{"id":58,"date":"2022-11-13T13:39:22","date_gmt":"2022-11-13T18:39:22","guid":{"rendered":"https:\/\/blogs.shu.edu\/policy-government-security\/?page_id=58"},"modified":"2022-11-17T13:49:21","modified_gmt":"2022-11-17T18:49:21","slug":"interim-reports","status":"publish","type":"page","link":"https:\/\/blogs.shu.edu\/policy-government-security\/interim-reports\/","title":{"rendered":"Interim Report 1"},"content":{"rendered":"<h1><span style=\"text-decoration: underline\"><em><b data-stringify-type=\"bold\">Cybersecurity<\/b>\u00a0<b data-stringify-type=\"bold\">and its Trends:<\/b><\/em><\/span><\/h1>\n<p>State and non-State actors use digital technology to achieve economic and military advantage, foment instability, and increase control over\u00a0<a class=\"c-link\" href=\"https:\/\/csrc.nist.gov\/glossary\/term\/cyberspace\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/csrc.nist.gov\/glossary\/term\/cyberspace\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">cyberspace<\/a>, sometimes faster than our ability to understand the implications and neutralize the threat.\u00a0<a class=\"c-link\" href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/tips\/ST04-001\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.cisa.gov\/uscert\/ncas\/tips\/ST04-001\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">Cybersecurity<\/a>\u00a0protects all categories of data from theft and damage, including sensitive data,\u00a0<a class=\"c-link\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/personally-identifiable-information-PII#:~:text=Personally%20identifiable%20information%20(PII)%20is,anonymous%20data%20is%20considered%20PII.\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/personally-identifiable-information-PII#:~:text=Personally%20identifiable%20information%20(PII)%20is,anonymous%20data%20is%20considered%20PII.\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">PII<\/a>,\u00a0<a class=\"c-link\" href=\"https:\/\/www.techtarget.com\/searchhealthit\/definition\/personal-health-information#:~:text=Protected%20health%20information%20(PHI)%2C,an%20individual%20and%20determine%20appropriate\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.techtarget.com\/searchhealthit\/definition\/personal-health-information#:~:text=Protected%20health%20information%20(PHI)%2C,an%20individual%20and%20determine%20appropriate\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">PHI<\/a>, intellectual property, and governmental information systems. Poor\u00a0<a class=\"c-link\" href=\"https:\/\/www.unodc.org\/e4j\/en\/cybercrime\/module-1\/key-issues\/global-connectivity-and-technology-usage-trends.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.unodc.org\/e4j\/en\/cybercrime\/module-1\/key-issues\/global-connectivity-and-technology-usage-trends.html\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">global connectivity<\/a>\u00a0and reliance on\u00a0<a class=\"c-link\" href=\"https:\/\/www.citrix.com\/solutions\/digital-workspace\/what-is-a-cloud-service.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.citrix.com\/solutions\/digital-workspace\/what-is-a-cloud-service.html\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">cloud services<\/a>\u00a0to store data can result in the risk of cyber-attacks.<\/p>\n<h1><span style=\"text-decoration: underline\"><em><b data-stringify-type=\"bold\">Consumer Data and Privacy<\/b><\/em><\/span><\/h1>\n<p><a class=\"c-link\" href=\"https:\/\/www.techtarget.com\/searchdatamanagement\/definition\/consumer-privacy\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.techtarget.com\/searchdatamanagement\/definition\/consumer-privacy\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">Consumer privacy<\/a>\u00a0involves the handling and protection of sensitive PII provided through the course of everyday interactions. The internet has evolved into a medium of commerce, making consumer data privacy a growing concern. When data is\u00a0<a class=\"c-link\" href=\"https:\/\/hnksolicitors.com\/news\/what-constitutes-misuse-of-data\/#:~:text=Data%20misuse%20occurs%20when%20companies,intentional%20action%20of%20the%20company.\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/hnksolicitors.com\/news\/what-constitutes-misuse-of-data\/#:~:text=Data%20misuse%20occurs%20when%20companies,intentional%20action%20of%20the%20company.