Human And Legal Aspect Of Cyber Security Assignment Sample

  • 54000+ Project Delivered
  • 500+ Experts 24x7 Online Help
  • No AI Generated Content
- +
35% Off
£ 6.69
Estimated Cost
£ 4.35
16 Pages 3888Words

Introduction of Human And Legal Aspect Of Cyber Security

Get free written samples by subject experts and Assignment Writing Help in UK.

This study is about the aspect of legal and human for the security of cyber. Through this study there are some points which will be discussed throughout this study, firstly by this study report the introduction will be given about the legislation of the cyber security and the identification will also be given about the legislation of the cyber security in between an organization. After that in this report the process of how those cyber security legislation will be implemented throughout the employees in between an organization will also be given. Following this parts in this study report the applicability will also be discussed about how the cyber security legislation will be implemented with the employees of an organization, and it will be done by considering the security of the human aspect. Then the conclusion will be written by considering those points.

Cyber Security Legislation

Cyber security seems to be critical since it safeguards all types of information from robbery as well as harm. Critical information, "personally identifiable information or PII," "protected health information or PHI," private details, trade secrets, statistics, as well as federal and business systems engineering are all included. An organization could indeed not protect one against the breach of security operations without the need for an information security program, making it such an unstoppable opportunity for fraudsters. As a result, a first orientation to cyber defense becomes required. Security of cyber has the condition or practice of safeguarding and restoring information systems, organizations, equipment, as well as software from whatever sort of cyber assault, according to the preface. Cyber assaults are becoming a more complex and changing threat towards the sensitive data, as hackers use modern social engineered and "artificial intelligence or AI" techniques to evade standardized data protection measures. The world becomes increasingly dependent upon technologies, as well as this dependency would increase when introduce the very next emergence of creative advanced technologies, which already has accessibility to the linked gadgets using Bluetooth as well as Wi-Fi. Cognitive computing security products must therefore be advanced mechanism password complexity rules such as number of co verification to limit unauthorized access throughout able to preserve client data secure while adopting technological advances.

 Human Aspect of Cyber Security


The recognition hence the need for cyber defense seems to be equally significant; it may be stated that the security of cyber has been becoming increasingly crucial. Essentially, the civilization seems to be more electronically dependent than it has ever been, as well as this tendency defeats the purpose of dying down. Information exposures which potentially lead to identity fraud have been increasingly being publicized via social media websites. The numbers of the security of social, the information of the account, as well as financial information have become saved within the service of the storage of cloud such as Dropbox or the drive of Google. The reality would be that even if you're a person, a private firms, or a major global corporation, you depend on personal computers nearly every day (O'Sullivan et al. 2019). Combine that with increase throughout cloud storage, cloud providers are subpar With protection, cellphones, as well as the "Internet of Things or IoT", users already have a plethora of security related flaws which simply does not exist only very few generations earlier. Even when the technical skills have been growing more comparable, people must recognize the distinction among cybercrime as well as information protection. Organizations all across the globe have always been giving closer attention towards the crime of cyber. GDPR is an amazing illustration. It has worsened the damage to its reputation caused by data thefts by requiring all firms to comply. Acknowledge security breaches, designate a privacy officer, obtain user agreement to carry out specific tasks, and obfuscate information for confidentiality. Stealing of material is perhaps the most costly and speediest type of cybercrime. This is mostly attributable towards the increased accessibility of personally identifiable information toward the web through the service of cloud. However, it's not really the sole goal. Transmission lines as well as other infrastructures can indeed be severely damaged if manufacturing controllers are disturbed or damaged. Cyber crime should not be the single purpose of cyber security threats; they might also try to undermine integrity of the information (delete or modify data) in order to instill mistrust inside an organization or government. Malicious hackers have been growing more skilled, altering their targets, what attackers damage enterprises, as well as the strategies they use to penetrate numerous security measures. Media manipulation is still the most common type of cyber assault, including extortion, hacking, as well as malware being the most common access points. Third-party as well as fourth-party suppliers who process company information and then have weak security of cyber procedures seems to be another prominent target for attackers, emphasizing the need of contractor risk mitigation as well as third-party regulatory compliance.

