The internet and the proliferation of computer technology
have sprouted new opportunities for those who would engage in illegal activity.
The new technology has also generated new varieties of criminal activity. It is
also evident that legal systems that are relied on to combat criminal
activities are not adequately equipped to deal with cybercrimes. The law takes
a long time to catch up with new strains of criminal abuse. Not only governments,
corporations and businesses are targeted by the new brand of criminals but also
individuals. Because of these developments, individuals must reassess their
understanding of what constitutes property and how even traditional items of
property such as money and land are increasingly represented through the new
technology. They must then assess the new risks that technology has created
that will impact their property and take measures to protect that property.
In the following paragraphs, obtained from Mondaq.com, Stuart
Mort, Global Head of Consulting & Chief Security Officer of Law in Order
answers the question:
‘How should people increase their knowledge about data
protection and IT security?’
This is a great question, and this
answer might seem a little left field. Fundamentally it is to understand the
risk equation by playing through scenarios. If I have an 'asset' (as an
example, an email is an information asset), what is it 'worth', what can happen
to it (the threat), how likely is that to happen, what would it mean if it did
happen (the impact) and therefore, how can I reduce/remove those factors?
We do this every day. Crossing a
road is a great example. You are the asset, you could get injured, it is likely
to happen with fast-moving cars, less likely on a quiet road and we reduce the
risk by using a proper crossing.
Applying this to your work laptop -
it could get stolen/lost, it is likely as it is carried between work and home
every day, it would significantly impact Law in Order as it stores data on
employees' and customers' information. I can reduce the risk by never leaving
it in the car unattended, ensuring that all data is encrypted and always
screen-locking.
U K Menon
No comments:
Post a Comment
I would love to hear your comments.