Telstra Corporation Cyber Security: Trends, Implications, and Future
VerifiedAdded on  2021/01/02
|14
|5098
|429
Report
AI Summary
This report delves into the realm of cyber security, examining its evolution from past to present and projecting future trends, with a specific focus on Telstra Corporation. The report explores the implications of these trends on the world, emphasizing the increasing reliance on technology and the corresponding rise in cyber threats like phishing and malware. It also analyzes the application of legal and legislative considerations in addressing these challenges. The report highlights the importance of understanding and adapting to the changing cyber landscape, including advancements in technology and the need for robust security measures to protect data and systems. Finally, the report offers predictions about the future of cyber security, including emerging threats and the need for proactive measures to safeguard against them.

Cyber Security Law,
Regulation and Policy
Regulation and Policy
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
A. The evolutionary view of the trend (past, present and future)...........................................1
B. Implication of the trend to the world that we live in.........................................................4
C. Application of legal and legislative considerations in relation to the trend.......................5
D. Prediction: what is yet to happen and what to look out for in future................................7
CONCLUSION..............................................................................................................................10
REFERENCES..............................................................................................................................11
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
A. The evolutionary view of the trend (past, present and future)...........................................1
B. Implication of the trend to the world that we live in.........................................................4
C. Application of legal and legislative considerations in relation to the trend.......................5
D. Prediction: what is yet to happen and what to look out for in future................................7
CONCLUSION..............................................................................................................................10
REFERENCES..............................................................................................................................11

⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

INTRODUCTION
Cyber Security is defines as the technology, processes and controls which is
manufactured and designed for the purpose of providing protection to the systems, network and
data from unethical cyber attack. It is necessary because it protects computer system from losing
important data which are required to maintain on regular basis. In context of this file, it is based
on Telstra Corporation Limited which is one of the largest telecommunication organisations that
operates in the sector of network and markets voice, mobile, internet access and many more. In
this file there will be detail information regarding in the cyber security of the company and in
addition their will evolutionary view of the trend which are related to past, present and future.
Even there will be implication of the trend to the world in which we live. And in the ending
segment their will be discussion on the topic that what is yet to happen and what to look out for
the future period. The chosen topic in this report is Security threats and trends.
MAIN BODY
A. The evolutionary view of the trend (past, present and future)
The security of any system and software have been changing rapidly in current scenario
and even it is important too because it helps to protect the data from unethical hacking which is
increasing day by day. It is necessary that how people understand about the security threats and
trends because if an organisation have the proper knowledge regarding it then many of the
positive steps can be taken easily through which better results can be achieved. While talking
about past scenario, there were lots of issues which are related with the cyber crime but in
present condition there are no such big steps have been taken through which reduction can be
done in the result (O’Connell, 2012). In past, it was seen that most of the organisation were not
connected with the social media or any of the technology which are required on daily which was
one of the main reason that rate of cyber crime was very low. Most of the company wants to
prepare their data and report on the basis of manual work which was even helpful for them and it
was found that people were unable to hack any of the things in that situation. In past, the result
shows that there are very few number of organisation which have fallen under the category of
security threads and trends.
In present scenario, it is found that most of the association are facing the problem of
security of their data and the reason behind all those problem is only one i.e., increase in use of
1
Cyber Security is defines as the technology, processes and controls which is
manufactured and designed for the purpose of providing protection to the systems, network and
data from unethical cyber attack. It is necessary because it protects computer system from losing
important data which are required to maintain on regular basis. In context of this file, it is based
on Telstra Corporation Limited which is one of the largest telecommunication organisations that
operates in the sector of network and markets voice, mobile, internet access and many more. In
this file there will be detail information regarding in the cyber security of the company and in
addition their will evolutionary view of the trend which are related to past, present and future.
Even there will be implication of the trend to the world in which we live. And in the ending
segment their will be discussion on the topic that what is yet to happen and what to look out for
the future period. The chosen topic in this report is Security threats and trends.
