.

Tuesday, May 5, 2020

Cyber Security Risk and Attacks Free Samples -Myassignmenthelp.com

Question: Discuss about the Challenges in Cyber Security in Business. Answer: Introduction Computer systems and networks are used in every business and industry all across the globe. There are several advantages that are offered because of the services that are offered by these systems. However, there are also some of the challenges that have been observed in the world of cyber security because of the threats, attacks and vulnerabilities that are associated with it. The challenges that are related with cyber security have been discussed in the report. Cyber Security Challenges Security Risks and Attacks There are many risks and attacks that come up because of the security issues that are related with the cyber space. The information that is present in the cyber world needs to be protected and the information has certain properties that are required to be safeguarded. Some of these properties include confidentiality, availability and integrity. However, there are attacks and risks that are executed by the attackers that violate these properties of the information and cause a lot of damage. The confidentiality of the information is hampered by the attacks such as breaching of the information. In these sorts of attacks, the access points that are present in the cyber space in the services and applications are used and it is these access points that are utilized for the execution of the attack. Some other attacks that impact the confidentiality of the information include unauthorized tracking and eavesdropping of the network (Lipman, 2017). Integrity is another property of the information that is equally important. Attacks that are probable from the point of view of cyber security have an impact on the information integrity as well. The messages and media contents that are exchanged between the parties present in the cyber space are acquired by the attackers and these contents are then acquired and modified without the permission and authority to do so (Kern, 2016). There are certain system qualities that are desired and expected by the users and customers from the services and applications that are present in the cyber space. One of the significant and most important qualities is the availability (Acs, 2016). Availability of the application and services is necessary so that the users may access it and the attackers target this quality so that the availability is hampered. Attacks such as flooding and impersonation attacks are executed with the motive to impact the availability fo the application and the information (Fischer, 2016). Costs and Budget Related Issues In order to make sure that the security risks and attacks do not take place, there are several mechanisms that can be implemented. Some of these mechanisms can be done by the organizations by strengthening their administrative strategies and policies. It can be done by revision of the strategies and enhanced monitoring by the existing management and leadership. At times, it becomes necessary to have the presence of an expert that may or may not be present in the organization (Unidir, 2011). In case of the need to externally hire the expert, there are costs that are required to be spent. Apart from these administrative changes, there are many tools and technical controls that can be applied to strengthen the security infrastructure. However, small scale firms at times cannot bear the cost that comes along with these tools which results in the presence of weak security architecture (Fireye, 2016). Regulation and Compliance Issues There are many regulatory and legal security risks that are also present in association with the cyber security. For example, a business organization that works in the health care domain will deal with the cyber services and applications around health care. Any of the security risk or attack on the information related with these applications will have some sever consequences in terms of legal obligations. It is because of the reason that the health information is private and confidential in nature and it cannot be obtained or accessed without the permission of the information owner (Diplomacy, 2017). In case of the failure to do so, there may be legal risks and obligations that may come up. Also, there may be issues of non-compliance that may be observed in terms of quality and regulatory standards and policies. The adherence to the standards and compliance is required to be maintained so that these issues in association with cyber security can be avoided (Deshpande, 2014). Change in Technology Cyber world is experiencing a lot many changes and these changes are quick in nature. A particular technology that may be present or used at a certain instance may become obsolete after a certain period of time. Such technological changes are required to be handled and the same holds true in case of cyber security as well. Organizations set up a number of protection mechanisms so as to control and put a check on the security issues and attacks. In case the protection mechanisms that are applied are outdated, the purpose of the same stands void and the risks and attacks may occur (Purdy, 2016). Ownership and Responsibility There is a lot of information that is present in the cyber world. This information belongs to varied data sources and data owners. Application of controls and protection mechanisms on these data sets is difficult as a generalized control cannot be applied on all the categories of information. There are issues around authority and ownership that come up that are required to be handled so as to maintain the security of the information. Cyber security also faces issues around the responsibility of the security managers and experts. It is these entities that are responsible for assuring that the security is maintained. However, the inability to do so will lead to poor state of cyber security. There may also be lack of skills and abilities that may be witnessed in this regard (Dsci, 2017). Learning Experience With the aid of the research that was carried out on the challenges that are associated with the cyber security in business, there were a number of points that could be gained and understood through the medium of the research. It added to the knowledge regarding the various types of the issues and attacks that may take place in association with cyber security and the probable impacts that it may have. It also allowed a deeper understanding of the precautions and measures that the organizations may take so that these attacks and risks can be prevented and controlled. The information collected for carrying out the research was done from a number of different sources. It led to the enhancement of knowledge in the field and also significantly added to the knowledge base in the field. Value of the Experience The research done on the topic as challenges in cyber security in business added a great value in terms of the learning and the overall experience that was involved. The experience not only allowed the enhancement of the knowledge base in association with the research topic but also provided the ability to understand the research methodologies and the data collection process. The data collection process involved a number of different data sources which led to the exposure in terms of details and information around the topic. Usefulness of the Learning Process The information around cyber security and the challenges that are associated with the same is extremely essential. It is because of the reason that there are a number of new cyber security challenges that are emerging and being introduced with each passing day. Inadequate information around the cyber security challenges leads to the increase in the probability of the attacks and may also cause significant damage to the parties that are impacted. The learning process therefore allowed addition of the significant knowledge in terms of the course and the career prospects. There are several career options that are now available in the field of cyber security. New roles are being defined in the area and there are several employment opportunities that are being generated as well. The learning process therefore allows the exposure and opening of such new vistas and plethora of opportunities. Also, in terms of general perspective, the learning process enabled understanding of the information security policies and principles that shall be followed so that the cyber security risks and attacks may be avoided. Conclusion Cyber space is being utilized by almost all the business sectors in the present times and there are several benefits that are caused by the same. However, there are many challenges that are also present in association with the cyber security in terms of the security threats and attacks, ownership issues, technological changes, budget issues and legal and regulatory issues. These issues are required to be handled so that the basic aim and purpose of the cyber services and application is achieved. Presence of all of these challenges leads to deterioration of the services which causes lack of trust among the customers and also leads to poor market performance. It is because of all these reasons that the challenges that are present shall be handled through effective planning and control. It shall also be made sure that the technical and administrative controls are applied on the security infrastructure. References Acs (2016). Cybersecurity Threats Challenges Opportunities. [online] Available at: https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Cybersecurity_Guide.pdf [Accessed 25 May 2017]. Deshpande, V. (2014). Cyber Security: Strategy to Security Challenges- A Review. [online] Available at: https://www.ijeit.com/Vol%203/Issue%209/IJEIT1412201403_47.pdf [Accessed 25 May 2017]. Diplomacy (2017). Cybersecurity: Issues, Actors and Challenges. [online] Available at: https://www.diplomacy.edu/sites/default/files/Cybersecurity_briefing_note_final.pdf [Accessed 25 May 2017]. Dsci (2017). Cyber Security Challenges | Data Security Council of India. [online] Dsci.in. Available at: https://www.dsci.in/taxonomypage/241 [Accessed 25 May 2017]. Fireeye (2016). Cybersecurity Challenges, Risks, Trends, and Impacts: Survey Findings. [online] Available at: https://s3.amazonaws.com/files.technologyreview.com/whitepapers/Cybersecurity-Challenges-Survey-Findings.pdf [Accessed 25 May 2017]. Fischer, E. (2016). Cybersecurity Issues and Challenges: In Brief. [online] Available at: https://fas.org/sgp/crs/misc/R43831.pdf [Accessed 25 May 2017]. Kern, C. (2016). 6 Cybersecurity Challenges You Must Address For 2017. [online] Healthitoutcomes.com. Available at: https://www.healthitoutcomes.com/doc/cybersecurity-challenges-you-must-address-for-0001 [Accessed 25 May 2017]. Lipman, P. (2017). The Cybersecurity Challenges Facing State and Local Governments. [online] Infosecurity Magazine. Available at: https://www.infosecurity-magazine.com/opinions/cybersecurity-challenges-state/ [Accessed 25 May 2017]. Purdy, A. (2016). The Global Cyber Security Challenge. [online] Available at: https://www-file.huawei.com/-/media/CORPORATE/PDF/cyber-security/the-global-cyber-security-challenge-en.pdf [Accessed 25 May 2017]. Unidir (2011). Challenges in Cybersecurity Risks, Strategies, and Confidence-Building. [online] Available at: https://www.unidir.org/files/medias/pdfs/conference-report-eng-0-373.pdf [Accessed 25 May 2017].

1 comment:

  1. Hotel, Casino & RV Park - Mapyro
    View detailed hotel prices, 의왕 출장마사지 photos, videos and map of Hotel, 김해 출장안마 Casino & RV Park 출장마사지 in 상주 출장샵 Rockford, Illinois. 상주 출장샵 Hotel is found in Rockford,

    ReplyDelete