\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">misused<\/a>\u00a0or\u00a0<a class=\"c-link\" href=\"https:\/\/cepr.org\/voxeu\/columns\/inadequate-data-protection-threat-economic-and-national-security\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/cepr.org\/voxeu\/columns\/inadequate-data-protection-threat-economic-and-national-security\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">inadequately protected<\/a>, identity theft, financial fraud, and other costly problems occur. As consumers adopt digital technology, the data they generate creates the opportunity for enterprises to improve consumer engagement and increase their responsibility to keep consumer data safe, including\u00a0<a class=\"c-link\" href=\"https:\/\/radar.com\/blog\/location-data-privacy-checklist\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/radar.com\/blog\/location-data-privacy-checklist\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">location-tracking and other kinds of PII<\/a>, which are immensely valuable. Consumers and their governments are becoming more\u00a0<a class=\"c-link\" href=\"https:\/\/leaksid.com\/how-to-protect-customer-pii-share-with-third-parties\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/leaksid.com\/how-to-protect-customer-pii-share-with-third-parties\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">intentional<\/a>\u00a0about what types of data they share, and with whom, and are more likely to share only what\u2019s necessary.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cms-wp.bigcommerce.com\/wp-content\/uploads\/2019\/11\/NCSAM_Blog1_CD366_SJ.jpg\" alt=\"Consumer Data Privacy Regulations\" \/><\/p>\n<h1><span style=\"text-decoration: underline\"><em><b data-stringify-type=\"bold\">Current National Data Privacy Laws<\/b><\/em><\/span><\/h1>\n<p>The U.S. currently has disparate federal and state laws, which look at and regulate specific types of data (credit, health information, or specific populations). Europe has a comprehensive privacy law (<a class=\"c-link\" href=\"https:\/\/gdpr.eu\/what-is-gdpr\/#:~:text=The%20General%20Data%20Protection%20Regulation,to%20people%20in%20the%20EU.\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/gdpr.eu\/what-is-gdpr\/#:~:text=The%20General%20Data%20Protection%20Regulation,to%20people%20in%20the%20EU.\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">GDPR<\/a>) that requires companies to request permission to share user data and gives individuals rights to access, delete, and control the use of their data. Only three U.S. states have comprehensive data privacy laws,\u00a0<a class=\"c-link\" href=\"https:\/\/iapp.org\/resources\/article\/ccpa-cpra-related-legislation-tracker\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/iapp.org\/resources\/article\/ccpa-cpra-related-legislation-tracker\/\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">California<\/a>,\u00a0<a class=\"c-link\" href=\"https:\/\/pro.bloomberglaw.com\/brief\/what-is-the-vcdpa\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/pro.bloomberglaw.com\/brief\/what-is-the-vcdpa\/\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">Virginia<\/a>, and\u00a0<a class=\"c-link\" href=\"https:\/\/us.eversheds-sutherland.com\/mobile\/NewsCommentary\/Legal-Alerts\/243354\/Colorados-new-privacy-law-How-it-stacks-up-against-other-US-privacy-laws\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/us.eversheds-sutherland.com\/mobile\/NewsCommentary\/Legal-Alerts\/243354\/Colorados-new-privacy-law-How-it-stacks-up-against-other-US-privacy-laws\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">Colorado<\/a>. Under these laws, a company must notify the consumer of data sales, and allow the option to refuse, delete, correct, or move the data.<\/p>\n<h1><span style=\"text-decoration: underline\"><em><b data-stringify-type=\"bold\">Cyber-Warfare, Data, and National Security<\/b><\/em><\/span><\/h1>\n<p>The U.S, among other countries, has\u00a0<a class=\"c-link\" href=\"https:\/\/public-assets.graphika.com\/reports\/graphika_stanford_internet_observatory_report_unheard_voice.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/public-assets.graphika.com\/reports\/graphika_stanford_internet_observatory_report_unheard_voice.pdf\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">weaponized social media<\/a>, artificial online profiles, and\u00a0<a class=\"c-link\" href=\"https:\/\/www.theguardian.com\/technology\/2020\/jan\/13\/what-are-deepfakes-and-how-can-you-spot-them\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.theguardian.com\/technology\/2020\/jan\/13\/what-are-deepfakes-and-how-can-you-spot-them\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">deepfakes<\/a>\u00a0with the global popularization of social media<b data-stringify-type=\"bold\">.\u00a0<\/b>Viewpoints asserted by personas of certain demographics or political philosophies may be more appealing to targets of influence than a government\u2019s viewpoint. Additionally, fear of data collection by other countries has drawn concerns in recent years. Exemplified by\u00a0<a class=\"c-link\" href=\"https:\/\/www.businessinsider.com\/us-government-agencies-have-banned-tiktok-app-2020-2\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.businessinsider.com\/us-government-agencies-have-banned-tiktok-app-2020-2\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">TikTok<\/a>, which has been\u00a0<a class=\"c-link\" href=\"https:\/\/www.wsj.com\/articles\/u-s-military-bans-tiktok-over-ties-to-china-11578090613?mod=article_inline\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.wsj.com\/articles\/u-s-military-bans-tiktok-over-ties-to-china-11578090613?mod=article_inline\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">banned by the US military<\/a>, the possibility of data corruption by governments has risen over the years. In response to these issues, more internet regulation has been created around national security concerns, privacy laws, antitrust, and data protection. As a result, the internet has become less central over time. This trend, known as the\u00a0<a class=\"c-link\" href=\"https:\/\/www.verdict.co.uk\/what-is-the-splinternet-and-why-does-it-matter\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.verdict.co.uk\/what-is-the-splinternet-and-why-does-it-matter\/\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">Splinternet<\/a>, leads to a lack of shared information and\u00a0<a class=\"c-link\" href=\"https:\/\/freedomhouse.org\/report\/freedom-net\/2021\/global-drive-control-big-tech\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/freedomhouse.org\/report\/freedom-net\/2021\/global-drive-control-big-tech\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">global internet freedom<\/a>, and an increase in\u00a0<a class=\"c-link\" href=\"https:\/\/www.sciencedirect.com\/topics\/psychology\/digital-surveillance\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.sciencedirect.com\/topics\/psychology\/digital-surveillance\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">digital surveillance<\/a>.<\/p>\n<h1><span style=\"text-decoration: underline\"><em><b data-stringify-type=\"bold\">Cybercrime<\/b><\/em><\/span><\/h1>\n<p><a class=\"c-link\" href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/cybercriminals\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/cybercriminals\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">Cybercriminals<\/a>\u00a0are becoming more knowledgeable, strategic, and organized, leading to an increase in the number of\u00a0<a class=\"c-link\" href=\"https:\/\/www.simplilearn.com\/tutorials\/cyber-security-tutorial\/types-of-cyber-attacks\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.simplilearn.com\/tutorials\/cyber-security-tutorial\/types-of-cyber-attacks\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">digital attacks<\/a>\u00a0on individuals, businesses, and governments. Over\u00a0<a class=\"c-link\" href=\"https:\/\/therecord.media\/fbi-6-9-billion-lost-through-internet-crimes-in-2021\/#:~:text=Nearly%20%247%20billion%20was%20lost,FBI's%20annual%20Internet%20Crime%20Report.\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/therecord.media\/fbi-6-9-billion-lost-through-internet-crimes-in-2021\/#:~:text=Nearly%20%247%20billion%20was%20lost,FBI's%20annual%20Internet%20Crime%20Report.\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">$6.9 billion were lost due to cybercrime in 2021<\/a>\u00a0. Organized crime syndicates have consistently extorted companies and individuals and have taken billions of dollars, making headlines in the media. Even traditional crime syndicates like drug cartels have delved into cybercrime to hack governments and steal money.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity\u00a0and its Trends: State and non-State actors use digital technology to achieve economic and military advantage, foment instability, and increase control over\u00a0cyberspace, sometimes faster than&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/blogs.shu.edu\/policy-government-security\/interim-reports\/\">Continue Reading<span class=\"screen-reader-text\">Interim Report 1<\/span><\/a><\/div>\n","protected":false},"author":5455,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[],"tags":[],"class_list":["post-58","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/58","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/users\/5455"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/comments?post=58"}],"version-history":[{"count":6,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/58\/revisions"}],"predecessor-version":[{"id":194,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/58\/revisions\/194"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/media?parent=58"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/categories?post=58"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/tags?post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}