MAIN BODY
A. The evolutionary view of the trend (past, present and future)
The security of any system and software have been changing rapidly in current scenario
and even it is important too because it helps to protect the data from unethical hacking which is
increasing day by day. It is necessary that how people understand about the security threats and
trends because if an organisation have the proper knowledge regarding it then many of the
positive steps can be taken easily through which better results can be achieved. While talking
about past scenario, there were lots of issues which are related with the cyber crime but in
present condition there are no such big steps have been taken through which reduction can be
done in the result (O’Connell, 2012). In past, it was seen that most of the organisation were not
connected with the social media or any of the technology which are required on daily which was
one of the main reason that rate of cyber crime was very low. Most of the company wants to
prepare their data and report on the basis of manual work which was even helpful for them and it
was found that people were unable to hack any of the things in that situation. In past, the result
shows that there are very few number of organisation which have fallen under the category of
security threads and trends.
In present scenario, it is found that most of the association are facing the problem of
security of their data and the reason behind all those problem is only one i.e., increase in use of
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

social sites where people and organisation store their data and personal information. Although,
the use of the social sites have been increasing day by day still there are number of problem
which is being faced by the individuals. It can be seen that most of the people use email services
for transferring data which is also one of the most popular form of transferring data from one
place to another but this form is not safe and secured because most of the mails are stored in
spam emails through which hackers copy the data misuse them which is also one of the problem
in current scenario. The data shows that in year 2017 near around half of the total number of
mails have been stored in spam box through which problem have raised in providing proper
security to reach and every person or even organisation (Weber and Studer, 2016). Email is one
of the major source through which problem is being increased day by day in the sector of data
and security. Although lots of laws and safety measure have been introduced by the government
agencies and expertise, still security is not being able to provide to each and every person
because of lack of technology to prevent from unethical hacking software's.
There are lots of malware software which is harmful for computer user because it allows
to hack the data very easily. The use of computer software is increasing day by day through
which work can be done more easily and specifically but it is creating unnecessary trouble for
the user because data are not safe and secure. The common forms of Malware are phishing attack
are spam emails, phishing and spear-phishing emails. The problem which is being created in the
market is related with phishing because it is said that phishing is one of those attack which copy
the useful information including login credentials including all the necessary information which
are related to banks credit and debit card. While talking about spear phishing emails it try to
target that group of people who have better market position and through this source data can be
easily copied through which person can easily take competitive advantage in the market. In
Australia, the current data shows that 25% of the people faces the problem of phishing attack
once in a month which clears that people are facing lots of problem in current scenario (Kshetri,
2017).
Even there are number of security option through which safety is being provided to every
individual. It is more important that how people use those technology because most of the time
they uses all those technology in that fashion through which their data and important information
are copied. For example: In current scenario, there are strict password management security is
being provided to every person but still they don't know that how that should be used which is
2
the use of the social sites have been increasing day by day still there are number of problem
which is being faced by the individuals. It can be seen that most of the people use email services
for transferring data which is also one of the most popular form of transferring data from one
place to another but this form is not safe and secured because most of the mails are stored in
spam emails through which hackers copy the data misuse them which is also one of the problem
in current scenario. The data shows that in year 2017 near around half of the total number of
mails have been stored in spam box through which problem have raised in providing proper
security to reach and every person or even organisation (Weber and Studer, 2016). Email is one
of the major source through which problem is being increased day by day in the sector of data
and security. Although lots of laws and safety measure have been introduced by the government
agencies and expertise, still security is not being able to provide to each and every person
because of lack of technology to prevent from unethical hacking software's.
There are lots of malware software which is harmful for computer user because it allows
to hack the data very easily. The use of computer software is increasing day by day through
which work can be done more easily and specifically but it is creating unnecessary trouble for
the user because data are not safe and secure. The common forms of Malware are phishing attack
are spam emails, phishing and spear-phishing emails. The problem which is being created in the
market is related with phishing because it is said that phishing is one of those attack which copy
the useful information including login credentials including all the necessary information which
are related to banks credit and debit card. While talking about spear phishing emails it try to
target that group of people who have better market position and through this source data can be
easily copied through which person can easily take competitive advantage in the market. In
Australia, the current data shows that 25% of the people faces the problem of phishing attack
once in a month which clears that people are facing lots of problem in current scenario (Kshetri,
2017).
