Sabotage/degradation of networks

Efforts to Combat and Curtail Old and New
Against this background, efforts need to be and are being taken to protect
online data and information. Throughout this book, we are going to look at
methods, tools and best practices to combat these increasing and evolving
crimes. We summarize below, but we will detail in the coming chapters the
global efforts by governments, civil society and individuals that include:
• Security awareness. Data from PricewaterhouseCoopers (PwC)’s Breaches
Survey (ISBS) report (2012) shows that an organization with a quality enduser security awareness program is less likely to suffer a security breach.5 The
report further shows that security awareness through enterprise security poli –
cies is very effective. For example, data in the report show that organizations
with a clearly understood security policy are less likely to be breached.
• Formation of public- private partnerships. Public private partnerships
are going to bear good results. Some of these partnerships include:
0 The United Kingdom’s Cyber Crime Reduction Partnership (CCRP).
This effort is to provide a forum in which government, law enforcement,
industry and academia can regularly come together to tackle cybercrime
more than before.6 During National Cyber Security Awareness Month
2012, the U.S. Department of Homeland Security (DHS) and its partners
from the public and private sector highlighted the importance of protecting against cybercrime.7
0 DHS collaborates with financial and other critical infrastructure sectors
to improve network security. Additionally, DHS components, such as
the U.S. Secret Service and U.S. Immigrations and Customs Enforcement
(ICE), have special divisions dedicated to fighting cybercrime.
0 The FBI has the following cybercrime partnerships and initiatives8
■ National Cyber Investigative Joint Task Force—as the focal point for
8 Computer Network Security and Cyber Ethics
all U.S. government agencies to coordinate, integrate, and share information related to all domestic cyber threat investigations.
■ Cyber Task Forces (CTF)—a group of all key law enforcement agencies
in all 56 field offices at the state and local levels.
■ InfraGard: Protecting Infrastructure—an information sharing and
analysis effort serving the interests and combining the knowledge base
of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector.