EVALUATING THE ROLE OF INTERNATIONAL ORGANIZATIONS IN THE GLOBAL CYBER SECURITY REGULATIONS

EVALUATING THE ROLE OF INTERNATIONAL ORGANIZATIONS IN THE GLOBAL CYBER SECURITY REGULATIONS

EVALUATING THE ROLE OF INTERNATIONAL ORGANIZATIONS IN THE GLOBAL CYBER SECURITY REGULATIONS

AUTHOR – GOKUL PRASAD S, ASSISTANT PROFESSOR AT THE TAMIL NADU DR AMBEDKAR LAW UNIVERSITY

BEST CITATION – GOKUL PRASAD S, EVALUATING THE ROLE OF INTERNATIONAL ORGANIZATIONS IN THE GLOBAL CYBER SECURITY REGULATIONS, ILE MULTIDISCIPLINARY JOURNAL, 4 (2) OF 2025, PG. 127-139, APIS – 3920-0007 | ISSN – 2583-7230.

ABSTRACT:

                A great number of specialists and scholars argue that over the past few decades, wireless connectivity systems and technologies have been subjected to numerous cyber-attacks. These attacks were aimed at both commercial and governmental companies. As information technology advanced, the topic of cyber security law appeared to be an appealing and complex area of legislation. This study aims to enumerate the various threats in the cyber domain and ways to mitigate them. The global economy demands the establishment of robust legal and regulatory frameworks which address the growing concerns over online fraud, data integrity and intellectual property rights. It also looks at security from a worldwide perspective as well as the various types of cybercrime. Cyber security is increasingly used to secure not just an individual’s workstation but products that are based on their own mobile devices, (tablets, mobile phones) which have become important tools for the transfer of information, as of the recent technological advancements and an expansion of internet access. 3. Any future computer security research must be collaborative between the government, academia, and business sectors in order to address the new threats facing the computer industry.

KEY WORDS: Mobile Device Security, Cyber security Law and Regulation, Cyber Threats and Attacks, Wireless Connectivity Security, Network Vulnerabilities Legal Aspects Of Cyber security.