Even there are number of security option through which safety is being provided to every
individual. It is more important that how people use those technology because most of the time
they uses all those technology in that fashion through which their data and important information
are copied. For example: In current scenario, there are strict password management security is
being provided to every person but still they don't know that how that should be used which is
2

creating unnecessary problem in the nation or even in the world. Most of the software provide
multi factor authentication which helps to prevent data which have reduced the problem of cyber
crime but still many things required changes so that positive results can be obtained in future
which is the most important thing in present time. There is one more software named as
Ransomware which is creating issue as it is targeting both human and technical weaknesses. It
hack the data with the different sources which are always different in nature and even that cannot
be found easily. Ransomware is most installed in mobile, PC with the help of third party app
store which people downloads illegally but that bring issues for the user who uses this
technology and even they are unaware about it (Bonner, 2012). Even one more problem due to
which most of the data are copied is with the help of downloaded file where people download
the file and agree all of the term and conditions without studying any of the contain through
which useful information are shared easily with any of the person.
While talking about future is the serious problem which is required to be solved as soon
as possible else have might have to suffer from various kind of issues. But, technologies are
changing day by day and even it is providing lots of benefits to every people which clearly
indicates that working style have been changed in recent period of time. There are around 6000
marketplace selling through which software can be purchased in future through which problem
of ransomware can be removed and if this things can happen then it is sure that better security
can be easily provided to the customer who are dealing in the market of social media. Even more
software are being designed and if that will be successful then better results can be easily
achieved else outcome will be more harsh (Benoliel, 2014). Changes are required in the field of
security because there are number of unauthorised application which will show negative effect in
future. Some of the advance technology through which data can be protected in future are cloud
protect, email in which spam mails should be deleted because that is the main source thought
which hacking can be done in future.
All these trend have been changing the lifestyle of people where they are allowed to work
easily through which they are taking various advantages. Some of the trends which are mainly
focused in present are mobile security and cloud security which is being commonly used and it is
important in future that how these trends are focused because that will reflect that how company
or any of the individual can provide better security to their personal information through which
they can take multiple number of advantages (Fischer, 2013).
3
multi factor authentication which helps to prevent data which have reduced the problem of cyber
crime but still many things required changes so that positive results can be obtained in future
which is the most important thing in present time. There is one more software named as
Ransomware which is creating issue as it is targeting both human and technical weaknesses. It
hack the data with the different sources which are always different in nature and even that cannot
be found easily. Ransomware is most installed in mobile, PC with the help of third party app
store which people downloads illegally but that bring issues for the user who uses this
technology and even they are unaware about it (Bonner, 2012). Even one more problem due to
which most of the data are copied is with the help of downloaded file where people download
the file and agree all of the term and conditions without studying any of the contain through
which useful information are shared easily with any of the person.
While talking about future is the serious problem which is required to be solved as soon
as possible else have might have to suffer from various kind of issues. But, technologies are
changing day by day and even it is providing lots of benefits to every people which clearly
indicates that working style have been changed in recent period of time. There are around 6000
marketplace selling through which software can be purchased in future through which problem
of ransomware can be removed and if this things can happen then it is sure that better security
can be easily provided to the customer who are dealing in the market of social media. Even more
software are being designed and if that will be successful then better results can be easily
achieved else outcome will be more harsh (Benoliel, 2014). Changes are required in the field of
security because there are number of unauthorised application which will show negative effect in
future. Some of the advance technology through which data can be protected in future are cloud
protect, email in which spam mails should be deleted because that is the main source thought
which hacking can be done in future.
All these trend have been changing the lifestyle of people where they are allowed to work
easily through which they are taking various advantages. Some of the trends which are mainly
focused in present are mobile security and cloud security which is being commonly used and it is
important in future that how these trends are focused because that will reflect that how company
or any of the individual can provide better security to their personal information through which
they can take multiple number of advantages (Fischer, 2013).
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

B. Implication of the trend to the world that we live in.
The trend is changing day by day which is providing various kind of benefits to the
society but they must understand that what are the pros and cons of using this technology
through which data is being copied in a significant manner. This world is totally depended upon
the technology which are being used in modern era but it is necessary to understand that this
must be used only up to that form which can deliver various kind of benefits else it is one of that
means of communication which create lots of problem for any of the person (Craig, Shackelford
and Hiller, 2015). It is seen that people are completely dependent upon the software through
which their work can be easily wound up but they don't want to understand that to use all this
technologies people must be able to use them in systematic manner else there are number of
safety issues in it.
In this era everything is transforming into digital market in innovative ideas are easily
generated and through which people can easily earn maximum amount of profit. In present
scenario, people are totally dependent upon those mobile technology through which they can
easily complete their work. People only want to make their work easier and faster but they don't
want to understand that mobile is one of those rear source through which data can be easily
copied and later on that can create various kind of issues for them. Actually, we are living in that
society were number of problems are required to be faced but modern technology are providing
various kind of advantages because people are able to operate their work with the help of
machines and even they doesn't required to do those work which provides problem to them. But,
it is necessary to understand that this technology is not safe and secure as much as people think.
Changes are being done rapidly were each and every people are trying to engage them
that how they can transfer themselves from manually to digitally because that can help to
complete the work very easily. Everything is converting electronically but still it is not
developed to that stage which can provide security to each and every software and that is the
only way through which data is copied very easily. In present, people are lining that era where
car also doesn't required any driver and even that is fully electric which shows that how world is
being changed rapidly (Shackelford, Russell and Kuehn, 2016). Nowadays, there are number of
secured application through which payment can be done safely and anything can be purchased
easily which have reduce the burden of people who are well known to these technology. But,
there are number of crimes which are being done with the help of social media because it is one
4
The trend is changing day by day which is providing various kind of benefits to the
society but they must understand that what are the pros and cons of using this technology
through which data is being copied in a significant manner. This world is totally depended upon
the technology which are being used in modern era but it is necessary to understand that this
must be used only up to that form which can deliver various kind of benefits else it is one of that
means of communication which create lots of problem for any of the person (Craig, Shackelford
and Hiller, 2015). It is seen that people are completely dependent upon the software through
which their work can be easily wound up but they don't want to understand that to use all this
technologies people must be able to use them in systematic manner else there are number of
safety issues in it.
In this era everything is transforming into digital market in innovative ideas are easily
generated and through which people can easily earn maximum amount of profit. In present
scenario, people are totally dependent upon those mobile technology through which they can
easily complete their work. People only want to make their work easier and faster but they don't
want to understand that mobile is one of those rear source through which data can be easily
copied and later on that can create various kind of issues for them. Actually, we are living in that
society were number of problems are required to be faced but modern technology are providing
various kind of advantages because people are able to operate their work with the help of
machines and even they doesn't required to do those work which provides problem to them. But,
it is necessary to understand that this technology is not safe and secure as much as people think.
Changes are being done rapidly were each and every people are trying to engage them
that how they can transfer themselves from manually to digitally because that can help to
complete the work very easily. Everything is converting electronically but still it is not
developed to that stage which can provide security to each and every software and that is the
only way through which data is copied very easily. In present, people are lining that era where
car also doesn't required any driver and even that is fully electric which shows that how world is
being changed rapidly (Shackelford, Russell and Kuehn, 2016). Nowadays, there are number of
secured application through which payment can be done safely and anything can be purchased
easily which have reduce the burden of people who are well known to these technology. But,
there are number of crimes which are being done with the help of social media because it is one
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

of those source through which maximum number of crime are being attempted and people must
try that how they can make themselves aware from this kind of things.
The present scenario shows that change are being done very quickly for example: in
beginning people had started to use those mobile in which there was only the option to call and
after that it started to change where people started to use various kind of application through
which knowledge can be enhanced but in present it is one of those source on which people are
completely relied (Christou, 2016). It is good that people are relied on software technologies but
they are required to know that what are those software application which are safe and secure
because when any of the application through which data are being hacked then it creates multiple
number of issues for that person.
