• Uncategorized

Information Security Threat in Europe

InformationSecurity Threat in Europe

Informationsecurity threat in Europe

Theworld is increasingly adopting and exploiting InformationTechnology-IT in the 21stcentury. Specifically, in Europe, IT is considered as one of themajor pillars for economic growth, with over 60 percent of citizensfrequently making use of the internet. Furthermore, the Europeanmobile market was the biggest in the world market based on 2009statistics. However, cybercrime has rapidly evolved in the globe andEurope, in particular. Hence, that calls for a pressing need by thegovernment and the stakeholders to secure safety initiatives on theinternet for more healthy development (Collins,2016).Therefore, the paper endeavors to explain the basic concepts ofcyber-attack in Europe, its digital plans, how the attack is carriedout, and the weaknesses exploited by malware.


Accordingto Van de Walle, &amp Turoff (2011), the word botnet is derived froma combination of the terms robot and network it refers to a programfor software that when installing on an individual’s computer, itcan do certain commands even without the operator’s notice. Hence,it is viewed as a network of some malicious software that is underthe regulation of robot commander. When creating a botnet, a malwarethat interferes with the proper functioning of operating system,applications or web servers are induced so as to infect the computer.Additionally, Evron(2010) concurred that abotnet could be defined as the amalgamation of programs that worktogether in the internet to execute a particular command or attack.The attacks can be as simple as controlling spam mail, controllinginternet relay chat, or denying individual basic computer-relatedservices without notice. Once an individual’s machine has beeninfected by the software attacker, it joins a network of othersimilar computers and could be used to orchestrate an attack (Eyron,2010).

MainPoints of Digital Agenda for Europe

Europewould first want to begin a big merger on digital knowledge andemployments. The region plans to grow its IT sector rapidly bydeveloping skilled individuals in the same area, thereby creatingbetter job opportunities (O’Connell,2012).Hence, the government has scheduled to connect both primary and highschools with well reliable internet so as to train the young on thesafe use, as well as dangers that could be caused by the web(Susanto,Almunawar &amp Tuan, 2011).Secondly, the region intends to create a European Digital Singlemarket that would enable stakeholders in business field to do theirtransactions online efficiently as opposed to traditional methodsthat had a lot of time wastages. Hence, the market would need morere-evaluations on the regional policies so as to eradicate thecurrent barriers to successful implementation of the online trade ingoods and services (Casey, 2011).

Moreover,the government intends to create efficient and reliable broadbandregulatory environment that would aid in all the European citizens toaccess the free internet with a speed of up to about 30 Mbps by 2020(Farwell &amp Rohozinski, 2011). That would help the residents tofreely learn, interact, and even evaluate some of the governmentpolicies so as to spur sustainable development. Finally, the regionproposes cybersecurity plan and directive. In tandem with that,Hansen &amp Nissenbaum (2011) argued that the government would needto create wider network security response team so as to enable it tointervene in the matters of cybercrime timely. On the same,internationally coordinated targeted steps should be implemented aswell as common reactions to fight the increasing menace ofcybercrime.

HowCyber-Attack is Executed

Firstof all, a cyber-attack can be carried out through denial of service,whereby an individual with ill intention denies the legitimateaccount owner access to certain services or information(Clarke&amp Knake, 2011). The invader disguises the evil motives byoverloading the system to force the authorized account user to feedin more details to proceed to the next level. As the account ownerdoes that, the very information is automatically conveyed to the teamof hackers who take advantage and use such data for personal gains(Wilson, 2012).

Cyber-attackcan also be done on the vulnerability part of a system. Tamperingwith essential components of a computer or software has increasinglybecome familiar in the cyber- attack (Korns&amp Kastenberg, 2013).In most cases, knobs or backdoors are implanted inside a machine ornetwork system to foster vulnerability that could be capitalized onmuch later (Yar, 2013). According to Connell (2012), that could evenbe done by the manufacturers of the gadgets who know where the safeis located, and would even leak such information to the hackers. Forexample, the vulnerability would need prior information on whataspects could be cracked or exploited in the safe so as to get theprecisely targeted pieces of information.

