{"id":284,"date":"2023-01-30T16:46:21","date_gmt":"2023-01-30T16:46:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/pasan001\/?p=284"},"modified":"2023-01-30T16:46:21","modified_gmt":"2023-01-30T16:46:21","slug":"journal-entry-4","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/pasan001\/2023\/01\/30\/journal-entry-4\/","title":{"rendered":"Journal Entry #4"},"content":{"rendered":"\n<p>There are a number of differences between the cybersecurity risks faced by the United States and other countries. According to Cybersecurity Ventures, global spending on cybersecurity will reach $1 trillion by 2021, with the United States accounting for almost a third of this amount. This is one significant difference. Since there has been such a high degree of investment, US businesses are often better prepared to handle cyber attacks than other foreign countries. However, I will be comparing the U.S. and Russia because both countries go way back in competition of cybersecurity states- with the U.S. holding Russia responsible for most system attacks.<\/p>\n\n\n\n<p>Additionally, US businesses are also more appealing targets for hackers, and as a result, they are frequently targeted compared to businesses in other nations. In the US, there are many laws and regulations managing data security, including HIPAA and GDPR. This is another area of distinction.These rules provide strict standards for the protection of personal data, making it more difficult for hackers to gain access to confidential data. Inversely, several other nations have significantly weaker data protection rules, which means that they might be less effective in preventing or punishing hacker behavior. For example, a cyberattack in November 2021 targeted important buildings and infrastructure across the US. Several major companies were affected by ransomware, including Colonial Pipeline, which operates a major oil pipeline.As a result, about 58 percent of digital security companies have their offices there, and they are constantly looking for new strategies to defend against the most recent cyberattacks. However, The United States blames Russia for cyber threats against computer routers, firewalls, and other administrative equipment used by businesses, government organizations, and suppliers of essential infrastructure all around the world. For example, In 2016, Russia was accused by the American intelligence services of being involved in the presidential election through hacking and a concerted marketing campaign in support of Donald Trump. Despite frequently receiving criticism from their political rivals for engaging in cyber attacks, it is reasonable to assume that they are also aware of the need to defend themselves from similar threats and risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a number of differences between the cybersecurity risks faced by the United States and other countries. According to Cybersecurity Ventures, global spending on cybersecurity will reach $1 trillion by 2021, with the United States accounting for almost a third of this amount. This is one significant difference. Since there has been such a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pasan001\/2023\/01\/30\/journal-entry-4\/\">Read More<\/a><\/div>\n","protected":false},"author":25759,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts\/284"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/users\/25759"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts\/284\/revisions"}],"predecessor-version":[{"id":285,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts\/284\/revisions\/285"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/media?parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/categories?post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/tags?post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}