User:Ncc011/sandbox

Cyber Security Laws GRAMM LEACH BILLEY ACT (ALSO KNOWN AS GLBA) OF 1999 This law is for companies that have access to private and personal financial info. This law includes standards for who has access to it as well as how it is stored and how it is collected. As these agencies hold a lot of info that must be kept private, cyber sec pros are often hired in order to input measures that will protect the info and to make sure that no risks or threats occur.

CYBER SECURITY INFORMATION SHARING ACT (ALSO KNOWN AS CISA) OF 2015 This cyber security law works with tech companies and the gov’t to share data so that any threats can be identified sooner and dealt with more efficiently. This act is key for companies that deal with a large amount of personal data. It is key to cyber sec pros as they are currently employed within these fields. And, therefore will have to have the knowledge of how to respond to threats that arise.

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (ALSO KNOWN AS HIPPA) OF 1996 This cyber security law applies to companies that have access to sensitive medical info – such as a hospital or clinic. Within the law, the medical institution will have to comply by stating how the info is shared and stored. This is key to those who that work in a cyber sec company. Especially those that are out sourced for work in a medical institution. Types of Cyber Crimes Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. Usually, the cyberstalker knows their victim and makes the person feel afraid or concerned for their safety.

Hacking: Criminal hacking is the act of gaining unauthorized access to data in a computer or network. Exploiting weaknesses in these systems, hackers steal data ranging from personal information and corporate secrets to government intelligence. Hackers also infiltrate networks to disrupt operations of companies and governments. Computer and network intrusions cost billions of dollars annually, according to the FBI.

Child pornography and Abuse: Child Abuse and Pornography: In recent years the Internet has been widely used to sexually abuse children around the world. This is also a type of cyber crime in which criminals solicit minors through chat rooms for the purpose of child pornography. Every nation’s Cybersecurity department spends a lot of time monitoring chat rooms frequented by children in hopes of reducing and preventing abuse and solicitation of minors.

Identity Theft: This has become a major problem for people who use the Internet for cash transactions and banking services. In this cybercrime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card, and other confidential information to divert money or buy things online on behalf of the victim. It can result in significant financial loss for the victim and even spoil the victim’s credit history.