logo

Cyber Law 2 INTRODUCTION

16 Pages5193 Words369 Views
   

Added on  2020-10-22

About This Document

Cyber law 2 INTRODUCTION 1 Main Body1 A) The evolutionary view of the trend1 B) Implication of the trend to the world that we live 3 C) Application of legal and legislative considerations in relation to the trend 5 D) Prediction for the future7 CONCLUSION 10 REFERENCES 11 INTRODUCTION Cyber law is an entire legal system that incorporates with the internet crimes, cyberspace and relevant legal issues. The project report is based on Telstra Security report 2018 on topic number 5 which

Cyber Law 2 INTRODUCTION

   Added on 2020-10-22

ShareRelated Documents
Cyber law 2
Cyber Law 2 INTRODUCTION_1
Table of ContentsINTRODUCTION...........................................................................................................................1Main Body.......................................................................................................................................1A) The evolutionary view of the trend.........................................................................................1B) Implication of the trend to the world that we live...................................................................3C) Application of legal and legislative considerations in relation to the trend............................5D) Prediction for the future .........................................................................................................7CONCLUSION..............................................................................................................................10REFERENCES..............................................................................................................................11
Cyber Law 2 INTRODUCTION_2
INTRODUCTIONCyber law is an entire legal system that incorporates with the internet crimes, cyberspaceand relevant legal issues.It covers a broad area whichencompassed in few areas like freedom ofexpression, usage of and access to internet as well as entitled with covering onlineconfidentiality. The cyber law is preventing to reduce wide amount of damages imposed bycybercrime such as protecting the information access, intellectual property and communications.The project report is based on Telstra Security report 2018 on topic number 5 which createsbarriers in security challenge and Business impact. The Telstra Security report 2018 underpinseverything from customer experience to employee engagement. The project report is focuses tostay prepared in the face of constantly evolving threats to cyber. The project report will outlinethe evolutionary view of trends based on current, past and future in Security challenges andbusiness impact. The project report will further outline the implication of the trend to the world.The project report will outline the application of laws with considerations in relation to the trend.Lastly the project report will predict what is yet to happen and what to look out for in the future. Main BodySecurity challenges and business impactA) The evolutionary view of the trendSecurity is getting more attention in today's business culture. The Business and IT leadersare concern about security due to difficulty in managing the Information technology environmentand while protecting in against the security threats (Werbach, 2017). There are top twochallenges regarding the Security challenges that are the ability to timely detect and effectivelyresponds the security incidents. There is impact of new technology namely, cloud mobile andsoftware defining the SDN. The new cyber security solutions and the methodologies are adoptedin Australia (Woods, 2018). 32% of the respondents indicates that the training of staff in securitywas a major challenge. The challenges are regarding the ability to detect and respond to securityincidents. The another challenge is emerging the new technologies. There is challenge of internal awareness and formal training. The business are facingchallenge for giving their employees training about the security. There is challenge of cost ofcompliance. The business are facing the challenges of Vendor interoperability. There is shortageof skill labour in order to overcome the Security challenge in Business (Ohlin, 2016). Thebusiness are facing the challenge of communication with their executive team there is lack of1
Cyber Law 2 INTRODUCTION_3
understanding among them. According to the study of Carbon Black highlights there isemergence of creative and non-malware attacks like portray the Chief Information SecurityOfficer (CISO) while attempting to access the corporate IP and the spoofing login systems toappear authenticity and asking employees for their personal details and also utilising theautomation and configuration management frameworks like PowerShell. There is lack ofvisibility with the legacy anti virus solutions. The online collaboration tools are sharing files withthe co-workers and with external shareholders. This is against the privacy policy of thecompanies (Watts, 2016). The greatest risks can be defined that the Information Technologysecurity practitioners are associating with the use of social media at the workplace. The manyincidents and the security breaches are reported in the year 2017 (Tryfonas and Li, 2016). Thesecurity breach is higher in Asia. Pacific and Europe. The most common virus and malwareoutbreaks the employee error in Europe. There is need of Employees awareness in the securityrisks and the there is need of training.The Security challenges are impacting the BusinessLoss of productivity in business – There is loss of productivity due to the Securitychallenge in Singapore, Australia and Europe. The serious impact is on APAC. The lossof the productivity is expensive for the organisation they need to bear costs like wages,rents and utilities. The business are facing the potential loss of the revenue when theoperations have been disrupted. In case when consumer are unable to complete purchasetransactions online due to the major security challenges (Calo, 2015). The Australia hasfaced major lost productivity and has rated fourth in the Telstra Security 2016 survey thatis showing increasing concerns based on the possible impact as the cyberattacks becomemore prevalent in today's world.Corrupted business data – The organizations are becoming more data driven. Theorganization sees the data as the critical asset in order to drive differentiation. Thedetection of corruption usually takes long time. The alteration of data during the securitybreach that can be harder to detect. The companies are working to forward theincreasingly big data analytics and securing the business insights. The corrupted data wasthe majorly influencing the organisation that are serving the APAC and third Europe.Loss of intellectual property – The business are impacting the major loss of intellectualproperty. There is loss of IP that continues to major impact. This might be results in the2
Cyber Law 2 INTRODUCTION_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Law, Regulation and Policy
|14
|5098
|429

Cyber Security Threats - Essay
|20
|5781
|129

Telstra Security Report 2018: Evaluating the Trend of IoT Devices and Legal Considerations
|13
|5530
|281

Cyber Security And Web Attacks Assignment
|22
|6545
|16

Changing the Job Market and Business Strategy under Cyber Security Guidance
|65
|15173
|37

HI6008 Business Research | Challenges in Cyber Security
|13
|2970
|18