Impact of Legal and Political Environment on Cyber Security Functions

Verified

Added on  2022/07/27

|13
|965
|14
Report
AI Summary
This report delves into the multifaceted realm of cyber security, elucidating its core principles, encompassing the protection of data through technologies, practices, and processes. The report explores the critical importance of cyber security in safeguarding organizations from breaches, protecting sensitive information, and ensuring system integrity. It also examines the crucial 'CIA Triad' of confidentiality, integrity, and availability. The report then transitions to the organizational context, outlining the role of cyber security management tools, risk management strategies, and security awareness programs. It also covers cyber security governance, emphasizing decision-making and accountability, followed by an analysis of the legal and political implications of cyber security on businesses. Key areas include legal policies combating cybercrime and the prioritization of cyber security as a national issue. The report also touches upon the evolution of national cyber security strategies, including policy development and the significance of standards in mitigating risks. The conclusion emphasizes the need for skilled cyber security professionals and the application of appropriate regulations and policies to prevent cyber threats. The report incorporates references to relevant academic sources.
Document Page
Cyber Security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WHAT IS CYBER SECURITY
Ensures that the data of any organization is safe from the
hackers
Encompasses the body of the technologies, practices,
structures and processes
Protects the computers, programs, data and network from
any damage or unauthorized access (Craigen, Diakun-
Thibault & Purse, 2014)
Ensures the data confidentially, integrity and availability
Document Page
IMPORTANCE OF CYBER
SECURITY
To protect from the security breaches
Preventing the hackers from accessing to the system or
network (Tarter, 2017)
Protecting the information of organization as well as the
information of customers and employee.
Securing the network and system
Document Page
OBJECTS OF CYBER SECURITY
Fig: CIA Triad (Source: Tchernykh et al.,
2019)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY IN
ORGANIZATION
Contains the set of security management tools with the
inclusive risks management strategies and wide security
awareness program (Kuypers, Maillart & Paté-Cornell,
2016)
Identifies the potential risks and will also pertain the cost
of those risks
Helps in preventing the risks before they occur
Helps in assessing the tactical plan in the organization
Document Page
CYBER SECURITY
GOVERNANCE
Helps in controlling and directing the IT security
Pertains who is the right and authorized person for
making the decision (De Bruin & Von Solms, 2016)
Provides the oversight and specifies the accountability
Ensures that the security strategies are properly aligned
with the objectives of the business
Document Page
LEGAL IMPLICATIONS OF
CYBERSECURITY ON
BUSINESS
Legal policies include the wide range of the legal
measures and consideration
Combating and preventing the cybercrime in the
organizations
Required areas including the jurisdiction, criminalization,
internet service, International Corporation and procedural
powers (Rothrock, Kaplan & Van Der Oord, 2018)
Legal factors and laws of the cyber crimes are the
frequent concern of the criminalization
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
POLITICAL IMPLICATIONS OF
CYBERSECURITY ON
BUSINESS
Prioritizing the cyber security as the national issue
Strengthening the international collaboration
Furnace the public-private partnerships (Cavelty, 2014)
Evolution of Inclusive National Cybersecurity Ingenuity
Developments to the better information sharing
Working to the passage of main cyber security bill
Document Page
CYBERSECURITY POLICIES
Spyware and Virus Protection policy
Intrusion Prevention policy
Device and Application Control (Alotaibi, Furnell & Clarke,
2016)
Firewall Policy
Host Integrity policy
Exceptions policy
Live Update policy
Document Page
CYBERSECURITY STANDARDS
Published materials and attempt for protecting the cyber
environment of the organization
Includes the users, software, networks, data, devices,
processes, applications, services and data storage
Main objectives is to mitigate the risks by mitigating and
preventing the cyber attacks
Regulations and standards are the generic set of the
prescription for the ideal execution of the proper
measures (Collier et al., 2014)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CONCLUSION
Most of the large organizations with the significant
resources and top talent devoted.
More highly skilled employees in the cyber security roles
can help the nation or the organization for responding
more robustly.
This will help the organization to prevent the cyber
security by applying proper regulation and policies.
Document Page
REFERENCES
Alotaibi, M., Furnell, S., & Clarke, N. (2016, December). Information security policies: a
review of challenges and influencing factors. In 2016 11th International Conference for
Internet Technology and Secured Transactions (ICITST) (pp. 352-358). IEEE.
Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities. Science and engineering ethics, 20(3), 701-715.
Collier, Z. A., DiMase, D., Walters, S., Tehranipoor, M. M., Lambert, J. H., & Linkov, I.
(2014). Cybersecurity standards: Managing risk and creating resilience. Computer, 47(9),
70-76.
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology
Innovation Management Review, 4(10).
De Bruin, R., & Von Solms, S. H. (2016, May). Cybersecurity Governance: How can we
measure it?. In 2016 IST-Africa Week Conference (pp. 1-9). IEEE.
Kuypers, M. A., Maillart, T., & Paté-Cornell, E. (2016). An empirical analysis of cyber
security incidents at a large organization. Department of Management Science and
Engineering, Stanford University, School of Information, UC Berkeley, http://fsi. stanford.
edu/sites/default/files/kuypersweis_v7. pdf, accessed July, 30.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]