Cyber Security Legislation connection with Organization

There seem to be various pieces of cyber defense laws that have been extremely pertinent and important to an enterprise. This might be described as follows: In today's modern digital environment, unexpected problems develop every instant of each day. When they access the network, you put yourself up towards the prospect of a criminal assaulting the firm. Cyber security has become a massive business, as well as cyber risk is now becoming a priority for enterprises as well as organizations all around the world. If companies will not have a proper counterterrorism strategy in order, they face significant financial and also operational concerns. The following is an example of cyber security legislation:

Cyber security Governance

A security of cyber administration as well as portfolio management programmed suited for such institutional investors should indeed be designed. The proprietors as well as shareholders must see cyber security threats as an increased business concern. This should have been done on about the same degree as regulatory, organizational, economic, as well as regulatory environment, with appropriate assessment parameters as well as outcomes that are controlled and also monitored. There seems to be a cooperative framework that would be used to evaluate risk as well as related industry standards (Onik et al. 2018). There seems to be an information security architecture that produces the present and continuing purpose:

  • Determine: Create an organizational awareness of cyber risks to technologies, humans, investments, records, and capacities.
  • Protect: Establish as well as put in place adequate protections to enable the implementation of key services.
  • Detection: Create and carry out appropriate interventions to identify the presence of a network intrusion.
  • Respond: Formulate as well as implement necessary actions in response to a recognized the problems of the security of cyber problems.
  • Recover: Successfully integrate appropriate interventions to preserve robustness measures and reestablish any capacities or functions which have been compromised as a result of a particular incident.

 Legal Aspect of Cyber Security


Security against malicious software as well as external attacks

Emerging dangers develop on just a regular basis, and then each organization must ensure that it is prepared to cope with a constantly changing threat environment (Lallie et al. 2021). Some of the really important system applications as well as technologies utilized to assist combat those harmful attempts are as follows:

  • Firewalls constitute programming (or sometimes equipment) that protects a systems against assault by anyone who approach the established connection through both appropriate communication lines.
  • Malware or spyware as well as web security mechanisms shield the machine against programming language that might also come via pop-up boxes and therefore have more sinister intentions, including such collecting login details for nefarious purposes.
  • Anti-spam equipment prevents unsolicited disseminated messages from clogging internet mailboxes.
  • Anti-phishing malware includes protection who visit webpages meant to capture customer information which could later be using it fraudulently.

All are required with another well organization that employs a layered security strategy. The expense of a cyber attack, which includes information loss, deception, as well as the expense of restoring technology, should really be considered in addition of defending against any such attacks.

It is best to work with some well, reliable source. Some firms claim to provide these services, however the applications them self may include harmful malware. Use open source software or technology from such an anonymous seller with caution. In speaking, it is advisable to employ conveniences suggested mostly by company's concurrent engineering (tech support) division, because they'll be in charge of implementation, setup, as well as management.

The upkeep among these programmers is crucial. Each day, different harmful programs arises. To guarantee which the system is fundamentally adequately secured, most suite of products begin by giving a quarterly automated updates to respective systems. It is critical to ensure how these modifications have been appropriately applied.

Hardware Maintenance Plans

Servicing agreements should indeed be kept with device manufacturers so that equipment faults may be addressed swiftly. Inside this event of system failure, such agreements must outline the customer expectations which the provider would satisfy. Systems, networks, as well as storage technologies, for example, demand immediate attention (Kimani et al. 2019). Many agreements call for a multiple reaction time before one of these primary disadvantages. Single workstation, for example, may well have greater reaction speed than that of other, lesser crucial devices.

Some businesses, especially those in isolated regions, acquire important ingredients with a greater failure rate, including such power source, as replacement components which could swiftly substitute a failing element. Organizations which dependent on repairs and maintenance must ensure that perhaps the subsequently influence keeps a sufficient quantity of replacement components readily hand to satisfy the inclusive and accessible assurance obligations.

The organization ’s internal as well as external IT assistance industry's competence seems to be important in ensuring that the technologies are appropriately deployed and maintained. The following factors are towards be considered while picking an ideal organization:

  • Their familiarity also with organization's equipment as well as system software settings.
  • Their familiarity with that of the organization's business applications.
  • Accreditation from significant equipment and software firms give confidence about the capability of the entire workforce.
  • The amount of employees inside the firm who already have the information needed to contribute towards the system becomes crucial since relying exclusively person might lead to significant disruptions as well as expenditures whether that person is absent about any purpose.
  • Their capacity that provide distant supportive services, allowing for speedy reaction to difficulties at an affordable cost.
  • Due investigation as well as contractor organizational performance are required to guarantee that such service provider is delivering process in connection with the organization's obligations.

These are the legislation of cyber security which are relevant with any organization.

Cyber Security Legislation with Employees

For applying the legislation of cyber security in between the employees of an organization, there are some points which must be needed to be follow by an organization which can be described as the follows:

Make Cyber-security a Priority for the Employees

The very first approach in familiarizing personnel about cyber security seems to be to establish a powerful signal as to what is really going on throughout the firm in terms of security. A communication of this nature must've been intelligible, relevant, as well as diverse.