It can be suggested to each and every person that they must be aware regarding all this
technology that how these can be used through which certain benefits can be taken. Even people
must try that how they can reduce its use in that area where cyber crime is being done in
significant manner because if that can be done that various kind of benefit can be obtained in
future. Even people should try that how they can work ethically so that legal action can be taken
because in most of the cases it is found that organisation or any individual work unethically with
the help of various kind of software and if any kind of issue arises then they are not allowed to
take any of the legal action.
C. Application of legal and legislative considerations in relation to the trend.
There are number of legislation and law which are being formed on regular basis and still
lots of changes are required. Most of the cyber crime work are being done with the help of weak
point where law is not formed or punishment is not so harsh. It is necessary that those area of law
should be changed in future because that have the huge role on daily basis. Additional number of
laws are require to commence because that will help to reduce the percentage of criminal
activity. There is a possibility that if new law will be commenced then security to the important
data can be increased through which positive outcome can be seen (Bayuk and et. al., 2012) . It
is necessary that legislation related to cyber crime must be amended time to time because most of
the time it is found that new ideas are creates and if and new law can be commenced in that area
then chances of hacking the data will reduce by high percentage.
In context of Australia, there are number of laws which are commenced just to provide
better security to the person or organisation which are engage in the field of electronic
5
try that how they can make themselves aware from this kind of things.
The present scenario shows that change are being done very quickly for example: in
beginning people had started to use those mobile in which there was only the option to call and
after that it started to change where people started to use various kind of application through
which knowledge can be enhanced but in present it is one of those source on which people are
completely relied (Christou, 2016). It is good that people are relied on software technologies but
they are required to know that what are those software application which are safe and secure
because when any of the application through which data are being hacked then it creates multiple
number of issues for that person.
It can be suggested to each and every person that they must be aware regarding all this
technology that how these can be used through which certain benefits can be taken. Even people
must try that how they can reduce its use in that area where cyber crime is being done in
significant manner because if that can be done that various kind of benefit can be obtained in
future. Even people should try that how they can work ethically so that legal action can be taken
because in most of the cases it is found that organisation or any individual work unethically with
the help of various kind of software and if any kind of issue arises then they are not allowed to
take any of the legal action.
C. Application of legal and legislative considerations in relation to the trend.
There are number of legislation and law which are being formed on regular basis and still
lots of changes are required. Most of the cyber crime work are being done with the help of weak
point where law is not formed or punishment is not so harsh. It is necessary that those area of law
should be changed in future because that have the huge role on daily basis. Additional number of
laws are require to commence because that will help to reduce the percentage of criminal
activity. There is a possibility that if new law will be commenced then security to the important
data can be increased through which positive outcome can be seen (Bayuk and et. al., 2012) . It
is necessary that legislation related to cyber crime must be amended time to time because most of
the time it is found that new ideas are creates and if and new law can be commenced in that area
then chances of hacking the data will reduce by high percentage.
In context of Australia, there are number of laws which are commenced just to provide
better security to the person or organisation which are engage in the field of electronic
5

communication. Cybercrime Act 2001 have been introduce to reduce the percentage of
cybercrime within Australia where two different schedule have been commenced i.e., Schedule 1
is for Computer Offence and Schedule 2 is for law enforcement power relating to electronically
stored data. In schedule 1 there are five different laws have been commenced and they are
Australian Security Intelligence Organisation Act 1979, Crimes Act 1914, Criminal Code Act
1995, Education Service for Overseas Student Act 2000 and Telecommunications Act 1997.
While discussing about schedule 2, there are two different act have been explained and they are
Crime Act 1914 and Customs Act 1901 (Cybercrime Act, 2001). In this all Act where remedies
are explained that what can be done if any of the criminal activity takes place.
The legislation of Australia states that none of the person should engage in that sort of
work where other individual is troubled because of there unnecessary activity. It is necessary that
each and every people must work as per the rules and regulation which have been commenced by
the legislation. The modern trend shows that there is the huge role of legislation because crime
rate is increasing day by day and to reduce the overall percentage it is necessary that law should
be introduced as per the current trend which is going on in the field of cyber crime.
