Issues in Cybersecurity: Security Challenges and Problems in the Dominican Republic

Open access

Abstract

Many developed countries are placing resources to combat the growing threats in cyberspace, and emerging nations are no different. Since 2016, the Dominican Republic is undergoing massive changes within the current government to prioritize cybersecurity through laws, policies, and doctrine. This initiative is causing politicians, industry, and even government entities such as the national police to start the journey to begin to fully understand what are the issues in cybersecurity as they apply to the nation. It is essential that the security challenges and problems identified are addressed through a process of discovery while mitigating risks. This paper is to present those challenges and offer solutions that can be used to achieve an acceptable level of cyber risk.

Ashford, W. (2017). Europe faces shortage of 350,000 cyber security professionals by 2022, available at: https://www.computerweekly.com/news/450420193/Europe-faces-shortage-of-350000-cyber-security-professionals-by-2022, accessed on: July 19, 2018.

Burns, A., & Eltham, B. (2009). Twitter free Iran: An evaluation of Twitterʼs role in public diplomacy and information operations in Iranʼs 2009 election crisis.

Bosman, J. (2017). The Storms Moved On. The Caribbean Islands Fear the Tourists Might, Too. available at: https://www.nytimes.com/2017/09/23/us/tourism-hurricane-economy-caribbean-islands.html, accessed on: July 19, 2018.

Case, D. U. (2016). Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC).

Clark, F. (2015). Generalities of the cybersecurity regulation in the members States of COMTELCA, available at: https://www.itu.int/en/ITU-D/Regional-Presence/Americas/Documents/EVENTS/2015/0910-PA-IXP/6%20Viernes%20SIT%20Clark%20Generalidades%20Regulaci%C3%B3n%20Ciberseguridad.pdf

Dawson, M. (2017). Hyper-connectivity: Intricacies of national and international cyber securities. (Doctoral dissertation). London, UK: London Metropolitan University.

Dawson, M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, 35(2), 60-67.

Dawson, M., Wang, P., & Williams, K. (2018). The Role of CAE-CDE in Cybersecurity Education for Workforce Development. Information Technology-New Generations, 15th International Conference on Information Technology, 127-132.

Isa, M. (2017). Crime without borders, another scourge of economic security and peace in the DR, available at: http://hoy.com.do/ciberdelincuencia-delito-sin-fronteras-otro-azote-a-la-seguridad-economica-y-sosiego-en-rd/

ITU. (2009a). ICT Applications and Cybersecurity Background Note to the 2009 Pacific ICT Ministerial Forum, available at: http://www.itu.int/ITU-D/asp/CMS/Events/2009/PacMinForum/doc/Background%20Note-Theme-4-ICT%20Apps%20&%20Cybersecurity.pdf

ITU. (2009b). Cybercrime: A guide for developing countries, available at: https://www.itu.int/dms_pub/itu-d/oth/01/0B/D010B0000073301PDFS.pdf

National Congress of the Dominican Republic. (2007). Law number 53 of 2007, on “High Technology Crimes and Offenses”. Santo Domingo.

Pultarova, T. (2016). News Briefing: Cyber security-Ukraine grid hack is wake-up call for network operators. Engineering & Technology, 11(1), 12-13.

Republica Digital. (2018). Ciberseguridad, available at: from https://republicadigital.gob.do/eje/ciberseguridad/, accessed on: July 21, 2018.

Wootson, C. R., Jr. (2018). Itʼs time to stop laughing at Nigerian scammers – because theyʼre stealing billions of dollars, available at: from https://www.washingtonpost.com/news/business/wp/2018/06/12/its-time-to-stop-laughing-at-nigerian-scammers-because-theyre-stealing-billions-of-dollars/?noredirect=on&utm_term=.e64a26210213, accessed on: June 27, 2018.

Yunes, L. (2017, June 12). Personal interview.

Land Forces Academy Review

Review of the NICOLAE BALCESCU Land Forces Academy, Sibiu, Romania

Journal Information

Metrics

All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 424 424 66
PDF Downloads 180 180 16