logo

Cyber Security Regulatory Bodies Approach

   

Added on  2023-06-13

18 Pages6002 Words314 Views
JUS5650
Title
Cyber Security Regulatory bodies approach
1
Cyber Security Regulatory Bodies Approach_1
Contents
Abstract..........................................................................................................................................3
Introduction....................................................................................................................................3
Methodology...................................................................................................................................4
Cyber security information...........................................................................................................5
Regulatory Bodies..........................................................................................................................5
The European Union Commission Cybersecurity Regulations.............................................6
1. Build a strong EU Resilience to any kind of cyber attack...........................................6
2. To strengthen EU agency for securing information and Network.............................6
3. Create a resilient EU cyber expertise base...................................................................7
4. Encouraging cyber hygiene and awareness..................................................................8
5. Strengthening international relationship on the war against cybercrime.................8
Norway's regulatory regime for cybersecurity.......................................................................9
I. Preventing cyber security...............................................................................................9
II. Detecting and managing cyber attacks....................................................................10
III. Ensure competence in cybersecurity.......................................................................10
IV. Protect critical ICT infrastructure..........................................................................11
v. Outline for fast crisis reaction......................................................................................11
ENISA (European Union Agency for Network Information Security)...............................12
Conclusion....................................................................................................................................13
2
Cyber Security Regulatory Bodies Approach_2
Abstract
With the rise in cases involving cybercrime all over the globe, new measures are put in place day
by day so as to curb these vice. As a result of these cybercrime-related activities, many people
have been 1affected or affected in one way or the other due to losses incurred whenever an attack
has been reported. The affected individuals have either suffered financial or data loss whose
result is psychological traumatizing while wasting a lot of time and resources trying to solve the
case or repossess the lost data. As a result, new regulations and laws are formulated day after day
to ensure that there are minimum cases reported within a region. These regulations and laws are
formulated by a regulatory body set aside to deal with such cases.
In this paper, I shall focus on these regulatory bodies to see where they have been stationed and
the boundaries of jurisdiction as well as their role in curbing the curbing cybercrime on matters
pertaining cloud computing to create safe environment for data storage.
Introduction
Technology has grown gradually from simple to complex and as the days go by every aspect of
human life is undergoing a technological revolution. A new era of technology has been achieved
due to the availability of ubiquitous network capabilities such as the wireless mobile network,
cloud computing, and distributed network. The Internet has made possible as it connects
computer networks all over the world. As a result, bulky information of individuals, companies
and other institutions can be stored in a computer and uploaded into the clouds so that it can be
easy to retrieve them wherever a person will be and whenever need be. It is feasible to transact
over the internet conveniently and do another kind of tasks conveniently. Technology helped to
reduce work burden and ease the way of doing things. In spite of all the benefits that technology
brought, it doesn’t go without saying that that it came with its vices.
As a result of these technological upgrade, people with malicious mind have devised
mechanisms through which they can extort people and companies. 2They are able to dig deeper
into the software and hardware loopholes so that they can exploit those vulnerabilities with an
intention to hold on to something that they can use as their leverage. This brought an uproar
among the network users that their information is not safe and thus the need to create better
1 Hassan et al. Cybercrime in Nigeria p626-631
2 Von Solms and Van Niekerk Computers and Security, 38.
3
Cyber Security Regulatory Bodies Approach_3
structures and measures to safeguard information on the network. Cybersecurity team mandated
to create a better world of technology was created all over the world to regulate usage of internet
and how one should conduct him/herself while accessing information on the network.
Thus, according to 3Choucri et al (2012) Cybersecurity comprises technologies, processes, and
controls that are designed to protect systems, networks, and data from cyber attacks.” It
important to make sure that all levels of network architecture are safeguarded to minimize case
of cybercrime. 4 There is focuses on information security pillars that will help in ensuring that
data are secure. They are confidentiality, integrity, and privacy commonly referred to as CIA.
ISO2700 is the body entitled to ensure that any system meets the standards set to ensure that only
the person intended to access certain information can be able to do so.
Methodology
During the research period, I employed 5different kind of methods so as to gather and analyze
information that was relevant to my line of study. I was able to collect information from that was
previously done by other authors as well as the journals pertaining regulatory bodies that were
available in the library. Class work that we have been using was acted as the basis of what I was
to work on as it gave me the guideline on how to attain the maxima of the research. I also
consulted my lecture, colleagues as well as IT practitioners within the institution so as they can
tell more about regulatory bodies they know of and how they have been involved in fighting
against cybercrime involving data storage and the cloud computing technology.
Cyber security information
It is the duty of every right-minded individual to work hard and comply with the set rules and
standard set by some of the bodies mandated to ensure that information kept on the network is
safe. 6Von Solms and Nieker (2013) highlights some of the attacks which include;
3 Choucri. “What is Cybersecurity?,” 2-4.
4 Albrechtsen, and Hovden. Computers & Security, 432-445
5 Kumar research methodology 45-50
6 Von Solms and Van Niekerk Computers and Security, 38.
4
Cyber Security Regulatory Bodies Approach_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Changing the Job Market and Business Strategy under Cyber Security Guidance
|65
|15173
|37

Ethical Issues in Cybersecurity: A Case Study of ASIC v. RI Advice
|6
|1407
|352

ITC571 Assignment – Emerging Technology and Innovations Assignment
|7
|2654
|46

Cloud Security and Privacy for Land Titles Agency: Threat and Risk Assessment
|13
|3073
|431