Cyber Security and Decision Making
VerifiedAdded on 2023/01/17
|6
|1259
|99
AI Summary
This assignment discusses the importance of cyber security in protecting computer systems from damage or theft of electronic data. It explores the challenges in decision making for cyber security and provides insights on how to overcome delays in decision making. The assignment also highlights the increasing cyber risk and the need for proactive decision making in cyber security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
CYBER OPERATIONS
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
TASK 1............................................................................................................................................1
Critical discussion........................................................................................................................2
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4
INTRODUCTION...........................................................................................................................1
TASK 1............................................................................................................................................1
Critical discussion........................................................................................................................2
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4
INTRODUCTION
Cyber security can be defined as information technology security that protects computer
systems from damage or theft of electronic data, software, hardware (Kott, Swami and West,
2016). Nowadays lack of clarity or understanding is leading to increase in uncertainty in decision
making for cyber security and because of it delay in cyber security is leading to increase of risk
of data theft etc. this assignment will lay emphasis on information environment, decision making
for cyber issues and ways to overcome delay in decision making of cyber security.
TASK 1
It is a kind of situation in which uncertainty is experienced in situational awareness in
various operations. It helps in capturing uncertainty in operations. It is a kind of cyber fog
security approach in which data is distributed into various data fragments and are dispersed
continuously to multiple end users. It helps in providing quick recovery from greater attack but is
also helps in presenting various kinds of technical challenges. Cyber attacks are one of the prime
concerns which is affecting decision making related to all kinds of cyber issues. Today cyber
criminals or black hat hackers focus on blurring the lines on virtual cyber battle field. When
hackers fog up cyber battle field it becomes nearly impossible to identify all kinds of possible
targets. Cyber defence committee tries to conduct a threat assessment in which they try to scale
up potential threat that can happen within nation’s security (Rõigas, 2018). Cyber criminals try to
manipulate the target users and try to conduct a data theft. Today cyber security is one of the
main operational area which is being focused on for waging cyber war as today many black hat
hackers try to break into national computer network for malicious intent like data theft or intent
to destroy files, passwords and many more. Due to this importance and requirement of national
cyber security defence is increasing and is becoming important to focus on strengthening
national cyber security defence.
Cyberspace information environment in which all kinds of digital information is collected,
processed. Today excessive usage of information technology today is increasing security
challenges in many ways and because of which management of cyber security is becoming
difficult due to increasing cyber risk. Due to these increasing risks all kinds of large
organizations, government, investors etc. need to focus on managing cyber risk so that they can
focus on maintaining organizational value and can also protect their data or information in a
better and planned manner. Today risk associated with information environment are more and
1
Cyber security can be defined as information technology security that protects computer
systems from damage or theft of electronic data, software, hardware (Kott, Swami and West,
2016). Nowadays lack of clarity or understanding is leading to increase in uncertainty in decision
making for cyber security and because of it delay in cyber security is leading to increase of risk
of data theft etc. this assignment will lay emphasis on information environment, decision making
for cyber issues and ways to overcome delay in decision making of cyber security.
TASK 1
It is a kind of situation in which uncertainty is experienced in situational awareness in
various operations. It helps in capturing uncertainty in operations. It is a kind of cyber fog
security approach in which data is distributed into various data fragments and are dispersed
continuously to multiple end users. It helps in providing quick recovery from greater attack but is
also helps in presenting various kinds of technical challenges. Cyber attacks are one of the prime
concerns which is affecting decision making related to all kinds of cyber issues. Today cyber
criminals or black hat hackers focus on blurring the lines on virtual cyber battle field. When
hackers fog up cyber battle field it becomes nearly impossible to identify all kinds of possible
targets. Cyber defence committee tries to conduct a threat assessment in which they try to scale
up potential threat that can happen within nation’s security (Rõigas, 2018). Cyber criminals try to
manipulate the target users and try to conduct a data theft. Today cyber security is one of the
main operational area which is being focused on for waging cyber war as today many black hat
hackers try to break into national computer network for malicious intent like data theft or intent
to destroy files, passwords and many more. Due to this importance and requirement of national
cyber security defence is increasing and is becoming important to focus on strengthening
national cyber security defence.
Cyberspace information environment in which all kinds of digital information is collected,
processed. Today excessive usage of information technology today is increasing security
challenges in many ways and because of which management of cyber security is becoming
difficult due to increasing cyber risk. Due to these increasing risks all kinds of large
organizations, government, investors etc. need to focus on managing cyber risk so that they can
focus on maintaining organizational value and can also protect their data or information in a
better and planned manner. Today risk associated with information environment are more and
1
security is less and because of which responsibility on organizations increases in order to
maintain risk associated with cyber security such that cyber attacks can be reduced (Carlsson and
Gustavsson, 2017). It has been observed that today cyber criminals find one or the other way
through which they can breech the security of the organization as a result uncertainty for
decision making associated with cyber security increases. Enterprises or government
continuously focus on threats associated with cyber security and nee to work on those threats of
risk so that network security can be enhanced but as today’s information environment is so
complex and in addition to this issues or risk associated with it are high, there is uncertainty in
decision making.
Increasing cyber risk is increasing demand of proactive decision making for development
of cyber security. Any kind of delay in decision making can increase significant chances of cyber
incidents. However, complexities associated with proactive decision making are high as
organizations need to maintain both internal and external cyber domain environment in order to
enhance security of their resources, data, information, system and many more (Ichimescu and
Ignat, 2018). Many times, there is uncertainty in decision making that whether the decision taken
for cyber issues faced by the organizations and for this they need to continuously bring
improvement within their cyber security by identifying types of threats they can face, potentials
target etc. Cyber decision making done against any kind of cyber operations is quite complex as
there are various things that are required to be focused on such as big data analytics, data
available on cloud and many more.
