logo

A Case Study in Cyber Security

8 Pages2183 Words60 Views
   

Added on  2020-07-23

A Case Study in Cyber Security

   Added on 2020-07-23

ShareRelated Documents
A Case Study in Cyber Security
A Case Study in Cyber Security_1
TABLE OF CONTENTSINTRODUCTION...........................................................................................................................1Recommendations and available frameworks for cyber security...............................................1Legislation and frameworks that are essential for the information security professionals.........2Long term initiatives for encouraging positive changes for assessing security risk andmaintaining privacy in a corporate environment........................................................................2Risk assessment methodologies..................................................................................................3Comparison of the methodologies .............................................................................................4CONCLUSION................................................................................................................................5REFERENCES................................................................................................................................6
A Case Study in Cyber Security_2
INTRODUCTIONCyber security is considered as a sort of technology that has been designed in order toprovide quality and standard rate of security to protect various programs, data and all theinformation from any sort of attack (Pfleeger and Caputo, 2012). It is important because one cantry to hack someone's person account for having access to their personal data. So, for protectingany sort of unauthorised access to the information or data or any program, cyber security canhelp in doing the same. The research is about all the frameworks and legislations associated withthe cyber security factors. Also, some recommendations that the professions can follow.Security risk assessment methodologies for an efficient and appropriate mapping have also beenincluded. Recommendations and available frameworks for cyber securityThere can be various factors included and adopted by the cyber security professionals,that can influence some positive changes and these are discussed as under :Updations are mustThe cyber awareness programs that are being implemented by the cyber securityprofessionals needs to be updated on a regular basis. The ones that have not been updated for alonger time is considered as a complete waste because the hackers and attackers involve variousnew ways to hack or get the data. So, for dealing with the new ways, it is important that theprofessions have also moved on to the new and updated factors. By this way, the processes andaction of the cyber security by the professionals can result in much better and positive changes. Ensuring complete executive supportThe professions must have proper support of the authorities and the executives. It isbecause it is obvious that for implementing the updated factors, some support and help must berequired. Also, the cyber security professionals can try to detect the internal threats. It is becausesometimes the efficient asset of one acts as the biggest risk factor. So, along with all othertrained staff, technology can be the first priority and tool for dealing with internal threats. Beware from tactics of social engineeringAlthough there are high security factors that can help in protecting the data but theattackers involve enormous ways and tactics to get through login id or password of anyone(O’Connell, 2012). So, the professions can ensure the involvement of ways by which they cantrack what account has been hacked. It will help in a way that whenever an account will be1
A Case Study in Cyber Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Assignment Case Study
|8
|2079
|223

Enhancing Cyber Security for Relocate4U
|10
|2280
|35

Study on Challenges in Cyber Security for Business
|9
|2702
|72

Cyber Security Threats and Information Governance
|16
|4128
|21

Cyber Security Risk Management
|4
|760
|25

Preventive Measures and Vulnerabilities in Computer Accounting System
|5
|751
|102