logo

Cyber Security Law, Regulation and Policy

   

Added on  2021-01-02

14 Pages5098 Words429 Views
Cyber Security Law,Regulation and Policy

TABLE OF CONTENTSINTRODUCTION...........................................................................................................................1MAIN BODY...................................................................................................................................1A. The evolutionary view of the trend (past, present and future)...........................................1B. Implication of the trend to the world that we live in.........................................................4C. Application of legal and legislative considerations in relation to the trend.......................5D. Prediction: what is yet to happen and what to look out for in future................................7CONCLUSION..............................................................................................................................10REFERENCES..............................................................................................................................11

INTRODUCTIONCyber Security is defines as the technology, processes and controls which ismanufactured and designed for the purpose of providing protection to the systems, network anddata from unethical cyber attack. It is necessary because it protects computer system from losingimportant data which are required to maintain on regular basis. In context of this file, it is basedon Telstra Corporation Limited which is one of the largest telecommunication organisations thatoperates in the sector of network and markets voice, mobile, internet access and many more. Inthis file there will be detail information regarding in the cyber security of the company and inaddition their will evolutionary view of the trend which are related to past, present and future.Even there will be implication of the trend to the world in which we live. And in the endingsegment their will be discussion on the topic that what is yet to happen and what to look out forthe future period. The chosen topic in this report is Security threats and trends. MAIN BODYA. The evolutionary view of the trend (past, present and future)The security of any system and software have been changing rapidly in current scenarioand even it is important too because it helps to protect the data from unethical hacking which isincreasing day by day. It is necessary that how people understand about the security threats andtrends because if an organisation have the proper knowledge regarding it then many of thepositive steps can be taken easily through which better results can be achieved. While talkingabout past scenario, there were lots of issues which are related with the cyber crime but inpresent condition there are no such big steps have been taken through which reduction can bedone in the result (O’Connell, 2012). In past, it was seen that most of the organisation were notconnected with the social media or any of the technology which are required on daily which wasone of the main reason that rate of cyber crime was very low. Most of the company wants toprepare their data and report on the basis of manual work which was even helpful for them and itwas found that people were unable to hack any of the things in that situation. In past, the resultshows that there are very few number of organisation which have fallen under the category ofsecurity threads and trends.In present scenario, it is found that most of the association are facing the problem ofsecurity of their data and the reason behind all those problem is only one i.e., increase in use of1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Threats - Essay
|20
|5781
|129

Cyber Law 2 INTRODUCTION
|16
|5193
|369

Cyber Security Laws and Regulations
|22
|6363
|15

Cyber Security: Can Really Be Safe
|6
|1384
|356

Cyber Crime and Security in Australia
|9
|2546
|105

Telstra Security Report 2018: Evaluating the Trend of IoT Devices and Legal Considerations
|13
|5530
|281