Page 60 - index
P. 60
Harsher laws have also been written for criminal offenders. The U.S.A. Patriot Act of 2001 has
increased the penalty for first time offenders from five years to 20 years. Many states have
passed similar laws.
These laws will, hopefully, deter the cybercriminal actions while simultaneously encourage
organizations to implement controls to identify and correct the insider vulnerability. Although
additional measures of security are inconvenient and costly, the absence of them can have
unrecoverable and fatal consequences on an organization.
References
Biedel, E. (2011). Protectors of Critical Network Look Within For Vulnerabilities. National
Defense, 96(693), 36.
Bulman Jr, R. C., & Lehman, J. (2004). Attacking the Hacking from the Inside Out. Journal of
Internet Law, 8(6), 16-20.
Goodrich, M. & Tamassia, R. (2011). Introduction to Computer Security. Boston, MA: Pearson
Education, Inc.
Hayden, M. V. (2014). Beyond Snowden. World Affairs, 176(5), 13-23.
Jaeseung, H., Jongwung, K., & Jeonghun, C. (2010). The Trend of the Security Research for
the Insider Cyber Threat. International Journal of Security & Its Applications, 4(3), 55-63.
Johnston A, Hale R. Improved Security through Information Security Governance.
Communications of The ACM [serial online]. January 2009:52(1):126-129. Available from:
Business Source Complete, Ipswich, MA. Accessed March 21, 2015.
Magklaras, G., & Furnell, S. (2005). A preliminary model of end user sophistication for insider
threat prediction in IT systems. Computers & Security, 24371-380.
doi:10.1016/j.cose.2004.10.003
Onwubiko, C., & Lenaghan, A. (2007). Managing Security Threats and Vulnerabilities for Small
to Medium Enterprises. 2007 IEEE Intelligence & Security Informatics, 244.
doi:10.1109/ISI.2007.379479
Schultz, E. E. (2002). A framework for understanding and predicting insider attacks. Computers
& Security, (6). 526.
Singh, T. p., & Gupta, S. (2014). Enhancing Performance of Iris Recognition Algorithm through
Time Reduction. International Journal of Signal Processing, Image Processing &
Pattern Recognition, 7(4), 57-64. doi:10.14257/ijsip.2014.7.4.05
60 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide