The growing number of threats in the ICT sector over the past twenty years has created enthusiasm to release this research into the 'Impact of the Cybercrime Act on business'. Hopefully this research will help shed light on the major concerns of the business community.
Introduction
Definition
34; computer crime." The Encyclopaedia Britannica defines computer crime as any crime committed by means of special knowledge or expert use of computer technology. The scope of the definition becomes even wider with the often accompanying or substitute term "computer-related crime.".
Types of Cyber crime
Oxford Reference Online(http://www.oxfordreference.com/views) defines cybercrime as crime committed over the Internet. In addition to the above types of cybercrime, a list of the most common cybercrimes and frauds that take place every day in the world is also available at http://www.net-.
Who are the Cyber Criminals?
- Phishing
- Teenage kicks
- Moving target (Virus threat to mobile phones)
One of the biggest outbreaks occurred in January when the My Doom virus began circulating. He pointed out that the number of known viruses broke the 100,000 barrier and the number of new viruses grew by more than 50%.
The Cyber Crimes impact on business
- The IC3 Statistics
- Prevalence of cyber espionage and sabotage
The obligation to provide adequate cyber security of protected. information is a specific duty incumbent on the custodian, regardless of whether the protected information could have been acquired from other sources, such as the public records, and regardless of the fact that the unauthorized release occurred, believed to be a cybercrime attack. This obligation exists regardless of whether the protected information could have been acquired from other sources, such as the public records, and regardless of the fact that the unauthorized release occurred, the acts of a cybercrime attack.
Existing Solutions
- Technical Solutions
- Legal Solution
Some of the topics and some of the examples may be directly relevant to your organization and others may not. The cybercrime attack targeted your organization's computer system, and the harmed victim's protected information was stolen from your organization's computer systems and fraudulently used by cybercriminals, causing financial loss to the harmed victim. Your organization and all of your organization's officers and directors are potentially directly liable for all losses to the injured victims because it was your negligence in not ensuring or not properly managing the cyber security of the protected information and . allow the unauthorized release of the injured parties' protected information, which ultimately resulted in financial loss to the injured victims.
The cybercrime attack targeted one of the Customer's or your organization's customer organization's computer systems (organization C) and their employees, customers, clients, patients, contacts, vendors, suppliers, or other parties (potential victims) had information stolen protected by C - the organization's computer systems. Your organization and all officers and directors of your organization are potentially directly liable for all financial losses of injured victims because you were negligent in not warning organization C of the potential dangers of a cybercrime attack and that C - the organization had an obligation to comply with the Cybercrime Act and to warn employees, customers, clients, patients and others about the risk of possible loss from a cybercrime attack and related identity theft (responsibility for failure to warn). Based on those previous discussions, your organization and all of your organization's officers and directors are contributory negligent parties that allow the unauthorized release of the injured victim's protected information and the resulting damages to the injured victim.
As a contributing party, your organization and your firm's officers and directors are potentially liable parties. http://www.acapsecurity.com/html/CYBERSECURITY REPORT.htm).
Cybercrime Situation in Mauritius
- Current situation
- The Regulation in Mauritius
- The Law enforcement
Deploy host-based intrusion detection devices on your web servers and monitor activities looking for any irregularities. The following table is a summary of the Mauritius Computer Misuse and Cybercrime Bill 2003 (part II). The event of a degradation, failure or denial of access to the computer system causes fraud or loss.
The Computer Crime Act also stipulates that provisions will be made to amend the Child Protection Act and the Supplementary Criminal Code Act. The table above gives an idea of the different penalties that cyber criminals face if they commit an offense. First, there is the identification of the criminal. Internet research is labor-intensive and resource-intensive.
The literature reviewed so far does not reveal much about the impact of the ACT and the number of crimes currently recorded in Mauritius.
The Research Question (Problem Statement)
Conclusion
The Internet's anonymity also makes it an ideal channel and instrument for committing organized crime. Secrecy is a central part of organized crime strategy, and the Internet provides excellent opportunities to maintain it. Some countries outsource these services, but a delay in response can increase the damage caused by the crime.
Research Methodology
Plan of the study
Participants
Measurement
Data Collection
- Questionnaire
- Interview
- Focus group/Discussion
- Data Analysis procedures
- Validity and Reliability
Even if the selected population is a reference sample, a demographic section was inserted to ensure that the participant meets the minimum criterion so that the results are not biased. The environment includes general knowledge of Internet security and the general environment related to this matter. These include the Mauritius Computer Misuse and Cybercrime Act 2003 itself and the knowledge of wrongdoing in relation to its operations and the regulations laid down by the Act.
Interviews were conducted with senior police officers to understand the current status of the cyber crimes and also their logistics in place. The legal advisors also gave their opinion on the trend of cybercrime in the United States. Microsoft Word has been used to capture the primary data and processed by Microsoft Excel.
Interviews with senior police officers were appropriate to meet the theoretical needs of the study.
