Page 73 - Cyber Warnings
P. 73







Threat intelligence collection in a developing world

By Milica D. Djekic


As it’s known – threat intelligence collection is mainly increasing in developing countries. These
countries could be a source of the real risks, threats and challenges which should be managed
carefully. It’s especially concerning to investors coming from a developed world to deal in such
an environment for a reason of quite huge level of the risk to their business reputation and much
more.

Through this article, we would talk about how threat intelligence being gathered in a developing
world could be used by “the first line on defense” community to update some national strategies,
plans and decisions. In other words, we would try to discuss how intelligence services could be
used to prevent their countries for a cybercrime, organized crime or even terrorism.


Many businesses from the western countries would be outsourced or run into developing
societies. The reasons to that decision could be somehow different, but the interest is the same
– the investors believe they may make a good profit taking advantage over inexpensive and
skillful workforce.

Practically, that would be the case in the past and such a strategy would demonstrate some
results. New times bring new customs, so maybe we should think how to overcome some of
today’s obstacles.

For instance, the mass usage of computers with the internet connection worldwide would begin
through ‘90s and such an occurrence would make us to think about the cybersecurity. Today –
the world is dealing with nearly 3 billion internet connections and much more computing devices
being stationary or mobile.

Also, many people would use their mobile phones to log onto some public networks. For such a
reason, it’s clear how the world has changed and why it’s important to adapt to those changes.

For instance, this new time would bring many advantages and some disadvantages being
reflected through the lack of a good cyber defense practice over the globe. Many western
businesses would try to outsource their production, services or manufacturing into a developing
world primarily being led with the intent to make a good profit.

They would use computers and their networks being exposed to the global web to exchange the
electronic mails or some confidential information through their communications and
correspondences. The trick is that those offices or companies are not isolated there.




73 Cyber Warnings E-Magazine November 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   68   69   70   71   72   73   74   75   76   77   78