Comprehensible - Resist using technical terminology, which might also confound employees as well as obscure the messages (Ghosh et al. 2018). When feasible, employ simpler words which are understandable to quasi ordinary people.

Diversification – A simple email detailing anything might not have been acceptable. Consider however many messages every one worker gets. One could guarantee the employees received the text rather then just rejecting it as some kind of notification by changing the questions and objectives.

Believable - Whenever discussing possible threats, take into account individual computer security as well as network storage infiltration rather than the network connection. Employees would be able to connect towards the hazard if something is phrased in perspective of the computer or Smartphone. This gives employees a personal involvement in the defense policy: nobody really wishes to become the reason of a massive leak that represents the entire organization.

Recommend to take Extra Caring of the Devices

According to a Forrester report, misplaced or stolen gadgets account for approximately 17 percent of all enterprise intrusions. Educating the staff about cyber security, if it's a substantial business gadget, involves creating them conscious because the machine operates as a backdoor towards the underlying network. This makes it difficult for students for them to start taking care of the equipment as well as utilize it correctly especially when they are at residence.

Transparency should be reinforced

Working remotely causes individuals to become more comfortable, which extended to information security. Although if children work wearing their PJs, emphasize the need of credentials and verification. Protection would not have to be lowered just even though they are.

Investigate Particular Instances of Security Threat

In contrast to a corporate environment with only an established communities, the protection of the workers' personal computers might vary greatly. Some people may connected via personal personal Wi-Fi, whereas others will connect via commercial Wi-Fi at such a local cafe. Certain employees might well have outdated equipment that would no generally functional by patch management, it might be crucial to acknowledge those issues by promoting them to utilize security firm devices (Ghafir et al. 2018). Examine the equipment manufacturer as well as manufacturer year so that it's BYOD to discover whether there seems to be any lingering vulnerabilities.Conduct a security assessment of your wireless routers. Some outdated networks, for particular, may choose to use inferior WEP encryption rather than just WPA-2, but some might use the login details! Attach importance to migrant personnel as well as develop a cyber security program for individuals, as traveling data as well as accessible Wi-Fi connections pose distinct hazards.

End up making Cyber security Education a Consistent Topic of Discussion

Commercial people have spent approximately a quarter of their entire workweek on messaging duties. Since of this, a one-time anonymous email considered important is a bad choice because consumers might not have been capable of grasping the relevance or assimilate the material in a single evening. So here have been a few excellent practices to follow when planning a security presentation for your staff. Use a variety of security instructional approaches, including such frequent broadcasts or monthly upgrades.

This is how the legislation could have apply towards the employees of an organization.

Applicability of Cyber Security Legislation with Employees

The applicability of the legislation of the security of cyber things in between an organization with the employees can be described as the followings:

Coming within conformance - Each city, state, and also nation has its own set of regulations must obey. Since gross negligence would not be a valid defence, everybody must acquire cognizant of such regulations. This is all and nothing for everybody, particularly bosses. Anybody who doesn't participate in the program security protocols is a potential weakest player. It is indeed everyone for naught if everybody just is really not totally involved. This technique additionally requires that those department (for example, HR, Administrative, and Protection) should believe inside and assist help make it happen.

Pro government techniques - Employees should really be wary of communications from questionable sources. Emails have been used in phishing attempts to obtain permissions as well as cause damage. Employees should be taught on topics such as suspect connections, applications, as well as dubious resources.

Password protection - Using the keyword "password" throughout the password seems to be unacceptable. They must include at least seven character, including uppercase as well as lowercase, numerals, as well as at least one distinct identity (Demir et al. 2019). Avoid making blunders like putting your passwords on even a comment note as well as taping that to the machine.

Physical security - it involves everything including direct access for your industry's IT division to maintaining corporate smart phones as well as computers secured and also visible at any and all moments.

Media manipulation - It's important for enhancing everyone else's awareness of the possible threats, including such attempting to trick staff towards allowing superuser privileges or releasing secret business information.

Presenting company security awareness training properly - This seems to be extremely crucial for top level management. Relatively high must be kept updated, informed of progress made, as well as, in exceptional situations, informed whether any employee or organization also isn't complying.

Keeping the instruction intriguing, if not enjoyable - Conferences as well as workshops at work are generally tedious occurrences which everyone seeks to avoid. Catch attention of the public by exhibiting a funny (but timely) clip or presenting strange and interesting protection experiences. Shouldn't go overboard.

Reviewing and repeating key information - People frequently buy into the notion that when they're doing something before, then don't go through it again. Computer security seems to be a continuous thing which should involve periodic inspections as well as reviews at periodic intervals across the year.