Someof the Weaknesses Exploited by Malware

Malwares,for example, Stuxnet, is a short form in the cybercrime sector thatinvolves all the forms of wrong software. In its category includespyware, worms, Trojan horses, and viruses, together with any otherkind of software that would self-upload without the knowledge orconsent of the owner (Vatis, 2013). Hence, the malware takesadvantage of weaknesses to penetrate a system, or cause more damageto the compromised gadgets. In most cases, malware authors commandthe system to automatically create a weakness, or sometimes do itmanually when they access the data (Marion, 2010). However, expertscategorize deficiencies in two groups based on the position of theattack. A technical fault is tricking the computer owner then aninfected USB is fixed into the machine, then it transfers the contentinto the device, thereby tampering with individual data stored in it.Additionally, once the USB is injected, it moves the worms that wouldrapidly transfer the malware (Weber, 2010).


Cybercrimehas steadily evolved and occurs in various forms it is a greatsetback to the economy as well as the security of the nation andinternet users. Therefore, the European Union, together with the restof the world, should join hands to solve the vice.


Casey,E. (2011).&nbspDigitalevidence and computer crime: Forensic science, computers, and theinteJensen, M., Schwenk, J., Gruschka, N., &amp Iacono, L. L. (2009,September). On technical security issues in cloud computing. In&nbsp2009IEEE International Conference on Cloud Computing&nbsp(pp.109-116). Ieee.rnet.Massachusetts, USA: Academic press.

Clarke,R. A., &amp Knake, R. K. (2011).&nbspCyberwar.New York, U.S.: HarperCollins.

Collins,A. (2016).&nbspContemporarysecurity studies.USA: Oxford university press.

Evron,G. (2010). Battling botnets and online mobs: Estonia`s defenseefforts during the internet war.&nbspGeo.J. Int`l Aff.,&nbsp9(5),121.

Farwell,J. P., &amp Rohozinski, R. (2011). Stuxnet and the future of cyberwar.&nbspSurvival,&nbsp53(1),23-40.

Hansen,L., &amp Nissenbaum, H. (2011). Digital disaster, cyber security,and the Copenhagen School.&nbspInternationalStudies Quarterly,&nbsp53(4),1155-1175.

Korns,S. W., &amp Kastenberg, J. E. (2013). Georgia`s cyber lefthook.&nbspParameters,&nbsp38(4),60.

Marion,N. E. (2010). The council of Europe`s cyber crime treaty: An exercisein symbolic legislation.&nbspInternationalJournal of Cyber Criminology,&nbsp4(1/2),699.

O’Connell,M. E. (2012). Cyber security without cyber war.&nbspJournalof Conflict and Security Law,&nbsp17(2),187-209.

Susanto12,H., Almunawar, M. N., &amp Tuan, Y. C. (2011). Information securitymanagement system standards: A comparative study of the bigfive.&nbspInternationalJournal of Electrical Computer Sciences IJECSIJENS,&nbsp11(5),23-29.

Vande Walle, B., &amp Turoff, M. (2011). Decision support for emergencysituations.&nbspInformationSystems and E-Business Management,&nbsp6(3),295-316.

Vatis,M. A. (2012). The Council of Europe Convention on Cybercrime.In&nbspProceedingsof the Workshop on Deterring Cyberattacks: Informing Strategies andDeveloping Options,8(3),157.

Weber,R. H. (2010). Internet of Things–New security and privacychallenges.&nbspComputerLaw &amp Security Review,&nbsp26(1),23-30.

Wilson,C. (2012). Botnets, cybercrime, and cyberterrorism: Vulnerabilitiesand policy issues for congress. LIBRARY OF CONGRESS WASHINGTON DCCONGRESSIONAL RESEARCH SERVICE.

Yar,M. (2013).&nbspCybercrimeand society.Washington D.C, U.S.: Sage.