Skip to main content

The Enemy Within: The Challenge for Business from Cyber-attack

  • Conference paper
  • First Online:
  • 1690 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 534))

Abstract

This paper presents an overview of certain risks posed by cyber abuse in the business context. It does not in any way represent a definitive study of this very complex area which is in a state of constant flux to the extent that the laws of nations cannot keep pace with the challenges of today let alone tomorrow. This paper therefore gives warning of this phenomenon and focusses on the role of business to its management and staff and others affected by its IT structure. The paper gives some analysis of the threats from cyber-crime and abuse from a variety of government agencies and other bodies. The underlying theme is one of caution and warning of the enemy within organisations and outside who use cyber-attack as a means to an end.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Consumer Survey, Office of Fair Trading.

  2. 2.

    The Internet Crime Complaint Centre. Partners: The Federal Bureau of Investigation, Bureau of Justice Assistance U.S. Department of Justice and the National White Collar Crime Centre.

  3. 3.

    The Internet Crime Complaint Centre. Partners: The Federal Bureau of Investigation, Bureau of Justice Assistance U.S. Department of Justice and the National White Collar Crime Centre.

  4. 4.

    2012 Internet Crime Report IC3 p.15. www.ic3.gov.

  5. 5.

    http://www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/Documents/Cyber%20IPA%20reports/2467_LEA_Training_Strategy_Fin1.pdf.

  6. 6.

    Internet Security Threat Report” – Symantec, October 2009.

  7. 7.

    Home Office June 2014.

  8. 8.

    Home Office June 2014.

  9. 9.

    Home Office June 2014.

  10. 10.

    Home Office June 2014.

  11. 11.

    Cabinet Office https://www.gov.uk/government/organisations/cabinet- office. Accessed: 10/02/15.

  12. 12.

    2014 Information Security Breaches Survey sponsored by the Department for Business Innovation and Skills.

  13. 13.

    Jahankhani, H., Al-Nemrat, A., Hosseinian-far, A. (2014) “Cybercrime classification and characteristics” in Cybercrime and Cyber Terrorism Investigators’ Handbook, Elsevier, ISBN 978-1447126829. And in Jahankhani, H. (2013) “Developing a model to reduce and/ or prevent cybercrime victimization among the user individuals”, in Strategic Intelligence Management, Springer, ISBN 978-0124071919.

  14. 14.

    Cabinet Office https://www.gov.uk/government/publications/ 10 steps to cyber security advice sheet. Accessed: 10/02/15.

  15. 15.

    Cabinet Office https://www.gov.uk/government/publications/ 10 steps to cyber security advice sheet. Paras 3 and 3.1. Accessed: 10/02/15.

  16. 16.

    Cabinet Office https://www.gov.uk/government/publications/ 10 steps to cyber security advice sheet. Accessed: 10/02/15 Summary.

  17. 17.

    Cabinet Office https://www.gov.uk/government/publications/ 10 steps to cyber security advice sheet. Accessed: 10/02/15.

  18. 18.

    Ernst & Young. Ever-increasing fraud risks in the IT and ITeS sector. (2011) p.4.

  19. 19.

    For an example of the concerns raised at the highest levels of international arbitration see; Michael Reynolds PhD (LSE) Ethics in International Arbitration. Legal Ethics December 2014.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Reynolds .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Reynolds, M. (2015). The Enemy Within: The Challenge for Business from Cyber-attack. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23276-8_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23275-1

  • Online ISBN: 978-3-319-23276-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics