0% found this document useful (0 votes)
25 views9 pages

Individual Report

Uploaded by

atharv.sharma978
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views9 pages

Individual Report

Uploaded by

atharv.sharma978
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Individual Report

Topic:- Digital World


Issue:- "Digital Privacy and Data Security"
Research Question:- "Are the rules about digital privacy doing
enough to keep people's personal data safe from hackers and
companies using it without permission?"
Introduction

"Are the rules about digital privacy doing enough to keep people's
personal data safe from hackers and companies using it without
permission?" is my research question

In this report we will be analyzing, evaluating and answering this


topic and its research question.

Digital Privacy

Digital privacy refers to safeguarding private data on the internet


and managing its use, sharing, and access to avoid abuse or
illegal access.

Data Security

Web security, moreover known as online security, cybersecurity,


and electronic security (e-security), alludes to approaches, hones,
and forms outlined to decrease hurt caused to individuals by the
(mis)use of data innovation.

As the number of Web clients proceeds to develop around the


world, Web clients, governments, and organizations have
communicated concerns around the security of children, youths,
and seniors online. Over 45% say they have experienced a few
frame of cyber badgering. To raise mindfulness around Web
security, More secure Web Day is celebrated around the world in
February. Within the UK, the Get Secure Online campaign is
supported by the government office Genuine Organized
Wrongdoing Organization (SOCA) and major Web companies
such as eBay

Global Perspective

Information security and human rights are increasingly connected


as technology advances and data grows rapidly. Human rights
organizations are concerned about how data is handled and its
impact on global civil freedoms. This connection highlights the
importance of balancing data protection and human rights.

Data protection laws regulate how organizations collect, store,


and use personal data, ensuring transparency and compliance
with legal standards, including cross-border data exchanges.
These laws vary worldwide, requiring organizations to follow
applicable national and global regulations while safeguarding
individuals' rights to access and control their data.
National Perspective

The Indian administration as compared to the other countries is


at standard with the rights and obligations being comparable. Be
that as it may there are a few contrasts, few major ones are that
the Computerized Information Security Charge, 2022 (hereinafter
alluded to as “the Bill”) in itself does not give points of interest or
maybe it notices as may be endorsed which implies watchfulness
within the hands of the State which may lead to the infringement
of the security of the citizen.
Issues

1. Malware affects many companies and organizations.


Ransomware is a type of malware. This type of malware encrypts
the victim's data to demand payment for access: no guarantee of
data restoration even if one pays.

2. Cloud Attacks: Cloud attacks impinge on online data and


services with cyber assaults like information disclosure, DoS
attacks, account hijacking, insecure APIs and malware injection.
They take advantage of cloud weakensses hence strong security
is the best defense system for all.

3. IoT Attacks: IoT Assaults (Internet of Things)

IoT attacks take advantage of the loopholes in the security of


devices under the Internet of Things, which eventually gives an
attacker access to a system. However, though there has been
some progress, effective security controls are not yet widespread.
Courses of action

With the advancement of technology, businesses and individuals


will have to adopt stronger ransomware defenses in a bid to
safeguard sensitive information. In 2021, ransomware attacks
happened every 11 seconds with total losses amounting to $20
billion. Such attacks are likely to target individuals or
organizations that they presume would be easily recoverable
cases, thereby jeopardizing critical business assets. Since data is
foundational for most operations, loss of access can cause severe
and sometimes chronic effects that interrupt the business process
seriously. So the strategies have to be proactive in preventing
ransomware and securing systems before exploits are identified.

Regular data backups prevent malware and ransomware attacks.


The 3, 2, 1 rule should be followed, which states that there should
be three copies of the data on two different types of storage, one
of which is offline. For more protection, one copy should be stored
on an immutable cloud server. Backups enable the wiping of
infected systems and restoration of data without ransom
payments. Critical information should be backed up daily by
organizations to reduce exposure. Updates and upgrades of
systems and software have also been necessary because
attackers take advantage of outdated applications. for instance,
the infamous attack WannaCry happened in 2017 and targeted
outdated versions of Microsoft Windows thereby impacting over
230,000 computers across the globe. Installation of antivirus
software along with firewalls provides an additional layer of
security. Antivirus programs detect and respond to threats within
systems, while firewalls block questionable data before it enters
the network; thus acting as the first line of defense. All these
measures considerably reduce vulnerability to cyberattacks.
Bibliography

Amlegals -
https://amlegals.com/data-protection-laws-a-global-perspective/#:~:text=Thus%2C%20
Data%20Protection%20Laws%20are,Privacy%20as%20a%20fundamental%20right.

Wikipedia - https://en.wikipedia.org/wiki/Internet_safety

EducBa - https://www.educba.com/cyber-security-challenges/

Medium -
https://medium.com/@rupasindhayach/data-protection-and-human-rights-a-global-persp
ective-7a735a6eefc4#:~:text=Organisations%20are%20obligated%20to%20ensure,or%
20national%20laws%20are%20applicable.

Cullen International -
https://www.cullen-international.com/news/2023/08/Privacy-in-the-digital-age--a-global-p
erspective.html

IEEE Digital Privacy -


https://digitalprivacy.ieee.org/publications/topics/what-is-digital-privacy-and-its-importanc
e

Javapoint - https://www.javatpoint.com/cyber-security-challenges

Sprinto - https://sprinto.com/blog/challenges-of-cyber-security/

Upgaurd - https://www.upguard.com/blog/best-practices-to-prevent-ransomware-attacks

You might also like