{"title":"Legal Regulation of Insurance against Cyber-Attack Risks","authors":"","doi":"10.62271/pjc.16.2.585.600","DOIUrl":null,"url":null,"abstract":"The Internet has recently witnessed significant growth to become an\nimportant part of our daily lives, as it has grown to become the main part of our\nbusiness as well. Nowadays, anything we do on smart devices can be seen by\nothers, either with our knowledge or consent or without, it may seem obvious, as\nwe can share our work on social networking sites. At first glance, however, it\nappears to represent a serious threat, including privacy breaches and data theft,\nand threats become even more important when these breaches directly affect\nbusinesses, customers, and the general public. It became necessary to protect the\nrequirements of this development from those cyber risks to minimize the negative\neffects that these attacks and intrusions can have on facilities and infrastructure.\nThe world has witnessed a technical development in the use of Internet devices\nand electronic networks, and this use has exposed these networks and devices to\nthe risks of cyberattacks, data breaches, obtaining personal, financial, and\ncommercial infor","PeriodicalId":516769,"journal":{"name":"Pakistan Journal of Criminology","volume":"84 9","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Pakistan Journal of Criminology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.62271/pjc.16.2.585.600","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet has recently witnessed significant growth to become an
important part of our daily lives, as it has grown to become the main part of our
business as well. Nowadays, anything we do on smart devices can be seen by
others, either with our knowledge or consent or without, it may seem obvious, as
we can share our work on social networking sites. At first glance, however, it
appears to represent a serious threat, including privacy breaches and data theft,
and threats become even more important when these breaches directly affect
businesses, customers, and the general public. It became necessary to protect the
requirements of this development from those cyber risks to minimize the negative
effects that these attacks and intrusions can have on facilities and infrastructure.
The world has witnessed a technical development in the use of Internet devices
and electronic networks, and this use has exposed these networks and devices to
the risks of cyberattacks, data breaches, obtaining personal, financial, and
commercial infor