As per the Cybercrime Act 2001, no one is allow to copy or steal the data of any person
as it is unethical and even it falls under the category of criminal offence. The punishment is
always judged on the basis of crime which have been attempted by the criminal person. When
any of the crime under cybercrime is of serious nature related to computer offence then it will
fall under the Division 477.1. Here, topics are related to unauthorised access, modification or
impairment with intent to commit a serious offence and if any of the person is found guilty in
this offence then harsh punishment might be given to them which includes minimum
imprisonment of 2 years and even monitory penalty can also be imposed if it is necessary. After
the formation of different laws and policies various kind of changes have been found through
which it is seen that rate of cyber crime have reduces in certain area (Thaw, 2013).
In context of the world, cyber crime rate is increasing in a rapid speed and to prevent
from the attack of this form of crime various laws are being enforced so that changes can be done
but still there are lots of area where nothing can be done because systems are not so advance.
But, most of the organisation are using computer software for performing there day to day
activity. As, it includes law related to computer crime, internet crime, information crime,
technology crime and communication crime. Here, law have been formed which says that if any
6
cybercrime within Australia where two different schedule have been commenced i.e., Schedule 1
is for Computer Offence and Schedule 2 is for law enforcement power relating to electronically
stored data. In schedule 1 there are five different laws have been commenced and they are
Australian Security Intelligence Organisation Act 1979, Crimes Act 1914, Criminal Code Act
1995, Education Service for Overseas Student Act 2000 and Telecommunications Act 1997.
While discussing about schedule 2, there are two different act have been explained and they are
Crime Act 1914 and Customs Act 1901 (Cybercrime Act, 2001). In this all Act where remedies
are explained that what can be done if any of the criminal activity takes place.
The legislation of Australia states that none of the person should engage in that sort of
work where other individual is troubled because of there unnecessary activity. It is necessary that
each and every people must work as per the rules and regulation which have been commenced by
the legislation. The modern trend shows that there is the huge role of legislation because crime
rate is increasing day by day and to reduce the overall percentage it is necessary that law should
be introduced as per the current trend which is going on in the field of cyber crime.
As per the Cybercrime Act 2001, no one is allow to copy or steal the data of any person
as it is unethical and even it falls under the category of criminal offence. The punishment is
always judged on the basis of crime which have been attempted by the criminal person. When
any of the crime under cybercrime is of serious nature related to computer offence then it will
fall under the Division 477.1. Here, topics are related to unauthorised access, modification or
impairment with intent to commit a serious offence and if any of the person is found guilty in
this offence then harsh punishment might be given to them which includes minimum
imprisonment of 2 years and even monitory penalty can also be imposed if it is necessary. After
the formation of different laws and policies various kind of changes have been found through
which it is seen that rate of cyber crime have reduces in certain area (Thaw, 2013).
In context of the world, cyber crime rate is increasing in a rapid speed and to prevent
from the attack of this form of crime various laws are being enforced so that changes can be done
but still there are lots of area where nothing can be done because systems are not so advance.
But, most of the organisation are using computer software for performing there day to day
activity. As, it includes law related to computer crime, internet crime, information crime,
technology crime and communication crime. Here, law have been formed which says that if any
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

person is found defaulter under this law then he or she will be penalised. It is one of those
problem which can easily found in every part of the world. At present, European Union Law
have done treaty with most of the country so that they can provide better life standard to the
person who have engaged themselves in modern technology to store their data and to
communicate with anyone (Zhang, 2013). In present situation, it is necessary that all the weak
area should be covered so that better results can be achieved and even law should be formed in
that fashion where punishment should be harsh if any of the person is found guilty under the
offence of cyber crime. It is for sure that technology will become more advance but it is
necessary that those technologies should be more safe and secure through which results can be
obtained more desirable.
Legislation, rules and regulation related to cyber crime should be more restricted where
none of the computer should be operated without anti-virus because it has been found above that
most of the results are negative when any of the organisation uses any of the software without
antivirus then chances of Malware increases through which data are easily hacked. Secondly, it is
necessary that any person should not download such application which are not registered and if
that is found then legal action must be taken at any period of time. Even, it law should be made
where any of the software company should not develop those application where security is one
of the major issue because modern trend is totally related with technology and software where
chances of hacking is very high. Thus, it can be easily said that changes are still required in the
field of legislation through which chance of cyber crime can be reduced (Hiller and Russell,
2013).
D. Prediction: what is yet to happen and what to look out for in future.
The use of computer technology is increasing everyday because it helps to reduce the
overall burden of any person or association and by considering this it can be understood that
there are high chances that use of social media will increase in future. There are millions of
people are not involving themselves into social media or digital market but it is sure that in
future they will try to shift themselves into latest trend because it minimises the cost with
effective result.
The use of cyber and electronic will increase that means there is more probability that
securities will be much and more better then it is found now. Even new rules and regulation will
also introduce through which additional safety can be provided through which chances of cyber
7
problem which can easily found in every part of the world. At present, European Union Law
have done treaty with most of the country so that they can provide better life standard to the
person who have engaged themselves in modern technology to store their data and to
communicate with anyone (Zhang, 2013). In present situation, it is necessary that all the weak
area should be covered so that better results can be achieved and even law should be formed in
that fashion where punishment should be harsh if any of the person is found guilty under the
offence of cyber crime. It is for sure that technology will become more advance but it is
necessary that those technologies should be more safe and secure through which results can be
obtained more desirable.
Legislation, rules and regulation related to cyber crime should be more restricted where
none of the computer should be operated without anti-virus because it has been found above that
most of the results are negative when any of the organisation uses any of the software without
antivirus then chances of Malware increases through which data are easily hacked. Secondly, it is
necessary that any person should not download such application which are not registered and if
that is found then legal action must be taken at any period of time. Even, it law should be made
where any of the software company should not develop those application where security is one
of the major issue because modern trend is totally related with technology and software where
chances of hacking is very high. Thus, it can be easily said that changes are still required in the
field of legislation through which chance of cyber crime can be reduced (Hiller and Russell,
2013).
D. Prediction: what is yet to happen and what to look out for in future.
The use of computer technology is increasing everyday because it helps to reduce the
overall burden of any person or association and by considering this it can be understood that
there are high chances that use of social media will increase in future. There are millions of
people are not involving themselves into social media or digital market but it is sure that in
future they will try to shift themselves into latest trend because it minimises the cost with
effective result.
The use of cyber and electronic will increase that means there is more probability that
securities will be much and more better then it is found now. Even new rules and regulation will
also introduce through which additional safety can be provided through which chances of cyber
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

crime will automatically reduces which will bring more positive result in future. This will helps
any of the organisation to communicate very easily and data, information can also be kept
secretly. The future of this filed is always found safe but the only issue which can be seen is that
how problem of cyber crime can be solved out and for that legislation should be changed in
future which is being seen that it is changing day by day and even result is also positive. It is the
modern era where everything is required to be modern but that must be systematic manner and
even in ethical way through which results can be achieved much better in future (Fahey, 2014) .
The law and regulations which are being amended in recent time shows that there is high
chances of obtaining positive response in the digital market because without the help of these
technology it is not possible to conclude the work in appropriate manner. The future trend of
security is in safe and secure positive because day by day criminal activities are increasing where
digital techniques are adopted in which multiple number of security is being provided. For
example: face look security, fingerprint security system and even most of the software are only
allowed to operate through retina of a person. There is high possibility that network security will
increase and even unauthorised access, misuse, malfunction, modification of data and
information will reduce through with secured platform for computer users can be given.
From my point of view future of cybersecurity is widely connected with the future of IT
because it is found there are number of technology which is operating most of the important area
in current situation and even there are many things which is directly connected and operated with
computer system which shows that what can be the future of cyber field in future. The number of
decision which will be taken in future will be automated with the help of Artificial Intelligence.