Critical discussion
From the above discussion it can be said that decision making for cyber security is mostly
bias due to lack of predicting uncertainties of cyber incidents. This biasness in decision making
is based upon focus on the organizations i.e. either organizations focus on enhancing their
performance on all the operations or enhance security of their cyber operations in order to protect
their systems, software’s or data. Due to this there is always uncertainty in decision making of
cyber security because of which delay in decision making increases. Other than this many times
because of uncertainties in consequences of decisions also delays the decision making done by
organizations as a result risk associated with cyber operations increases. These uncertainties can
be removed in many ways. By bringing continuous improvement within cyber operations,
security, assessments, methods etc. other then this by identify all kinds of additional
2
maintain risk associated with cyber security such that cyber attacks can be reduced (Carlsson and
Gustavsson, 2017). It has been observed that today cyber criminals find one or the other way
through which they can breech the security of the organization as a result uncertainty for
decision making associated with cyber security increases. Enterprises or government
continuously focus on threats associated with cyber security and nee to work on those threats of
risk so that network security can be enhanced but as today’s information environment is so
complex and in addition to this issues or risk associated with it are high, there is uncertainty in
decision making.
Increasing cyber risk is increasing demand of proactive decision making for development
of cyber security. Any kind of delay in decision making can increase significant chances of cyber
incidents. However, complexities associated with proactive decision making are high as
organizations need to maintain both internal and external cyber domain environment in order to
enhance security of their resources, data, information, system and many more (Ichimescu and
Ignat, 2018). Many times, there is uncertainty in decision making that whether the decision taken
for cyber issues faced by the organizations and for this they need to continuously bring
improvement within their cyber security by identifying types of threats they can face, potentials
target etc. Cyber decision making done against any kind of cyber operations is quite complex as
there are various things that are required to be focused on such as big data analytics, data
available on cloud and many more.
Critical discussion
From the above discussion it can be said that decision making for cyber security is mostly
bias due to lack of predicting uncertainties of cyber incidents. This biasness in decision making
is based upon focus on the organizations i.e. either organizations focus on enhancing their
performance on all the operations or enhance security of their cyber operations in order to protect
their systems, software’s or data. Due to this there is always uncertainty in decision making of
cyber security because of which delay in decision making increases. Other than this many times
because of uncertainties in consequences of decisions also delays the decision making done by
organizations as a result risk associated with cyber operations increases. These uncertainties can
be removed in many ways. By bringing continuous improvement within cyber operations,
security, assessments, methods etc. other then this by identify all kinds of additional
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
requirements that are required to enhance cyber security these uncertainties in decision making
can be reduced. Other that this by providing training to people can also help in enhancing
decision making.
CONCLUSION
From the above assignment it has been summarized that Cyber security is one of the most
factor which is required to be focused on by the organizations in order to increase security of
their computer systems from damage or theft of electronic data, software, hardware. It has been
analysed that cyber attacks on virtual battle field are increasing continuously because of which
cyber security requirements are increasing and due to these growing requirements and increasing
number of risk it is becoming difficult for the organizations to enhance security of their virtual
environment data. As a result of this uncertainty in decision making for cyber security is
increasing and it is becoming difficult for organizations to overcome delay in decision making of
cyber security.
3
can be reduced. Other that this by providing training to people can also help in enhancing
decision making.
CONCLUSION
From the above assignment it has been summarized that Cyber security is one of the most
factor which is required to be focused on by the organizations in order to increase security of
their computer systems from damage or theft of electronic data, software, hardware. It has been
analysed that cyber attacks on virtual battle field are increasing continuously because of which
cyber security requirements are increasing and due to these growing requirements and increasing
number of risk it is becoming difficult for the organizations to enhance security of their virtual
environment data. As a result of this uncertainty in decision making for cyber security is
increasing and it is becoming difficult for organizations to overcome delay in decision making of
cyber security.
3
REFERENCES
Books and journals
Carlsson, A. and Gustavsson, R., 2017, October. The art of war in the cyber world. In 2017 4th
International Scientific-Practical Conference Problems of Infocommunications. Science
and Technology (PIC S&T) (pp. 42-44). IEEE.
Ichimescu, C. and Ignat, C., 2018. CRISIS MANAGEMENT IN THE CYBERSECURITY ERA.
In International Scientific Conference" Strategies XXI" (Vol. 2, pp. 99-105). " Carol I"
National Defence University.
Kott, A., Swami, A. and West, B.J., 2016. The fog of war in cyberspace. Computer. 49(11).
pp.84-87.
Rõigas, H., 2018. Cyber War in Perspective: Lessons from the Conflict in Ukraine. In A Civil-
Military Response to Hybrid Threats (pp. 233-257). Palgrave Macmillan, Cham.
4
Books and journals
Carlsson, A. and Gustavsson, R., 2017, October. The art of war in the cyber world. In 2017 4th
International Scientific-Practical Conference Problems of Infocommunications. Science
and Technology (PIC S&T) (pp. 42-44). IEEE.
Ichimescu, C. and Ignat, C., 2018. CRISIS MANAGEMENT IN THE CYBERSECURITY ERA.
In International Scientific Conference" Strategies XXI" (Vol. 2, pp. 99-105). " Carol I"
National Defence University.
Kott, A., Swami, A. and West, B.J., 2016. The fog of war in cyberspace. Computer. 49(11).
pp.84-87.
Rõigas, H., 2018. Cyber War in Perspective: Lessons from the Conflict in Ukraine. In A Civil-
Military Response to Hybrid Threats (pp. 233-257). Palgrave Macmillan, Cham.
4
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.