SlideShare a Scribd company logo
1 of 12
Cyber-security and Target Breach
Cyber-security: It can be defined as a process or software or a set of protocols required to
protect the systemand computers from virus and cyber-attacks. Cyber-security is a crime
that has no limits and can take place anywhere anytime. The criminal need not travel from
one place to another. Attacker can sit in one corner of the globe and attack a system on
other side of the world or even his own neighbour. This makes it even more dangerous as it
increases the level of complexity in tracing a criminal’s location. This is why we need to take
this topic seriously and work over it. Cyber-security is taken very much seriously these days
ranging from corporate multinationals to local markets. There is a separate department for
cyber-security in corporate as even a little bit of error on their side can gift the cyber-
criminal with millions of finances.
Target Breach: It is a cyber-crime wherein the hacker breaches into your system and can
transfer finance and secured data into his own account or impulse the system with a virus
which can create lots of problems for the user to operate. Cyber-crimes take place either for
finance or for stealing data and codes. It can even take place sometime as means of revenge
or rage.
Cyber-attacks can take place from any part of the world targeting all the major companies
and banks. It is a form of an attack that can have devastating effects. If we compare the
cyber-attacks to the arrests made, then statistics tell us that the number of attacks have
been increasing every year. This tells us how difficult it has been to catch criminals and
enforce punishment.
The above graph tells us about the relation between crimes committed and criminals
arrested in the past four years.
Cyber-crimes take place mainly in another country. Statistics tells us that most of the attacks
take place across borders.
The reason behind this is the amount of finance and the option of securing their locations.
Based on my research the main reason what I believe is the lack and variation in laws across
boundaries that vary from nation to nation. These undefined or limited set of legislatures
sometimes act against us, helping the hackers in a way. Therefore, it becomes necessary
that we need to build laws that would act like walls or laser beams that would inhibit these
hackers from attacking the systemand at the same time getting them behind bars.
Cyber-crime is now a global phenomenon measures need to be taken in order to put this
crisis to an end. In order to change this I have come up with an idea to putting an end or at
least inhibiting much of these attacks. As the laws and policies differ from nation to nation,
we need a firm set of laws that will be able to provide justice to the victims and punish
criminals. How I plan to do this is by assembling a response team. A group of nations much
more like G7 (earlier known as G8) but focussed only on cyber-crimes. Their objective will be
to catch and apprehend criminals to eradicate cyber-crime or nullify it as much as possible.
This team will include industrial powerhouse nations like United Kingdom, Germany, United
States, Japan, Italy, Canada, India and France. I would be calling it ICIT (International Cyber-
crime Investigation Team). This team will include a group of professional hackers and
government officials of the major countries from each continent. They will together build up
a set of rules and protocols to fight cyber-crime. These laws must be flexible even if the
criminal is from another country than the crime scene. Under no circumstances should the
criminal be getting away.
Components of the Policy:
ICIT will have a set of protocols that will be implied upon all the criminals around the globe.
Whenever a cyber-crime scene occurs, it will be tested on the basis of location and the
special agents of ICIT will carry out further investigation. Based on these parameters special
agents will follow the protocols and arrest the hacker for violating cyber-laws. As there will
be a set of common laws for every nation, these criminals will not be subject to any change
in law by the demands of the nation.
Current policy:
 G8 follows a certain set of policies to combat cyber-crime.
 United Nations
 Cyber security act of 2010.
Change in current policy:
ICIT will be focussed only on combating cyber crimes and issues unlike G8 and UN. Cyber
security act of 2010 emphasizes on the combination of the government and the private
sector to fight and protect against cyber-crime. However, ICIT changes this completely, as it
is combining governments of the nations, private sectors as well as cyber expertise to form a
team against cyber-crime. It will be a wonderful combination of legislature and technology
which will bring out the best of both. Producing a rightful and clean technology which will
be played under the legislature and law.
Challenges addressed in mid-term:
“So the challenge here would be to make the laws more sophisticated over the international
phase to eliminate cyber-crimes globally. “ As per my statement in my mid-term research
paper, ICIT has a set of laws that will be applicable to every cyber criminal on the planet.
There will not be any kind of discrimination as per international boundaries. Rules will be
common to all irrespective of their nationality. This will cite under ‘The right to arrest at
target point’ This law will enable the ICIT official to encounter arresting criminals at any time
and place on the planet.
The right to arrest at target point:
This Law will be passed by the ICIT which will be governed and approved by the government
officials and legislatures of member nations.
As ICIT will be a team of industrialised and economically advanced nations, ICIT will be
funded by the self interest of its very own governments and authorities.
Implementation:
ICIT will follow a certain set of protocols which it will implement in order to combat cyber
