Indirect costs and defense costs in the field of cybercrime are very high and significantly higher than classic crime. For example, in order to combat spam alone, produce spam software and provide education, billions of dollars are spent every year. the fact is that we, as a society, are very ineffective in the fight against cybercrime. Criminals, on the other hand, impose disproportionately high costs on the society. This mainly happens due to the global nature of cybercrime and strong external influences.
Therefore, experts who prepared offer the following response: “As For the more direct question of what should be done, our figures suggest that we should spend less in anticipation of cybercrime (on antivirus, firewalls, etc.) and more in response – that is, on the prosaic business of hunting down cyber-criminals and throwing them in jail”.
- Traditional forms of crime such as fraud or forgery, though in a cybercrime context This relates specifically to crimes committed over electronic communication networks and information systems;
- the publication of illegal content over electronic media (i.e. child sexual abuse material or incitement to racial hatred);
- Crimes unique to electronic networks, i.e. attacks against information systems, denial of service and hacking.
- costs in anticipation of cybercrime, which include individual and organizational security measures (such as installing physical and virtual protection such as antiviral software), insurance costs and costs associated with gaining compliance to required IT standards (For example the Payment Card Industry Data security Standard (PCI DSS));
- costs as a consequence of cybercrime, which take into account direct losses to individuals and companies (including business continuity and disaster recovery response costs), and indirect losses arising from reduced commercial exploitation of IP and opportunity costs through weakened competitiveness;
- costs in response to cybercrime, such as compensation payments to victims of identity theft, regulatory fines from Industry bodies and indirect costs associated with legal or forensic issues;
- Indirect costs associated with cybercrime, which include such factors as reputational damage to organizations, loss of confidence in cyber transactions by individuals and businesses, reduced public sector revenues and the expansion of the underground economy.
- Cost of information loss or theft: loss or theft of sensitive and confidential information as a result of a cyberattack. Such information includes trade secrets, intellectual properties (including source code), customer information and employee records. This Cost category also includes the Cost of Data breach notification in the event that personal information is wrongfully acquired.
- Cost of business disruption: the economic impact of downtime or unplanned outages that prevent the organization from meeting its Data processing requirements.
- Cost of equipment damage: the Cost to remediate equipment and other IT assets as a result of cyberattacks to information resources and critical infrastructure.
- Lost revenue: the loss of customers (churn) and other stakeholders because of system delays or shutdowns as a result of a cyberattack. to extrapolate This Cost, we use a shadow costing method that relies on the “lifetime value” of an average customer as defined For each participating organization.
in terms of cybersecurity, the future is the most important time dimension. with respect to ensuring safety and eliminating threats, the activities undertaken in the present and the past are already too late; hence, IT is necessary to focus on the analysis of potential risks and opportunities that will occur in the future. This book demonstrates that the existence of cybercrime is an indisputable fact. At the moment, cybercrime development and its threat to cyberspace users are increasing exponentially.
IT is also known that cybercrime is expanding its range of operation and attracting ever more organized, sophisticated and covert perpetrators within its environment. Due to their political, economic or ideological motivations, these people represent the greatest threat to society because the societal consequences of their actions are much more detrimental than the consequences of traditional, financially motivated cybercrime.
in This context, IT is clear that the perpetrators of criminal acts are not inactive, but are extremely up-to-date, flexible, adaptable and organized. IT is precisely these attributes that law enforcement agencies, legislative acts, organizations and countries should possess when encountering threats in cyberspace. However, the current situation shows that the opposite holds true.
the future is here, and IT requires that the participation of different actors, professionals and especially all interest groups be included in the plans For the development of cybersecurity strategies today.
DECODE is the largest cybersecurity conference in the Philippines hosted by Trend Micro, a global leader in cybersecurity. Register now For free and be a part of DECODE 2022: Detect & Respond At www.decodeph.com