logo

Cyber Security and Decision Making

   

Added on  2023-01-17

6 Pages1259 Words99 Views
CYBER OPERATIONS
Cyber Security and Decision Making_1
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
TASK 1............................................................................................................................................1
Critical discussion........................................................................................................................2
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4
Cyber Security and Decision Making_2
INTRODUCTION
Cyber security can be defined as information technology security that protects computer
systems from damage or theft of electronic data, software, hardware (Kott, Swami and West,
2016). Nowadays lack of clarity or understanding is leading to increase in uncertainty in decision
making for cyber security and because of it delay in cyber security is leading to increase of risk
of data theft etc. this assignment will lay emphasis on information environment, decision making
for cyber issues and ways to overcome delay in decision making of cyber security.
TASK 1
It is a kind of situation in which uncertainty is experienced in situational awareness in
various operations. It helps in capturing uncertainty in operations. It is a kind of cyber fog
security approach in which data is distributed into various data fragments and are dispersed
continuously to multiple end users. It helps in providing quick recovery from greater attack but is
also helps in presenting various kinds of technical challenges. Cyber attacks are one of the prime
concerns which is affecting decision making related to all kinds of cyber issues. Today cyber
criminals or black hat hackers focus on blurring the lines on virtual cyber battle field. When
hackers fog up cyber battle field it becomes nearly impossible to identify all kinds of possible
targets. Cyber defence committee tries to conduct a threat assessment in which they try to scale
up potential threat that can happen within nation’s security (Rõigas, 2018). Cyber criminals try to
manipulate the target users and try to conduct a data theft. Today cyber security is one of the
main operational area which is being focused on for waging cyber war as today many black hat
hackers try to break into national computer network for malicious intent like data theft or intent
to destroy files, passwords and many more. Due to this importance and requirement of national
cyber security defence is increasing and is becoming important to focus on strengthening
national cyber security defence.
Cyberspace information environment in which all kinds of digital information is collected,
processed. Today excessive usage of information technology today is increasing security
challenges in many ways and because of which management of cyber security is becoming
difficult due to increasing cyber risk. Due to these increasing risks all kinds of large
organizations, government, investors etc. need to focus on managing cyber risk so that they can
focus on maintaining organizational value and can also protect their data or information in a
better and planned manner. Today risk associated with information environment are more and
1
Cyber Security and Decision Making_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Operations: Fog of War, Information Environment, and Decision Making
|6
|1243
|39

Security Attack and Attackers
|7
|1477
|27

Cybercrime: Definition, Examples, and Case Study
|8
|656
|46

Cyber Defense in Web-Based Attacks | Study
|6
|1596
|13

IT Risk Management: Conducting a Risk Assessment and Developing a Security Policy
|12
|3074
|482

Foundation of Cyber Security
|6
|1679
|89