Skip to main content

2015 | OriginalPaper | Buchkapitel

The Enemy Within: The Challenge for Business from Cyber-attack

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents an overview of certain risks posed by cyber abuse in the business context. It does not in any way represent a definitive study of this very complex area which is in a state of constant flux to the extent that the laws of nations cannot keep pace with the challenges of today let alone tomorrow. This paper therefore gives warning of this phenomenon and focusses on the role of business to its management and staff and others affected by its IT structure. The paper gives some analysis of the threats from cyber-crime and abuse from a variety of government agencies and other bodies. The underlying theme is one of caution and warning of the enemy within organisations and outside who use cyber-attack as a means to an end.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Consumer Survey, Office of Fair Trading.
 
2
The Internet Crime Complaint Centre. Partners: The Federal Bureau of Investigation, Bureau of Justice Assistance U.S. Department of Justice and the National White Collar Crime Centre.
 
3
The Internet Crime Complaint Centre. Partners: The Federal Bureau of Investigation, Bureau of Justice Assistance U.S. Department of Justice and the National White Collar Crime Centre.
 
4
2012 Internet Crime Report IC3 p.15. www.​ic3.​gov.
 
5
Strasbourg, 18 June 2013, Data Protection and Cybercrime Division, Council of Europe, Strasbourg. Data Protection and Cybercrime Division Directorate General of Human Rights and Rule of Law Council of Europe, F-67075 Strasbourg Cedex (France).
 
7
Internet Security Threat Report” – Symantec, October 2009.
 
8
Home Office June 2014.
 
9
Home Office June 2014.
 
10
Home Office June 2014.
 
11
Home Office June 2014.
 
13
2014 Information Security Breaches Survey sponsored by the Department for Business Innovation and Skills.
 
14
Jahankhani, H., Al-Nemrat, A., Hosseinian-far, A. (2014) “Cybercrime classification and characteristics” in Cybercrime and Cyber Terrorism Investigators’ Handbook, Elsevier, ISBN 978-1447126829. And in Jahankhani, H. (2013) “Developing a model to reduce and/ or prevent cybercrime victimization among the user individuals”, in Strategic Intelligence Management, Springer, ISBN 978-0124071919.
 
15
Cabinet Office https://​www.​gov.​uk/​government/​publications/​ 10 steps to cyber security advice sheet. Accessed: 10/02/15.
 
16
Cabinet Office https://​www.​gov.​uk/​government/​publications/​ 10 steps to cyber security advice sheet. Paras 3 and 3.1. Accessed: 10/02/15.
 
17
Cabinet Office https://​www.​gov.​uk/​government/​publications/​ 10 steps to cyber security advice sheet. Accessed: 10/02/15 Summary.
 
18
Cabinet Office https://​www.​gov.​uk/​government/​publications/​ 10 steps to cyber security advice sheet. Accessed: 10/02/15.
 
19
Ernst & Young. Ever-increasing fraud risks in the IT and ITeS sector. (2011) p.4.
 
20
For an example of the concerns raised at the highest levels of international arbitration see; Michael Reynolds PhD (LSE) Ethics in International Arbitration. Legal Ethics December 2014.
 
Metadaten
Titel
The Enemy Within: The Challenge for Business from Cyber-attack
verfasst von
Michael Reynolds
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-23276-8_11