Creating a reinforcing and motivational atmosphere - Encourage ongoing awareness and training by establishing an information security which spans through each and every organizational level as well as throughout the full command structure. Although it isn't important to keep harping upon that matter with staff as well as home consumers, computer security ought towards be an extremely relevant, daily subject.

These are the applicability for the employees which are seems to be relevant for the legislation of the security of cyber in between an organization.


Throughout this study report there are some findings which have been taken from the report, those can be described as the legislation of cyber security will be introduced, and the identification of the legislation of cyber security in between organizations will also be provided. Following that, in this report, the procedure of how such cyber security regulations will be applied throughout an organization's personnel will be provided (Aldawood et al. 2019). Following this section of the research report, the applicability of how cyber security legislation will be applied with an organization's personnel will be explored, with an emphasis on human security. The conclusion will then be crafted with those themes in mind.


For the improvement of the awareness of the legislation of cyber security in an organization, the employees of any organization should maintain some activities. Those are emphasizing computer security inside the organization by including leadership, supporting optimal cyber security solutions, implementing cyber security operations as quickly as feasible, undertake periodic cyber defense certification, as well as establishing cyber security strength and conditioning mandatory.


Throughout this study each and every part of this report have been discussed. The itruction of the need of the cyber security, the connection of the legislation of cyber security with the organization, application of those legislation with the employees of the company, the applicability of those legislation all have been discussed throughout this study. Overall it can be concluded that each and every part of this report has been covered.



Aldawood, H. and Skinner, G., 2019. Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues. Future Internet, 11(3), p.73.

Demir, K.A., Döven, G. and Sezen, B., 2019. Industry 5.0 and human-robot co-working. Procedia computer science, 158, pp.688-695.

Ghafir, I., Saleem, J., Hammoudeh, M., Faour, H., Prenosil, V., Jaf, S., Jabbar, S. and Baker, T., 2018. Security threats to critical infrastructure: the human factor. The Journal of Supercomputing, 74(10), pp.4986-5002.

Ghosh, A., Chakraborty, D. and Law, A., 2018. Artificial intelligence in Internet of things. CAAI Transactions on Intelligence Technology, 3(4), pp.208-218.

Gupta, B.B. ed., 2018. Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press.

Kimani, K., Oduol, V. and Langat, K., 2019. Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, pp.36-49.

Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C. and Bellekens, X., 2021. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105, p.102248.

Lin, T.C., 2019. Artificial intelligence, finance, and the law. Fordham L. Rev., 88, p.531.

Mantelero, A., 2018. AI and Big Data: A blueprint for a human rights, social and ethical impact assessment. Computer Law & Security Review, 34(4), pp.754-772.

Onik, M.M.H., Miraz, M.H. and Kim, C.S., 2018, April. A recruitment and human resource management technique using blockchain technology for industry 4.0. In Smart Cities Symposium 2018 (pp. 1-6). IET.

O'Sullivan, S., Nevejans, N., Allen, C., Blyth, A., Leonard, S., Pagallo, U., Holzinger, K., Holzinger, A., Sajid, M.I. and Ashrafian, H., 2019. Legal, regulatory, and ethical frameworks for development of standards in artificial intelligence (AI) and autonomous robotic surgery. The international journal of medical robotics and computer assisted surgery, 15(1), p.e1968.

Popkova, E.G. and Gulzat, K., 2019, April. Contradiction of the digital economy: public well-being vs. cyber threats. In Institute of Scientific Communications Conference (pp. 112-124). Springer, Cham.

Shiroishi, Y., Uchiyama, K. and Suzuki, N., 2018. Society 5.0: For human security and well-being. Computer, 51(7), pp.91-95.

Stone, R.J., Cox, A. and Gavin, M., 2020. Human resource management. John Wiley & Sons.

Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E. and Markakis, E.K., 2020. A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues. IEEE Communications Surveys & Tutorials, 22(2), pp.1191-1221.

Sun, C.C., Hahn, A. and Liu, C.C., 2018. Cyber security of a power grid: State-of-the-art. International Journal of Electrical Power & Energy Systems, 99, pp.45-56.

Urquhart, L. and McAuley, D., 2018. Avoiding the internet of insecure industrial things. Computer law & security review, 34(3), pp.450-466.

Villaronga, E.F., Kieseberg, P. and Li, T., 2018. Humans forget, machines remember: Artificial intelligence and the right to be forgotten. Computer Law & Security Review, 34(2), pp.304-313.


35% OFF
Get best price for your work
  • 54000+ Project Delivered
  • 500+ Experts 24*7 Online Help

offer valid for limited time only*