Most of the people says that in upcoming years the use of cyber field will increase rapidly but
even there will be high chances of cyber attack technology (Skopik, Settanni and Fiedler, 2016).
I don't think that cyber attack will affect the future era because everything is changing very
quickly and legislation will defiantly work so that offensive work cannot be conducted. In future
there are chances that network gateway will only be shared with authenticated system which will
not allow anyone to hack the system.
The CEO of global cybersecurity Sonic Wall and Bill Conner are trying to find the
solution through Malware attack can be removed from the field of digital market where chances
are high that everything will be operated with the help of Artificial Intelligence (Cybersecurity
and the future of work: How much can we predict? 2018). But, we cannot deny that cyberthreats
8
any of the organisation to communicate very easily and data, information can also be kept
secretly. The future of this filed is always found safe but the only issue which can be seen is that
how problem of cyber crime can be solved out and for that legislation should be changed in
future which is being seen that it is changing day by day and even result is also positive. It is the
modern era where everything is required to be modern but that must be systematic manner and
even in ethical way through which results can be achieved much better in future (Fahey, 2014) .
The law and regulations which are being amended in recent time shows that there is high
chances of obtaining positive response in the digital market because without the help of these
technology it is not possible to conclude the work in appropriate manner. The future trend of
security is in safe and secure positive because day by day criminal activities are increasing where
digital techniques are adopted in which multiple number of security is being provided. For
example: face look security, fingerprint security system and even most of the software are only
allowed to operate through retina of a person. There is high possibility that network security will
increase and even unauthorised access, misuse, malfunction, modification of data and
information will reduce through with secured platform for computer users can be given.
From my point of view future of cybersecurity is widely connected with the future of IT
because it is found there are number of technology which is operating most of the important area
in current situation and even there are many things which is directly connected and operated with
computer system which shows that what can be the future of cyber field in future. The number of
decision which will be taken in future will be automated with the help of Artificial Intelligence.
Most of the people says that in upcoming years the use of cyber field will increase rapidly but
even there will be high chances of cyber attack technology (Skopik, Settanni and Fiedler, 2016).
I don't think that cyber attack will affect the future era because everything is changing very
quickly and legislation will defiantly work so that offensive work cannot be conducted. In future
there are chances that network gateway will only be shared with authenticated system which will
not allow anyone to hack the system.
The CEO of global cybersecurity Sonic Wall and Bill Conner are trying to find the
solution through Malware attack can be removed from the field of digital market where chances
are high that everything will be operated with the help of Artificial Intelligence (Cybersecurity
and the future of work: How much can we predict? 2018). But, we cannot deny that cyberthreats
8

are also growing in both volume and even complexity which can create issues in future if that
will not be solved in specific period of time. The main race that will be focus more in future will
be related with the cyber-risk that how it can be reduced for the purpose of increasing the user.
The technology are changing day by day which says that future cyber security will be
more safe and secure and the main reason behind all those words is that many of the expertise are
trying to create those advance software in with two way authentication will be required which
will ensure that data cannot be hacked easily (Bailey, 2014). There is more possibility that
people who are engaged in small and medium industry will also try to shift themselves towards
digital technology so that they can also enhance there business. Also, it is said that advance
software are being designed to solve the problem of login process because that is main platform
from where maximum number data are being copied. In the end, it is understood that rate of
cyber crime will definitely reduce and cyber securities will be able to keep data safe and secure.
9
will not be solved in specific period of time. The main race that will be focus more in future will
be related with the cyber-risk that how it can be reduced for the purpose of increasing the user.
The technology are changing day by day which says that future cyber security will be
more safe and secure and the main reason behind all those words is that many of the expertise are
trying to create those advance software in with two way authentication will be required which
will ensure that data cannot be hacked easily (Bailey, 2014). There is more possibility that
people who are engaged in small and medium industry will also try to shift themselves towards
digital technology so that they can also enhance there business. Also, it is said that advance
software are being designed to solve the problem of login process because that is main platform
from where maximum number data are being copied. In the end, it is understood that rate of
cyber crime will definitely reduce and cyber securities will be able to keep data safe and secure.
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 14
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.