Cyber Crimes

Cyber Bullying – Cyber bullying is world-wide, some people may not know they are being a cyber bully, for instance commenting negatively on someone’s picture thinking your having an opinion is cyber bullying. Lots of teenagers are cyber bullied online from their classmates which causes anxiety and often leading to self-harm and suicide.

Child Pornography – Unfortunately this is a crime which rakes in millions each year. Often sold on the dark web people will take photos, post photos and buy photos of children for their personal pleasure.

Hackers – The world is getting more and more scary online with all the cyber crimes, hacking if unethical is illegal and hackers will steal your data for their own potential gain or hate crime.

Trolling – A bit like cyber bullying, you are trolling people online commenting on their pictures having an opinion on the way a person behaves or acts. Usually not directed at the person but on social media forum.

Identity theft – Hackers using social media skills to gain access to personal information. This information can then be used to commit fraud and identity theft, i.e. get credit card/loan with someone else’s details.

Child sex abuse – Again usually on the dark web and illegal. Children from foreign countries as well as the EU are often pimped from a young age to travellers and videos are made and sold online of sexual acts. It is reported that young babies are often sexually abused and content streamed and sold to paedophiles online.

Black market Trading – Guns, exotic animal, drugs are a few of the illegal purchases that are made online, There is a marketplace on the dark web that you can buy almost anything imaginable.

Cyber security standards

PAS 555 -Supplies a holistic framework for effective cyber security which not only considers the technical aspects, but also the related physical, cultural and behavioural aspects of an organisation’s approach to addressing cyber threats, including effective leadership and governance. ref https://www.itgovernance.co.uk/shop/product/pas-555-2013-standard

ISO/IEC 27001:2013

CSA CCM – CSA(Cloud Security Alliance)’s CCM (Cloud Controls Matrix) is a set of controls designed to maximise information security for users of Cloud technologies.

7 different policies that impact cyber security professionals.

Acceptable Use Policy (AUP) “An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.” ref https://www.google.co.uk/search?

Access Control Policy (ACP) How organisations monitor which employees and departments have access to certain data. For example the technical team will need access to certain programmes but do not need access to HR documents and vice verse. The Access control policy makes sure everyone has access only what they need access too. If new access is required then a spark request is sent to ask permission and justify the reason for use.

Change Management Policy. It establishes the requirements for change to be managed and auditable, and to ensure business continuity.

Information Security Policy

Protecting an organisation by ensuring all employees who use information technology assets within the organization, or its networks, comply with its stated rules and guidelines.

Incident Response (IR) Policy – This can be any incident in an organisation. An example could be someone hurting themselves on company property, the details need to be logged in the incident log report book. Another example could be the phone system going down in a call centre, this needs to be managed and alternative arrange plans in place like re-routing to alternative call centre to prevent organisation looking business.

Remote Access Policy defines acceptable methods of remotely connecting to the internal network. If working from home you will be connecting to internal network and systems.

Disaster Recovery Policy. When something serious goes wrong in an organisation, At this point cybersecurity and IT teams will be involved to create a disaster recovery plan depending on size of incident and who is affected

Fines and Penalties for violating PECR or Data Protection Act or GDPR.

The maximum fine under the GDPR is up to 4% of annual global turnover or €20 million – whichever is greater – for organisations that infringe its requirements.

However, not all GDPR infringements lead to data protection fines. Supervisory authorities such as the UK’s ICO (Information Commissioner’s Office) can take a range of other actions, including:

  • Issuing warnings and reprimands;
  • Imposing a temporary or permanent ban on data processing;
  • Ordering the rectification, restriction or erasure of data; and
  • Suspending data transfers to third countries.

How are GDPR fines determined?

Fines of up to €10 million or 2% of annual global turnover can be issued for infringements of articles:

  • 8 (conditions for children’s consent);
  • 11 (processing that doesn’t require identification);
  • 25–39 (general obligations of processors and controllers);
  • 42 (certification); and
  • 43 (certification bodies).

Fines of up to €20 million or 4% of annual global turnover can be issued for infringements of articles:

information reference to https://www.itgovernance.co.uk/dpa-and-gdpr-penalties

Data Protection ad GDPR

Below are some differences found online to explain the difference between Data Protection and GDPR

being ‘GDPR’. We thought this table may be of benefit to you.

DPA(Data Protection Act 1998)GDPR (General Data Protection Regulation)
The Data Protection Act was developed to give protection and lay down rules about how data about people can be used. The 1998 Act covers information or data stored on a computer or an organised paper filing system about living people.EU General Data Protection Regulation (GDPR) in Europe, adopted in 2016, will be directly applicable starting on May 25, 2018, and will replace the DPA
Only applies the UKApplies to the whole of the EU and, crucially, also to any global company which holds data on EU citizens
Enforced by the Information Commissioner’s Office (ICO)Compliance will be monitored by a Supervisory Authority in the UK with each European country having its own SA
Under the current legislation there is no need for any business to have a dedicated DPOA DPO in some countries will be mandatory for any business or organisation with more than 250 employees
There is no requirement for an organisation to remove all data they hold on an individualAn individual will have the ‘Right to erasures – which includes all data including web records with all information being permanently deleted
Privacy Impact Assessment (PIA) are not a legal requirement under DPA but has always been ‘championed’ by the ICOPlAs will be mandatory and must be carried out when there is a high risk to the freedoms of the individual. A PIA helps an organisation to ensure they meet an individual’s expectation of privacy
Data collection does not necessarily require an opt-in under the current Data Protection ActThe need for consent underpins GDPR. Individuals must opt-in whenever data is collected and there must be clear privacy notices. Those notices must be concise and transparent and consent must be able to be withdrawn at any time
Direction sets aims and requirements, implemented through national legislationRegulation is binding for all member states
Personal data and sensitive personal dataIn addition, now includes online identifiers, location data, and genetic data
Breach notifications not mandatory for most organisationsMandatory and within 72 hours
Any person who has material damage is entitled to claim compensationAny person who has suffered material or non-material damage
Data protection governance down to best endeavoursRecommendation of a data protection officer to be employed from outside the company for organisations with 250+ employees or more than 5,000 subject profiles per annum
Maximum fine is 500,000Maximum fine 4% of annual turnover or Euro20M whichever is greater
Responsibility rest with the Data ControllerRests with both the controller and processor with the controller being able to seek damages from the processor
Parental consent for minors not requiredParental consent for minors now required
Accountability is limitedAccountability fully explicit
Subject access requests, £10 per transaction and within 40daysFree of charge and within 30 days
Data consent free given, specific and informedClear affirmation action with the ability to be withdrawn later

What is digital privacy? Do you think your digital data is protected ? Discuss.

Digital privacy refers to the protection of an individual’s information that is used or created while using the Internet on a computer, laptop or personal device.

I believe my digital privacy is protected by certain organisations to a certain extent. When we sign up to facebook we are agreeing to the conditions our data is being sold to data miners. Also mistakes are made and we do give our data away quite easily.

Cyber Resilience?

Cyber resilience is extremely important because it helps organisations take the necessary measures to address risks, ensuring they can continue delivering their business objectives and outcomes in total confidence, and build trust in business relationships with internal and external customers.

•Cyber resilience is defined as the ability to prevent, detect and correct any impact that incidents have on the information required to do business .

•Cyber resilience differs to cyber security as, in addition to preventing cyber attacks, cyber resilience detects them and corrects the damage.

Design a site like this with WordPress.com
Get started