix
Just from $13/Page
Order Essay

Coats, D. (2017). Worldwide Threat Assessment of the US Intelligence Community Senate Select Committee on Intelligence. Director Of National Intelligence.

Frank, I., & Odunayo, E. (2013). APPROACH TO CYBERSECURITY ISSUES IN NIGERIA: CHALLENGES AND SOLUTION. International Journal Of Cognitive Research In Science, Engineering, And Education1(1).

 Gady, F. S., & Austin, G. (2010). Russia, the United States, and cyber diplomacy. Opening the Doors, EastWestInstitute, New York.Khayryuzov, V. (2018). Russian Federation: Privacy And Cybersecurity In Russia. Noerr. Retrieved from

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 20% with the discount code LEMONADE