Professional Documents
Culture Documents
826 Ruchika
826 Ruchika
826 Ruchika
*Associate Professor, Amity Business School, Amity University, Greater Noida (UP)
**Senior Professor, Civil Engg. Department, Sai Nath University, Ranchi, Jharkhand
24
According to Verizon Data Breach Report (2012), G6 Nations by the year 2050. This subsequently
cyber crimes represent 83% of data breaches recommends the vitality of these developing
worldwide and nearly 58% of the data stolen economies in shaping the global economy in the
globally was the result of hacktivist activity. near future.
McAfee Report (2009) states that a few nations are
rising as clear wellsprings of dangers to delicate Looking at the future prospects of these emerging
information, specifically to licensed innovation. It economies, it becomes imperative to assess their
creates the impression that geopolitical cyber threat landscape so as to suggest ways to
observations are influencing information strategy combat these threats before it completely wreaks
reality, as China, Pakistan and Russia were havoc on these economies.
identified as inconvenience zones for different
legal, social and financial reasons. III. Objectives of the Study
• To assess the current scenario of cyber threat in
BRICS
• To identify the factors that makes BRICS nations
lucrative targets for cyber crime
• To assess the impact of cyber attacks on these
economies
• To suggest remedial measures to overcome this
problem.
25
BRAZIL: - Brazil is alleged for being a primary
wellspring of botnets – i.e., networks of
programming robots run independently either to
deny services or circulate malicious code. As
surveyed by Price Water House Coopers (2012),
Brazil's heightening digital capacity has
encouraged a cybercrime blast that cost Brazilian
organizations, primarily financial institutions, more
than $1 billion in 2011. The nation's cybercrime
environment is fueled by a larger segment of
population earning higher wages and conducting
their business and personal transactions online.
26
CHINA:- In 2011, around 8.531 million computers for cyber security, there are no standard methods to
in China were assaulted by rogue programs on a analyze the effectiveness of such spending.
daily basis, which represented 5.7% of every day
networked workstations, arriving at a development To address the complexity of cyber attacks impact,
rate of 48% in contrast to the year 2010. As per a which is one of the objectives of this study, we
survey report distributed by China's Software Test propose a causal model- Impact Assessment
Center, a sample of bank sites got just 31.98 Matrix. This model provides a simple framework to
focuses (the full check is 100 focuses) in an assess the impact of cyber attacks taking into
assessment review, which was the lowest score. consideration various financial and non-financial
Likewise, another similar survey demonstrated that components that need to be counted in estimating
60% of 2500 persons had their individual data losses from cyber attacks.
stolen; more than 66% of them concurred that we
ought to increase deliberations to battle the illicit For this purpose, we tried to evaluate the impact of
conduct. cyber attacks from various dimensions and the
possible costs that are associated with each
SOUTH AFRICA:- As indicated by the report as dimension so as to cover all the possible costs if
of Norton Cyberzone for 2012, South Africa stood not all. The aggregate would help us measure the
third in terms of increasing cyber incidents after total cost of cyber attacks.
Russia and China. Comprehensively, the report
uncovers that there are around 556 million Impact Assessment Matrix
casualties of cyber crime every year, which is equal
to around 1.5 million cybercrime exploited people
every day. The worldwide value relating to
consumer cybercrime victims far and wide is
around $110 billion.
27
threat was almost non-existent a few decades ago. Applied Sciences Research (IJIEASR), Oct,
Besides developing new and relevant laws, Volume 3, No. 10.
implementation of such laws has to take place. This 3. Ernst. H (2001), “Patent applications and
may not be easy and the law enforcement agencies subsequent changes of performance: Evidence
must have training and required resources to from time-series cross-section analyses on the
implement these laws and address cybercrime in firm level”, Research Policy 30, pp. 143-157.
order to keep current on this newest method of 4. Goldman Sachs (2013), “Dreaming with
crime fighting. BRICs: The path to 2050”, Global Economics
Paper No. 99, New York.
• Reporting: As already mentioned, many times 5. Crime in India 2013 statistics, “Report on
cases of cyber crime are never reported. This could Cyber Crime chapter 18”- NCRB report
be due to lack of awareness about the laws related www.ncrb.gov
to cyber crime and the lack of an implementation 6. India Risk survey 2012 Report by FICCI and
authority. Clearly, this is related to developing and Pinkerton - www.ficci.com
implementing relevant laws and making people 7. Norton Cybercrime report-2012 -
aware of these. Any case of cyber attack should be www.norton.com/2012cybercrimereport.pdf
compulsorily reported to the cyber cells so that the 8. Cybercrime Survey Report 2014by KPMG
investigators would have a real picture of the extent 9. “The South African Cyber Threat Barometer-
and frequency of such crimes. This would 2012/13” by Wolfpack Information Risk (Pty)
ultimately pave their way for better understanding. Ltd
10. 15th Annual Computer Crime & Security
• End user perspective: Cyber attacks are directly Survey 2010/11 by Computer Security
affecting the end users of information technology. Institute
Hence, end user perspective is of vital importance 11. Verizon 2010 Data Breach Investigations
in such incidents. Therefore, any provision made in Report
the law should be carried out keeping in mind their http://www.verizonbusiness.com/resources/rep
perspective. A mechanism needs to be developed to orts/rp_2010-data-breach-report_en_xg.pdf
determine end user perspective. 12. Symantec Global Internet Security Threat
Reporthttp://eval.symantec.com/mktginfo/ente
References rprise/white_papers/b-
1. Chun-Yao Tseng (2009), “Technological whitepaper_internet_security_threat_report_xv
Innovation in the BRIC Economies”, _04-2010.en-us.pdf
Research- Technology Management, March- 13. Messagelabs Intelligence October 2010
April, pp. 29-34. 14. http://www.messagelabs.com/intelligence.aspx
2. Mukhtar Ahmad Sofi (2014), “Cost of Cyber 15. Ponemon Institute 2009 Annual Study: Cost of
Crimes and Information Insecurity in India”, a Data Breach
International Journal of IT, Engineering and 16. http://www.ponemon.org/local/upload/fckjail/g
eneralcontent/18/file/US_Ponemon_
CODB_09_012209_sec.pdf
28