Top Research Professionals
The research experts and assignment help team consists exclusively of highly qualified graduate writers, each professional with in-depth subject matter expertise and significant experience in custom academic writing.
For similar papers and sample answers; with a few clicks, Order your research paper, thesis, dissertation writing and other assignment help services
Posted: September 9th, 2022
Laws and Regulations Governing External Cyber Attacks
With the rapid globalization and fast growth of the internet, cybersecurity threats and attacks are always on the rise, becoming one of the critical national security issues. These security threats continue to grow multifaceted over time as hackers become more innovative by the day. These attacks are not discriminatory, making every internet user highly susceptible, from individuals to multimillion-dollar companies. They cause detrimental effects such as financial loss, data damage, loss of essential digital assets and trade secrets, and notably reputation damage. According to the United Nations Security Council, to curb this has led to the enactment of international cybersecurity laws (Kosseff, 2019).
External criminal and hacking threats
A lot of cyber threats and attacks emanate from the digital realm, whereby hackers are actively in destabilizing cybersecurity through these malicious acts. Malware, ransomware, phishing, and DDoS attacks are among the most rampant external security threats the companies are dealing with on a day to day basis (Schaefer, 2017). These attacks can be ongoing for months or even years unnoticed. Briefing the board members on these attacks will make them more cautious and vigilant in safeguarding their respective territories.
DDoS attacks
This is a common threat to computer systems.it is referred to as the Distributed denial of service attacks. In the event of such an attack, the clients will not be able to access their documents since the systems will be overwhelmed (Schaefer, 2017). This traffic causes a system downtime and consequentially costs the company millions of dollars for compensations and recovery.
Phishing
Being an international company, it will be highly susceptible to phishing.This occurs when perpetrators spam the computer systems of users with malicious email attachments to gain access to their devices illegally. Once they are in, they can easily access the clients’ personal information such as their r financial statements, payment information, and confidential medical reports. (Srinivas, 2019) Unauthorized access to this information will allow them to use the credit card information to make illegal online purchases that could have detrimental effects on the client. The company will suffer massive losses and legal implications.
Malware attacks
This involves the introduction of malicious software into a computer system, for instance, viruses, spyware, and ransomware. This breaches the system’s vulnerability by blocking access to key components, introducing harmful soft wares, and disruption of functions. Additionally, when an attack encrypts data, demand ransoms from the company in exchange for letting clients reaccess their data (Schaefer, 2017). In extreme cases, they blackmail the users to pay payments of money not to leak their private and sensitive information on the internet.
Cybersecurity laws and regulations
With a particular focus on this international company, in the event of a cyber-attack, the consequences can be detrimental with several legal implications .the company being a global company is essential to understand the laws and regulations governing cybersecurity and privacy in other jurisdictions outside the U.S. there are several laws and regulations enacted by different nations to protect their citizens and digital assets from these malicious attacks; however, the company needs to be mindful about this laws as they work tirelessly to safeguard their international clients’ cybercrimes. Being an international company, it means that it was essential to understand the laws and regulations protecting companies and their provisions in each company. Herein are the laws and regulatory provisions about cybersecurity and data privacy in the U.S. and other jurisdictions.
International encyclopedia of laws
These laws prove detailed information of different jurisdictional specification laws governing information technology, online privacy, and computer-related crimes. Moreover, it provides details on the non-contractual liability of service providers, for instance, the company to their clients. The information is readily available in the URLs and pdfs format, making it easily accessible (Srinivas, 2019). This allows for a comparison of cyber laws across jurisdictions. It also provides detailed information to citations to primary laws pertaining cybersecurity in different nations.
Bloomberg laws
These are laws pertaining to privacy and data security that every company providing data security services should adhere to. Firstly, they are classified as subject portfolios that entail guidance and insight regarding privacy and data security, highlighting the essential laws and regulations for the U.S. and other select foreign jurisdictions (Srinivas, 2019). Secondly, country profiles provide summaries of privacy and data laws inclusive of their citations, with essential national regulatory authorities and enforcement patterns.
Cheetah
Another classification of the laws and regulations is the Cheetah, which Provides essential information on cybersecurity and privacy of jurisdiction within the U.S., Europe, and other foreign jurisdictions entailing practice guides and global treaties. Additionally, other resources such as current awareness tools in the digital space (Kosseff, 2019). These directives are readily available on the homepage chronologically in order of enactment.
The foreign law guide
This law guide provides detailed information on cyber-crimes, data protection, and network and knowledge safeguard. It provides the primary law sources for a jurisdiction outside the U.S. (Kosseff, 2019)since the company is an international company understanding the rule and regulation of their jurisdictions is essential.
Council of Europe directory of national protection laws
These are provisions of national data protection law with citations of constitutional provisions protecting the right to privacy. Additionally, it provides links to data protection authority in the 47 member countries of the Council of Europe (Srinivas, 2019).
Getting the deal through (GTDT)
This is a multi-jurisdictional resource tool that provides in-depth summaries of national laws that govern data security and privacy and cybersecurity in general. These laws vary from jurisdiction to the next (Srinivas, 2019).
Conclusion
Cyber threats and attacks are always on the rise with technological advancements. These infrastructural infiltrations and data breaches do not discriminate and affect large companies down to individuals. It leads to data damage, leakage of sensitive medical reports, loss of trade secrets, and loss of operational disruptions. In the event of these attacks, the companies suffer massive losses from compensations and recoveries. Fundamentally, for a rapidly growing organization like our company, taking the necessary precautions and safety measures upholds the clients’ trust and holds the company’s reputation. Being an international company, understanding the laws and regulations of each jurisdiction will make the running of operations effective while protecting company’s and clients interest.
References
Kosseff, J. (2019). Cybersecurity law. John Wiley & Sons.
Schaefer, T., Brown, B., Graessle, F., & Salzsieder, L. (2017). CYBERSECURITY: COMMON RISKS: A dynamic set of internal and external threats includes loss of data and revenue, sabotage at the hands of current or former employees, and a P.R. nightmare. Strategic Finance, 99(5), 54-62.
Srinivas, J., Das, A. K., & Kumar, N. (2019). Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems, 92, 178-188.
We prioritize delivering top quality work sought by college students.
The research experts and assignment help team consists exclusively of highly qualified graduate writers, each professional with in-depth subject matter expertise and significant experience in custom academic writing.
Our custom writing services maintain the highest quality while remaining affordable for students. Our pricing for research papers, theses, and dissertations is not only fair considering the superior quality but also competitive with other writing services.
We guarantee plagiarism-free, human-written content. Every product is assured to be original and not AI-generated. Our writers, tutors and editors are research experts who ensures the right formating and citation sytles are followed. To note, all the final drafts undergo rigorous plagiarism checks before delivery for submission to ensure authenticity for our valued customers.
When you decide to place an order with Dissertation Help, here is what happens: