Cyber Security Principles: Cyber Law, Warfare & Drop Shipping

Verified

Added on  2023/06/07

|5
|1042
|268
Essay
AI Summary
This essay provides a conceptual overview of cyber space and cyber security, critically evaluating cyber security issues within a specific problem environment, using the author's drop shipping start-up as an example. It discusses the importance of cyber carefulness, database protection, consumer data privacy, and the necessity of a secure payment system. The essay highlights the cyber threats associated with handling customer data, emphasizing the need for adequate defenders and firewalls to prevent data breaches and regulatory abuses. It also touches upon the concept of cyber warfare, where state actors attempt to disrupt strategic and financial operations, and suggests that organizations should conduct thorough privacy and data security due diligence. The analysis concludes that companies lacking qualified cyber security teams or acquiring entities with inadequate data security practices risk legal responsibilities.
Document Page
Running Head: PRINCIPLES OF CYBER SECURITY 0
Principles of Cyber Security
The Cyber Law of War
(Student Details:)
8/26/2018
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Principles of Cyber Security 1
Principles of Cyber Security Warfare
This essay is providing a brief conceptualisation of the principal ideas about
Cyber Space and Cyber Security and then we will critically evaluate cyber security
issues related to some specific problem environment.
Cyberspace is a field formed not automatically but intentionally by human
beings, has developed to offer remarkable profits, but also creating new risks to
information or data. Therefore, presently cyber-security has become a countrywide
as well as worldwide policy issue. Cybersecurity by definition is a kind of computer or
Information technology security for the protection of computer and laptop systems
from stealing of or harm to their hardware, application software, or electronic data.
Organizations focus on this type of security to prevent interruption or misdirection of
the services they provide (Sotto & Logan, 2016).
(Source: IWEC, 2017)
Now, by taking my own small online start-up trade (Drop Shipping) as an
example to explain the concept of cyber security, we will further critically analyse
situation of cyber space and security. The basic idea behind a drop shipping start-up
business is that, being a small start-up owner, I have to handle a huge record of
products of my company and have to handle all deliveries to my customers. In order
to run Drop Shipping start-up business I have listed products available for sale on my
portal website, when one of the customers will buy a product from my portal, I will
purchase the product from a third-party firm usually a manufacturer or wholesaler for
a lesser cost. The drop shipper then delivers the product to my customer.
Document Page
Principles of Cyber Security 2
(Source: Sketch Bubble, 2017)
During this process of forwarding the purchasing order from the customer to
wholesaler, some legal formalities needed to be done through my cyber security
team. They are as follows:
Cyber carefulness to confirm database protection, cyber-security, and
consumer data privacy on portal
Ownership of a current bank account to use in the market-place under
the registered commercial name and a payment pathways to assist
client’s payments through an online portal that supports all debit cards,
E-wallets internet banking, and credit cards (Chinabrands, 2018).
Moreover, last but not the least most desired exercise expected from cyber
security team of my firm is to take care of database of customers. On account
for, during making any purchase, payment of the online orders, tracking order
numbers , feedback on bad quality of the products , and while getting support
from us customers share their information online , protection of their data is
the biggest cyber threat in drop shipping.
Therefore, information security and data Privacy, if once overlooked in
corporate transactions, it will definitely result in a blunder of stolen information
through company’s server. Companies those collect utilize and have to store private
data of their employees, customers, or others must own the appropriate defenders
and firewalls in their system (Wiley Rein, 2015).
Inadequate database privacy and data security practice results in regulatory
abuses, real-time database breaches, and cause of other security issues (Lin &
Document Page
Principles of Cyber Security 3
Zegart, 2017). Even those companies who depend less on private data for their
regular operations require ensuring that their firm’s private and exclusive information
is appropriately safeguarded.
The term Cyberwarfare, is used to indicate computer and network-built
conflicts also including politically driven attacks by a country or state on another
country or state. In these kinds of cyber-attacks, country or state actors try to
interrupt the activities of officialdoms or sovereign state, especially for strategic as
well as military operations, stock market firms, and financial operations or
transactions (Clarke & Knake, 2010).
To avoid these kinds of issues, every organization that aims to merge with or
purchase another unit, or want to maintain secure system should formulate an all-
inclusive privacy and data security due diligence agenda to present in front of other
firm (Hunton and Williams, 2017).
Therefore, above discussion and critical analysis of information system
concludes that Organizations those who does the blunder of not having suitably
qualified cyber security team or purchasing bodies whose databases have
inadequate data-security definitely run the risk of receiving legal responsibilities for
which they cannot bargain in future (Sotto & Logan, 2016).
(Source: Think Business, 2018)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Principles of Cyber Security 4
References
Chinabrands. (2018, 07 13). The Ins And Outs Of Drop Shipping in India
(Dropshippers Provided). Retrieved from Chinabrands:
https://www.chinabrands.com/dropshipping/article-the-ins-and-outs-of-drop-
shipping-in-india-dropshippers-provided-12905.html
Clarke, R., & Knake, R. (2010). Cyber War. New York: Harpor Collins Publisher.
Hunton and Williams. (2017). Privacy and Data Security. Retrieved from Hunton and
Williams: https://www.huntonak.com/images/content/2/7/v5/27834/Privacy-
and-Security-in-M-A-Transactions.pdf
Lin, H., & Zegart, A. (2017). Introduction to the special issue on strategic dimensions
of offensive cyber operations. Journal of Cybersecurity, 3(1), 1-5.
Sotto, L., & Logan, R. (2016, 02 22). How to Safeguard Privacy and Data Security in
Corporate. Retrieved from Hunton and Williams:
https://www.huntonak.com/images/content/1/7/v3/1725/How-to-Safeguard-
Privacy-and-Data-Security-in-Corporate-Transact.pdf
Wiley Rein. (2015, 07). A Privacy and Data Security Checklist for All. Retrieved from
Wiley Rein: https://www.wileyrein.com/newsroom-newsletters-item-5383.html
Winterfeld, S., & Andress, J. (2012). The basics of cyber warfare: Understanding the
fundamentals of cyber warfare in theory and practice. Oxford: Newnes.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]