Limitations of the study Delimitation: -
Summary
Findings
- Demographics
- General Environment
- The Computer Misuse and Cybercrime Awareness
The graph above shows that 68% of the sample participants are graduates, while the rest have at least a diploma or certificate level. The sampling also shows that more than 50% of the participants have more than 5 years of work experience at managerial level. The graph above shows that most participants spend between 2 and 40 hours online per week.
Since most businesses work 5 days a week, this means that the average user spends 2-3 hours a day online. It is quite surprising to note that about 50% of the participants believe that their internal security is not adequate, while more than 50% think that the main environmental factors have a direct effect on the security of their organization. More than 60% of participants agree that using the Internet is benefiting them and that they are aware of threats.
While most participants are following a proper backup procedure, the chart above shows that they are not taking enough precautions regarding their update.
Discussion on the Statistical Analysis
- How much at risk is the Mauritian business community?
- Structures for dealing with cyber crimes
- General feeling of cyber community on cyber crime practices and act
At the same time, they are aware of the potential of the other cyber crimes. Respondents had to rate their knowledge of cybercrime on a scale from 1 (low) to 5 (high). From the table above, it can be seen that the respondent's knowledge of the issues can be improved.
A lack of qualified lawyers, resources and knowledge on how to report a cybercrime appears to be the most serious of the respondent's problems. Internet services beneficial Awareness of dangers of cybercrime Sign declarations of compliance Awareness of ICT regulations Disciplinary committee for early violations. The respondents had to express their opinion [on a scale of 1 (low) to 5 high)] about the seriousness of some known violations.
According to the respondents, the most serious known offenses have to do with tampering with or unauthorized copying of data/programs and computer forgery.
Recommendation/Conclusion
Recommendation
- Controlling Cybercrimes
To some extent, how to report a cybercrime depends on the type of crime that was committed. It is also important to report the case to the specialized IT unit at the police station. An intrusion detection system can protect your information systems in case of firewall failure and from insider attacks.
S Ensure that computers running critical infrastructure are not physically connected to any other computer that may be connected to the Internet. S Employees must be trained to understand the security risks – this practically means they must know that they should never give out the company's PIN, password and calling card number without proper verification by a third party. S Report attacks to your local ICT Security and Emergency Response Center so that every cybercrime pattern in the country can be detected and large-scale attacks can be prevented.
S Incident response capabilities must exist so that appropriate action is taken against imminent attacks.
Conclusion
One of the most important and understandable reasons is concern on the part of financial institutions and companies about reputational damage. A useful approach would therefore be for the organization within a particular sector to agree to share cybercrime information among themselves on the assumption that similar. Currently, there is a great concern that viruses are the biggest threat, but there is also a high perception that companies are not sufficiently protected against other threats.
The impact of cybercrime on the Mauritian business community has put a lot of stress on the development of e-commerce and a lack of confidence in maximizing the use of internet services. From the answers to the research questions, the business community believes that doing business on the Internet is still at risk, while some believe that the country does not have all the necessary resources to deal with cybercrimes. In any case, the ACT (see Table 1) has taken care of all kinds of crimes, but unfortunately there is a misconception about this law due to lack of awareness.
The findings of this research suggest that additional research is needed on:-.
List of Acronyms
- The Federal Information Security Management Act (FISMA) The source of FISMA is Public Law 107-347, the E-Government Act
- Survey Questionnaire
- Demographics 1.Organizational Level
- Management Experience (in years) 1. More than 15
- Gender 1. Female
- Basic Infrastructure Existence
- General Environment 1. Internal - Security
- External factors a. Culture
- Purpose of Internet usage Primary access at Home
- Backups / Access Perform Data Backups
- Threats
- No. of Threats hit your Org
- Your opinion on most known offences Manipulation or alteration of data / programs
- About the Computer Misuse & Cybercrime Act How much aware are you about it?
- Summary of Results
9 Common Crimes and Frauds, http://www.net-inrrusion.com/member/data/fraud info.html 9 Computer Crime and Security Research. 9 E-Crime Watch Survey, (http://www.csoonline.com/releases/ecrimewatch04.pdf 9 Forrester Research, http://www.glreach.com/eng/ed/art/2004.ecommerce.php3 9 Ghauri P & Gronhaug K. 9 http://www.acapsecuritv.com/html/CYBER SECURITY REPORT.htm) 9 Identity Theft, United States General Accounting Office (GAO) Report to You.
3 THE COMPUTER MISUSE AND CYBERCRIME ACT 2003 of Mauritius (http://ncb.intnet.mu/mitt/ministry/download/misuse.pdf). 3 Tips to Protect Against Cybercrime. http://www.cybercellmumbai.com/General%20Tips/General%20tips.htm) about viruses and worms,. http://www.bainet.com/main.php?mode=displaysection&i d=6&PHPSESSID=) o Ward, M. Impact of the Computer Abuse and Cybercrime Act on the Business Community in Mauritius.
Purpose of Internet use Primary access at home Primary access at home Primary access in the office Average access by all staff.