question archive Your textbook explains four strategies on responding to cybercrime
Subject:LawPrice:12.86 Bought3
Your textbook explains four strategies on responding to cybercrime. The four strategies that our text identifies for responding to cybercrime are, "police strategies, legislative strategies, retributive strategies, and general prevention strategies.” (Payne 2017, p.186) Explain and defend which strategy would work best and how could you improve upon that strategy.
Cyber-Crime Prevention Strategy: General Prevention Strategies
In my opinion, general prevention strategies would work best in responding to cybercrime. These strategies revolve around the implementation of techniques such as employee training in cybercrimes. Basically, it is undeniably critical to train workers on how to recognize cybercrimes-related warning signs as well as how to keep the risks relatively lower. The most notable reason for this is that the majority of cybercrimes usually result from employee errors, which often make an organization's system and networks vulnerable to attackers. Further, the aforesaid strategies include the creation of an overall system security plan (SSP) which includes a summary of security practices that keep the company's data safe. Broadly speaking, I believe that the aforementioned strategies, among many others categorized under the general prevention strategies, are much effective in responding to cybercrimes today. The primary reason for this revolves around the massive developments made in technology in the modern-day world. With these advancements, the majority of organizations today are deploying remote networks and systems to support their staff working from home (Payne, 2012).
The above rearrangement of operations has created more vulnerabilities that many cybercriminals are taking advantage of to steal data and cause disruption (Payne, 2012). Moreover, the susceptibilities in remote systems and networks have led to an increment in cybercriminals, thereby making legislative and police strategies somehow ineffective. Thus organizations should use the aforementioned general preventive strategies to prevent and respond to cybercrimes. However, despite the effectiveness of general prevention strategies, they can still be tightened further. To achieve this, for instance, I would secure all the devices and networks that might be vulnerable to cyberattacks – this includes updating security layers in an effort to keep the organization’s data secure. Additionally, I would create an additional hurdle for cybercriminal attackers through the utilization-multi factor authentication, remote access options, or even virtual private networks. Further, I would also have a dedicated IT department in place in an effort to get all employees knowledgeable on how to enhance work-specific-related tasks (Williams, 2017).