crimes. Its laws are meant for all the criminals around the world. . For example, a criminal in
Russia attacks a bank in Japan. He will travel to Egypt after this event. However, he is still a
criminal irrespective of where he is. Once the criminal’s identity is confirmed, ICIT will have
the authority to subject him to direct arrest under the charges of violations of cyber law. So
he will be arrested in Egypt and will be subject to prison at the same place wherein the
crime was conducted i.e. Russia. Let me be clear is the crime where it is conducted from and
not where it is conducted will subject the authority to arrest. The criminal can be arrest by
the Russia authority if he is inside the borders of Russia or ICIT takes over the case. In either
of the cases an arrest and investigation can be done by ICIT. This is known as ‘The right to
arrest at target point’.
This law challenges the fact that international criminals easily change their location, identity
and activities to avoid getting arrested. However, this law will act like a stick to the muscle
for these worldwide criminals. ‘The right to arrest at target point’ gives a loud and clear
message that there’s no way to escape.
‘The right to arrest at target point’ is a bill that will be approved by the federals and
governments of member nations. Plus it acts on a global level and not domestic, therefore
there cannot be any confusion in functionalities and authorization.
The above graphical representation is a result obtained via statistical information regarding
the rate of decrease in cyber crime. The current systemis functioning fast but it would take
ages to cut down on cyber crime. ICIT is much faster, sharper and robust system that can be
used to combat cyber crime. It has a firm set of employees who are willing to work day in
and day out in the form of military, armed forces, investigation agencies, forensics, private
sectors, engineers, lawyers and most importantly the government. This will in return be a
much quicker response team than the earlier likes of FBI and G6 which are the best at
present but their methods can be improvised.
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
2016 2017 2018 2019 2020
No ICIT
ICIT
Issues solved by ICIT:
 Types of computer security tools and procedures used
 Wireless network information security tools and procedures
 Computer security policies and procedures
 Compliance with an IT security related standards, if applicable
 Computer security expenditure
 Computer security insurance, training and outsourcing
 Evaluation of security measures
 Computer security vulnerabilities
 Computer security incidents during the last year
 Type of most recent attack
 Motive for most recent attack
 Incident reporting procedure, if any
 Outcomes of reported incidents
Conclusion:
As we have seen and experienced cases in cyber crime and target breach, we can
draw conclusion that it is a very serious issue at a global level. It is a very serious
aspect in any field. It has and can always in the future cause devastating effects.
Criminals can target any field of area ranging from education, food to business and
government. Their crime will have no limit and the extent to which it can leap is
unimaginable. Hence, we have to end this and together we can achieve this.
Together we will unite and fight them in the form of ICIT. This is our team, it’s our
side, our people who represent us in this battle. ICIT have the best government
officials and engineers who together will and can change the world upside down.
ICIT changes the face of cyber crime. International crime scenes will be permanently
prosecuted. There will be digital surveillance and mapping however safety and public
privacy will be ensured and will not be compromised. We have to fight this battle
against the odds but not at the expense of sacrificing our people’s belief in us. This
trust is our biggest treasure. ICIT with is laws and regulations will ensure safety of
wealth and rights. Our systems will be more secure. Target beach and virus attacks
will deteriorate and eventually would not exist. It will change its prior policies on
international criminals. ‘The right to arrest at target point’ will be the best weapon
against cyber criminals. It will provide justice to the people and get criminals behind
bars. Thereby, I can conclude by saying that ICIT will be an efficient response team
and our best chance to combat cyber crime. ICIT will come with an assurance that
Cyber crime will decrease and criminals will go down. Justice will be served.
“The precondition to security is freedom” – Rand beers
References:
What are Cybercrime Investigations? (n.d.). Retrieved December 11, 2015, from
http://www.detectiveedu.org/cybercrimes-and-identity-theft-investigations/
Cybercrime Incidents on the Rise. (n.d.). Retrieved December 11, 2015, from
http://www.wealthandfinance-intl.com/cybercrime-incidents-on-the-rise
Krebs on Security. (n.d.). Retrieved December 11, 2015, from
http://krebsonsecurity.com/tag/target-data-breach/
Cybersecurity. (n.d.). Retrieved December 11, 2015, from
http://www.technewsworld.com/perl/section/cyber-security/
(2012, June 26). Retrieved December 11, 2015, from
https://www.fbi.gov/newyork/press-releases/2012/manhattan-u.s.-attorney-and-
fbi-assistant-director-in-charge-announce-24-arrests-in-eight-countries-as-part-
of-international-cyber-crime-takedown
(n.d.). Retrieved December 11, 2015, from https://en.wikipedia.org/wiki/Cyber-
security_regulation
(n.d.). Retrieved December 11, 2015, from
https://en.wikipedia.org/wiki/National_Cyber_Security_Division
(n.d.). Retrieved December 11, 2015, from
https://en.wikipedia.org/wiki/International_cybercrime
(n.d.). Retrieved December 11, 2015, from https://en.wikipedia.org/wiki/Cyber-
security_regulation
CCIPS Press Releases - 2015. (n.d.). Retrieved December 11, 2015, from
http://www.justice.gov/criminal-ccips/ccips-press-releases-2015

More Related Content

What's hot

Ros asignment
Ros asignmentRos asignment
Ros asignment
Ros Galib
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
Eljay Robertson
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
Jacqueline Fick
 
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportPA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
James Fisher
 

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Ros asignment
Ros asignmentRos asignment
Ros asignment
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 
Chapter14
Chapter14Chapter14
Chapter14
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control Authority
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-reportPA-Consulting-Group_Cybercrime-Tipping-point-survey-report
PA-Consulting-Group_Cybercrime-Tipping-point-survey-report
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 

Viewers also liked

Perfil Argentina
Perfil ArgentinaPerfil Argentina
Perfil Argentina
ProColombia
 
מצוקת הדיורר 2011 תמצית נתונים
 מצוקת הדיורר 2011 תמצית נתונים מצוקת הדיורר 2011 תמצית נתונים
מצוקת הדיורר 2011 תמצית נתונים
acri009
 
Bitácora electrónica o blog
Bitácora electrónica o blogBitácora electrónica o blog
Bitácora electrónica o blog
Erick Mero
 
Celebrating With The Blooms
Celebrating With The BloomsCelebrating With The Blooms
Celebrating With The Blooms
impactalliance
 
도메인 주도 설계 - 6장 도메인 객체의 생명주기
도메인 주도 설계 - 6장 도메인 객체의 생명주기도메인 주도 설계 - 6장 도메인 객체의 생명주기
도메인 주도 설계 - 6장 도메인 객체의 생명주기
JangHyuk You
 

Viewers also liked (17)

YANG (哪)
YANG (哪)YANG (哪)
YANG (哪)
 
Germany vs norway
Germany vs norwayGermany vs norway
Germany vs norway
 
Perfil Argentina
Perfil ArgentinaPerfil Argentina
Perfil Argentina
 
מצוקת הדיורר 2011 תמצית נתונים
 מצוקת הדיורר 2011 תמצית נתונים מצוקת הדיורר 2011 תמצית נתונים
מצוקת הדיורר 2011 תמצית נתונים
 
Bitácora electrónica o blog
Bitácora electrónica o blogBitácora electrónica o blog
Bitácora electrónica o blog
 
cv with expenc
cv with expenccv with expenc
cv with expenc
 
Fit for Purpose
Fit for Purpose Fit for Purpose
Fit for Purpose
 
Jk
JkJk
Jk
 
Celebrating With The Blooms
Celebrating With The BloomsCelebrating With The Blooms
Celebrating With The Blooms
 
Acreage For Sale In Tx: The Ups And Downs Of Property Properties That Are Ame...
Acreage For Sale In Tx: The Ups And Downs Of Property Properties That Are Ame...Acreage For Sale In Tx: The Ups And Downs Of Property Properties That Are Ame...
Acreage For Sale In Tx: The Ups And Downs Of Property Properties That Are Ame...
 
"see blue." U 2015 | CAFE Summer 2015
"see blue." U 2015 |  CAFE Summer 2015"see blue." U 2015 |  CAFE Summer 2015
"see blue." U 2015 | CAFE Summer 2015
 
Art by Chen Yongle
Art by Chen YongleArt by Chen Yongle
Art by Chen Yongle
 
도메인 주도 설계 - 6장 도메인 객체의 생명주기
도메인 주도 설계 - 6장 도메인 객체의 생명주기도메인 주도 설계 - 6장 도메인 객체의 생명주기
도메인 주도 설계 - 6장 도메인 객체의 생명주기
 
Dreamcatcher by Carol Calavaris.
Dreamcatcher by Carol Calavaris.Dreamcatcher by Carol Calavaris.
Dreamcatcher by Carol Calavaris.
 
Folhetos
FolhetosFolhetos
Folhetos
 
A BAIXA
A BAIXAA BAIXA
A BAIXA
 
Introduction aux leçons
Introduction aux leçonsIntroduction aux leçons
Introduction aux leçons
 

Similar to Cyber2

Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
 
Week 10 Discussion Information Security and Digital Crime and .docx
 Week 10 Discussion Information Security and Digital Crime and .docx Week 10 Discussion Information Security and Digital Crime and .docx
Week 10 Discussion Information Security and Digital Crime and .docx
aryan532920
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
Paul Elliott
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
poulterbarbara
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
gertrudebellgrove
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
adkinspaige22
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
drennanmicah
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
alisondakintxt
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
YogeshIJTSRD
 

Similar to Cyber2 (20)

Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Week 10 Discussion Information Security and Digital Crime and .docx
 Week 10 Discussion Information Security and Digital Crime and .docx Week 10 Discussion Information Security and Digital Crime and .docx
Week 10 Discussion Information Security and Digital Crime and .docx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
3.abstract (cyber crime)
3.abstract (cyber crime)3.abstract (cyber crime)
3.abstract (cyber crime)
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
A System to record and document cybercrime incidents for middle east countri...
A System  to record and document cybercrime incidents for middle east countri...A System  to record and document cybercrime incidents for middle east countri...
A System to record and document cybercrime incidents for middle east countri...
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Cyber2

  • 1. Cyber-security and Target Breach Cyber-security: It can be defined as a process or software or a set of protocols required to protect the systemand computers from virus and cyber-attacks. Cyber-security is a crime that has no limits and can take place anywhere anytime. The criminal need not travel from one place to another. Attacker can sit in one corner of the globe and attack a system on other side of the world or even his own neighbour. This makes it even more dangerous as it increases the level of complexity in tracing a criminal’s location. This is why we need to take this topic seriously and work over it. Cyber-security is taken very much seriously these days ranging from corporate multinationals to local markets. There is a separate department for cyber-security in corporate as even a little bit of error on their side can gift the cyber- criminal with millions of finances. Target Breach: It is a cyber-crime wherein the hacker breaches into your system and can transfer finance and secured data into his own account or impulse the system with a virus which can create lots of problems for the user to operate. Cyber-crimes take place either for finance or for stealing data and codes. It can even take place sometime as means of revenge or rage. Cyber-attacks can take place from any part of the world targeting all the major companies and banks. It is a form of an attack that can have devastating effects. If we compare the cyber-attacks to the arrests made, then statistics tell us that the number of attacks have been increasing every year. This tells us how difficult it has been to catch criminals and enforce punishment.
  • 2. The above graph tells us about the relation between crimes committed and criminals arrested in the past four years. Cyber-crimes take place mainly in another country. Statistics tells us that most of the attacks take place across borders.
  • 3. The reason behind this is the amount of finance and the option of securing their locations. Based on my research the main reason what I believe is the lack and variation in laws across boundaries that vary from nation to nation. These undefined or limited set of legislatures sometimes act against us, helping the hackers in a way. Therefore, it becomes necessary that we need to build laws that would act like walls or laser beams that would inhibit these hackers from attacking the systemand at the same time getting them behind bars.
  • 4. Cyber-crime is now a global phenomenon measures need to be taken in order to put this crisis to an end. In order to change this I have come up with an idea to putting an end or at least inhibiting much of these attacks. As the laws and policies differ from nation to nation, we need a firm set of laws that will be able to provide justice to the victims and punish criminals. How I plan to do this is by assembling a response team. A group of nations much more like G7 (earlier known as G8) but focussed only on cyber-crimes. Their objective will be to catch and apprehend criminals to eradicate cyber-crime or nullify it as much as possible. This team will include industrial powerhouse nations like United Kingdom, Germany, United States, Japan, Italy, Canada, India and France. I would be calling it ICIT (International Cyber- crime Investigation Team). This team will include a group of professional hackers and government officials of the major countries from each continent. They will together build up a set of rules and protocols to fight cyber-crime. These laws must be flexible even if the criminal is from another country than the crime scene. Under no circumstances should the criminal be getting away.
  • 5. Components of the Policy: ICIT will have a set of protocols that will be implied upon all the criminals around the globe. Whenever a cyber-crime scene occurs, it will be tested on the basis of location and the special agents of ICIT will carry out further investigation. Based on these parameters special agents will follow the protocols and arrest the hacker for violating cyber-laws. As there will be a set of common laws for every nation, these criminals will not be subject to any change in law by the demands of the nation. Current policy:  G8 follows a certain set of policies to combat cyber-crime.  United Nations  Cyber security act of 2010. Change in current policy: ICIT will be focussed only on combating cyber crimes and issues unlike G8 and UN. Cyber security act of 2010 emphasizes on the combination of the government and the private sector to fight and protect against cyber-crime. However, ICIT changes this completely, as it is combining governments of the nations, private sectors as well as cyber expertise to form a team against cyber-crime. It will be a wonderful combination of legislature and technology which will bring out the best of both. Producing a rightful and clean technology which will be played under the legislature and law.
  • 6. Challenges addressed in mid-term: “So the challenge here would be to make the laws more sophisticated over the international phase to eliminate cyber-crimes globally. “ As per my statement in my mid-term research paper, ICIT has a set of laws that will be applicable to every cyber criminal on the planet. There will not be any kind of discrimination as per international boundaries. Rules will be common to all irrespective of their nationality. This will cite under ‘The right to arrest at target point’ This law will enable the ICIT official to encounter arresting criminals at any time and place on the planet. The right to arrest at target point: This Law will be passed by the ICIT which will be governed and approved by the government officials and legislatures of member nations. As ICIT will be a team of industrialised and economically advanced nations, ICIT will be funded by the self interest of its very own governments and authorities.
