Page 50 - Cyber Defense eMagazine - September 2017
P. 50
could get corrupted by some competitor’s organization or organized as a criminal group that
would offer something on the black market. In such a case, we are talking about the
transnational crime and for such a purpose – we need the international cooperation of the
defense and intelligence communities. It’s a quite expected scenario that the majority of those
insider’s threats could be paid by some organized crime and terrorist groups in order to cause
the collapse of some critical infrastructure. Also, it’s a quite common case that those bad guys
would be motivated financially, politically or ideologically. The specific challenge to this situation
could be the fact that the developing economies would deal with the less developed legal
regulations, so committing such a sort of crime on their territory would include less risk to those
malicious actors.
So, how corruption could be linked with the cyber defense? The point is that the majority of a
modern world would depend on the cyber technologies. That’s not the case with the legal part of
a society only, but rather with the
illegal groups of people as well.
The experience would suggest
that it’s quite uneasy to prove the
corruption in a practice. The
similar case is with the insider’s
threats as well. On the other
hand, you should always have in
mind that the threats would
mainly use the cyber
technologies to communicate with
each other and exchange the
information about their activities.
In other words, once you catch
them in a cyberspace planning
some operation – you would
obtain some findings being useful
for the financial crime
investigation. Well, it would seem
that we could prevent some of
those schemes doing a continuous monitoring of the cyberspace. What would that mean in a
reality? In a practice, you should deal with the IT security professional or the entire security
operating center (SOC) that would care about the organization’s cyber defense and discover the
possible scenarios of public authority misuses. It’s quite clear that in such a case – it would be
possible to obtain the findings about some suspicious activities occurring within your
cyberspace. In other words, all we need is a good risk management within our computers,
internet and mobile technologies. For instance, it’s feasible that the cybersecurity experts would
prevent some corruption’s cases even happen and consequently – report those insider’s threats
activities to the authorities. As we said – the concern is that many developing counties would
not deal with the adequate legal regulations and those sorts of criminals would avoid to get
punished as they deserve. This could be quite concerning to the developed societies because
the threats could come from those less developed parts of the world relying on so simple way of
information transfer being the cyber carriers. Finally, we would realize that the insider’s threats
being correlated with the corruption are not uncatchable taking into account that they are
leaving the trace in a cyberspace and the good cyber defense could discover and even prevent
some of these cases ever happen in a practice.
50 Cyber Defense eMagazine – September 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide.