2018
DOI: 10.1016/j.clsr.2018.04.009
|View full text |Cite
|
Sign up to set email alerts
|

Patching the patchwork: appraising the EU regulatory framework on cyber security breaches

Abstract: Breaches of security, a.k.a. security and data breaches, are on the rise, one of the reasons being the well-known lack of incentives to secure services and their underlying technologies, such as cloud computing. In this article, I question whether the patchwork of six EU instruments addressing breaches (Framework Directive, e-Privacy Directive, eIDAS Regulation, PSD2, GDPR, NIS Directive) is helping to prevent or mitigate breaches as intended. At a lower level of abstraction, the question concerns appraising t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(3 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Organizations must have a clearly defined security incident response plan, which details the steps to be taken in the event of incidents being discovered. These steps may include isolating compromised systems, collecting forensic evidence, notifying relevant authorities or service providers, and implementing immediate repairs to prevent further spread of the incident (Porcedda, 2018). In addition to incident response, organizations must have recovery plans that detail the steps to be taken to bring the system back to normal after an incident.…”
Section: Key Elements Of Information Security In a Business Contextmentioning
confidence: 99%
“…Organizations must have a clearly defined security incident response plan, which details the steps to be taken in the event of incidents being discovered. These steps may include isolating compromised systems, collecting forensic evidence, notifying relevant authorities or service providers, and implementing immediate repairs to prevent further spread of the incident (Porcedda, 2018). In addition to incident response, organizations must have recovery plans that detail the steps to be taken to bring the system back to normal after an incident.…”
Section: Key Elements Of Information Security In a Business Contextmentioning
confidence: 99%
“…Porcedda 31 examined aspects of this problem with a review of various European data protection legislation and identified a need to describe more than just ‘breaches’. The author defined breaches as being comprised of ‘events’, leading to … destruction , loss , or disclosure of data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Security requirements also vary considerably; for example, there is a significant difference in the level of security and data protection requirements for different types of devices. This raises the question of whether the services concerned can becalled telecommunications services and whether they should be regulated within a regulatory framework for telecommunications [14].…”
Section: Literature Reviewmentioning
confidence: 99%