  • 7. Implementation: ICIT will follow a certain set of protocols which it will implement in order to combat cyber crimes. Its laws are meant for all the criminals around the world. . For example, a criminal in Russia attacks a bank in Japan. He will travel to Egypt after this event. However, he is still a criminal irrespective of where he is. Once the criminal’s identity is confirmed, ICIT will have the authority to subject him to direct arrest under the charges of violations of cyber law. So he will be arrested in Egypt and will be subject to prison at the same place wherein the crime was conducted i.e. Russia. Let me be clear is the crime where it is conducted from and not where it is conducted will subject the authority to arrest. The criminal can be arrest by the Russia authority if he is inside the borders of Russia or ICIT takes over the case. In either of the cases an arrest and investigation can be done by ICIT. This is known as ‘The right to arrest at target point’. This law challenges the fact that international criminals easily change their location, identity and activities to avoid getting arrested. However, this law will act like a stick to the muscle for these worldwide criminals. ‘The right to arrest at target point’ gives a loud and clear message that there’s no way to escape. ‘The right to arrest at target point’ is a bill that will be approved by the federals and governments of member nations. Plus it acts on a global level and not domestic, therefore there cannot be any confusion in functionalities and authorization.
  • 8. The above graphical representation is a result obtained via statistical information regarding the rate of decrease in cyber crime. The current systemis functioning fast but it would take ages to cut down on cyber crime. ICIT is much faster, sharper and robust system that can be used to combat cyber crime. It has a firm set of employees who are willing to work day in and day out in the form of military, armed forces, investigation agencies, forensics, private sectors, engineers, lawyers and most importantly the government. This will in return be a much quicker response team than the earlier likes of FBI and G6 which are the best at present but their methods can be improvised. 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 2016 2017 2018 2019 2020 No ICIT ICIT
  • 9. Issues solved by ICIT:  Types of computer security tools and procedures used  Wireless network information security tools and procedures  Computer security policies and procedures  Compliance with an IT security related standards, if applicable  Computer security expenditure  Computer security insurance, training and outsourcing  Evaluation of security measures  Computer security vulnerabilities  Computer security incidents during the last year  Type of most recent attack  Motive for most recent attack  Incident reporting procedure, if any  Outcomes of reported incidents
  • 10. Conclusion: As we have seen and experienced cases in cyber crime and target breach, we can draw conclusion that it is a very serious issue at a global level. It is a very serious aspect in any field. It has and can always in the future cause devastating effects. Criminals can target any field of area ranging from education, food to business and government. Their crime will have no limit and the extent to which it can leap is unimaginable. Hence, we have to end this and together we can achieve this. Together we will unite and fight them in the form of ICIT. This is our team, it’s our side, our people who represent us in this battle. ICIT have the best government officials and engineers who together will and can change the world upside down. ICIT changes the face of cyber crime. International crime scenes will be permanently prosecuted. There will be digital surveillance and mapping however safety and public privacy will be ensured and will not be compromised. We have to fight this battle against the odds but not at the expense of sacrificing our people’s belief in us. This trust is our biggest treasure. ICIT with is laws and regulations will ensure safety of wealth and rights. Our systems will be more secure. Target beach and virus attacks will deteriorate and eventually would not exist. It will change its prior policies on international criminals. ‘The right to arrest at target point’ will be the best weapon against cyber criminals. It will provide justice to the people and get criminals behind bars. Thereby, I can conclude by saying that ICIT will be an efficient response team and our best chance to combat cyber crime. ICIT will come with an assurance that Cyber crime will decrease and criminals will go down. Justice will be served.
  • 11. “The precondition to security is freedom” – Rand beers
  • 12. References: What are Cybercrime Investigations? (n.d.). Retrieved December 11, 2015, from http://www.detectiveedu.org/cybercrimes-and-identity-theft-investigations/ Cybercrime Incidents on the Rise. (n.d.). Retrieved December 11, 2015, from http://www.wealthandfinance-intl.com/cybercrime-incidents-on-the-rise Krebs on Security. (n.d.). Retrieved December 11, 2015, from http://krebsonsecurity.com/tag/target-data-breach/ Cybersecurity. (n.d.). Retrieved December 11, 2015, from http://www.technewsworld.com/perl/section/cyber-security/ (2012, June 26). Retrieved December 11, 2015, from https://www.fbi.gov/newyork/press-releases/2012/manhattan-u.s.-attorney-and- fbi-assistant-director-in-charge-announce-24-arrests-in-eight-countries-as-part- of-international-cyber-crime-takedown (n.d.). Retrieved December 11, 2015, from https://en.wikipedia.org/wiki/Cyber- security_regulation (n.d.). Retrieved December 11, 2015, from https://en.wikipedia.org/wiki/National_Cyber_Security_Division (n.d.). Retrieved December 11, 2015, from https://en.wikipedia.org/wiki/International_cybercrime (n.d.). Retrieved December 11, 2015, from https://en.wikipedia.org/wiki/Cyber- security_regulation CCIPS Press Releases - 2015. (n.d.). Retrieved December 11, 2015, from http://www.justice.gov/criminal-ccips/ccips-press-releases-2015