Addressing Cyber Crime Problems


Cyber crime differs from drugs crime in a number of ways. One important difference is those aspects of the problem that need to be given particular emphasis. With drugs a major challenge is catching and eliminating illegal producers and dealers; with cyber crime it is achieving effective protection against intruders who wish to access computer systems illegally. These invasions can have a variety of objectives and take many different forms, some of which were described in the preceding chapter. The perpetrators can be within or outside the company. This means that companies have an urgent need to protect themselves. Important and well-tested first-step capabilities that contribute to increased security are risk assessment and risk management. This can be a major task as, ideally, it should cover all current business activities and strategic plans for the next five years. There must be a recognition by everyone in the company that information is a valuable commodity and that both criminals and competitors can be trying to secure it. Companies are advised to prepare for attacks by ensuring that responsibility for investigating problems is clearly specified and known by all staff, that external legal advisers and police have good relationships with internal management, and that there is a crisis management plan in place that is tested regularly.


Criminal Activity Security Policy Computer Security National Security Agency Security Adviser 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Robert N. Charette, “The Mechanics of Managing IT Risk,” Journal of Information Technology 11 (December 1996): 373–378.Google Scholar
  2. 2.
    Kalle Lyytinen, Lars Mathiassen, and Janne Ropporen, “A Framework for Software Risk Management,” Journal of Information Technology 11 (December 1996): 275–285.Google Scholar
  3. 3.
    Gurpreet Dhillon and James Backhouse, “Managing for Secure Organizations: A Review of IT Security Research Approaches,” in Key Issues in Information Systems, ed. David E. Avison (London: McGraw-Hill, 1997), 377–390.Google Scholar
  4. 4.
    Othmar Kyas, Internet Security (London: Thompson Computer Press, 1997).Google Scholar
  5. 5.
    Clifford Stall, The Cuckoo’s Egg (London: Bodley Head, 1990).Google Scholar
  6. 6.
    Fred J. Heemstra and Rob J. Kusters, “Dealing with Risk: A Practical Approach,” Journal of Information Technology 11 (December 1996): 333–346.Google Scholar
  7. 7.
    Fred Piper, “Information Security,” Intersec 5,no. 5 (May 1995): 192–194.Google Scholar
  8. 8.
    Judith Jeffcoate, “Security in the Internet Age,” Secure Computing (September 1997): 60–61.Google Scholar
  9. 9.
    Dhillon and Backhouse, “Managing for Secure Organizations.”Google Scholar
  10. 10.
    Martin Kettle and Owen Boycott, “The Age of the Digital Sleuth,” Guardian Newspaper (December 12, 1997).Google Scholar
  11. 11.
    David Kahn, “Curiosity Code: Hackers Are Heirs to An Ancient Tradition,” Daily Telegraph (July 1, 1997).Google Scholar
  12. 12.
    Chris Sundt, “Security Problems of Electronic Data Interchange,” Intersec 4,no. 1 (January 1994): 22–24.Google Scholar
  13. 13.
    Vincent P. Grimes, “USA Round-UP,” Intersec 7,no. 9 (September 1997): 304–305.Google Scholar
  14. 14.
    Peter Sommer, “Cyber Extortion,” Secure Computing (April 1997); 41–43.Google Scholar
  15. 15.
    Bill Tupman, “Avoiding the Pitfalls of Fraud Investigation,” Intersec 5,no. 4 (April 1995): 123–124.Google Scholar
  16. 16.
    Michael Hudson, “From Disaster Response to Business Recovery,” Intersec 5,no. 7 (July 1995): 272–273.Google Scholar
  17. 17.
    Dhillon and Backhouse, “Managing for Secure Organization.”Google Scholar
  18. 18.
    Richard Kusnierz, “Hunting for the Needle,” Intersec 5,no. 5 (May 1995): 185–187.Google Scholar
  19. 19.
    Bryan Clough, “Computer Crime,” Intersec 7,no. 10 (October 1997): 364–365.Google Scholar
  20. 20.
    R. Dixon and C. Marston, “Computer Fraud,” Journal of Management Accounting 66,no. 9 (October 1988): 24–25.Google Scholar
  21. 21.
    John Cardin, “Welcome to World War Three,” Independent on Sunday (February 22, 1998).Google Scholar

Copyright information

© Kluwer Academic/Plenum Publishers 1999

Personalised recommendations