Author: Kurma Bhanu Chandra Jyothi, Sri Padmavati Mahila Viswavidhyalayam
To The Point
Cyber security is the practice of protecting systems, networks, and data frame cyber attacks.it uses technologies, processes, and it controls and reduces the risk of the cyber-attacks.
Types of cyber security:
Application security.
Information security.
Network security.
Cloud security.
Use of legal jargon:
Cyber security and the law
Section 1: Understanding cyber security Threats
*Malware and phishing: it is defining a legal implication.
* Data Breaches: understand data breaches
And their consequences under the law.
Section 2: Data protection and privacy
GDPR and HIPAA: it is an impact on data protection.
Data privacy and security: it is an impact on legal implications.
Section 3: cyber security Regulation and compliance
Cyber security framework: It is an define a such as NIST and it their legal implications.
Compliance and due diligence: it also defines a legal implication.
To The Proof
MATHEMATICAL PROOFS:
*SECURE SOCKET LAYER:
Mathematical proofs demonstrate the security of Secure socket layer protocols.
*HASH FUNCTIONS:
Mathematical proof is a security of hash functions such as SHA-256.
Logical proofs:
FORMAL VERIFICATION:
logical proofs are the correctness of formal verification, it is involved in a mathematical technique to prove that a system meets its specification.
MODEL CHECKING:
it involves a verifying that a system meets its specifications, it is effective of identify security vulnerabilities.
SECURITY PROTOCOLS: logical proofs demonstrate the security of security protocols, such as Kerberos and Secure socket layer.
Abstract
Organization all across the globe thrive on data. They gather and analyses the data of million of users to develop Products that meet the customer needs. And so, even breach a single data can lead to a breach millions of people the data. The data is sensitive and can cause much damage to the users. For example, the yahoo data breach in August 2012 impacted the account of almost 3 billion people.
Benefits of cyber security.
Cyber security also strengths the mitigation and response
Cyber security helps in making the recovery process faster and more efficient.
Myths of Cyber security:
Password is enough protected: it is a password is in a words and numbers it is protected must be difficult so, it is better of multi factor authentication.
Small and medium size business are not target: it is a intention of famous business are attacked but here a cyber peace foundation find that 43% of all cyber-attacks target.
Certification of cyber security profession.
Certified information system security professional (CISSP): it has skills, designing, implementing and monitoring effective cyber security programs. At least five years of work experience and then experience of at least 2 to 8 Cyber security domains.
Certified information system auditor: it is suitable for advance their career and it is a intermediary certification. At least 5 years’ experience of IT.
Certified information security Manager: (CISM)
It is a valid your knowledge information and this certification want at least 5 years’ experience of manage information security.
Case Laws
Data Breach Cases
1. Target Corp. v. Banks (2015): Target settled a data breach lawsuit with banks for $39 million.
2. Home Depot U.S.A., Inc. v. Bank of America Corp.* (2016): Home Depot settled a data breach lawsuit with banks for $25 million.
3. Equifax Inc. v. In re Equifax Inc. Customer Data Security Breach Litigation* (2019): Equifax agreed to pay up to $700 million to settle a data breach lawsuit.
Cyber security Negligence cases:
1. Cohen v. Cowles Media Co. (1991): A court held that a media company was liable for negligence in failing to protect a source’s identity.
2. Kremen v. Cohen (2001): A court held that an ISP was liable for negligence in failing to prevent a phishing attack.
Cybersecurity Regulation Cases
1. FTC v. Wyndham Worldwide Corp. (2014): A court held that the FTC had authority to regulate cybersecurity practices under the FTC Act.
2. LabMD, Inc. v. FTC (2015): A court held that the FTC’s cybersecurity regulations were too vague and did not provide fair notice.
International Cybersecurity Cases
1. Yahoo! Inc. v. La Ligue Contre Le Racisme Et L’Antisemitisme (2006): A French court ordered Yahoo! to block access to Nazi memorabilia auctions.
2. Google Inc. v. Equus Tek Solutions Inc. (2017): A Canadian court ordered Google to delist a company’s websites globally.
Conclusion
Cyber security is a critical concern that requires proactive measures to protect digital assets. It is an essential for a maintaining the integrity and confidentiality of digital systems. Cyber security is essential for protecting sensitive information, preventing, financial losses. Cyber security threats are a malware, phishing, Ransomware
Criminal penalties: imprisonment up to 10 to 20 years depend up on the severity of the crime and fine 2,50,000 to 5 lakhs.
FAQS
1. What is phishing?:
Phishing is a type of social engineering attack that involves tricking individuals into divulging sensitive information, such as passwords or financial information.
2. What is ransomware?
Ransomware is a type of malware that demands payment in exchange for restoring access to encrypted data.
3. What is GDPR?
The General Data Protection Regulation (GDPR) is a European Union regulation that governs the protection of personal data.
4. What is HIPAA?
The Health Insurance Portability and Accountability Act (HIPAA) is a United States law that governs the protection of sensitive health information.
