logo

Addressing Cyber Security Risks Information 2022

Research the policies or procedures that are required to report SPAM or Spoofed emails from a company. Locate the polices for reporting spoofed emails for three companies you use in your personal life. Choose three different companies insure they are in three different industries.

1 Pages557 Words17 Views
   

Added on  2022-09-27

Addressing Cyber Security Risks Information 2022

Research the policies or procedures that are required to report SPAM or Spoofed emails from a company. Locate the polices for reporting spoofed emails for three companies you use in your personal life. Choose three different companies insure they are in three different industries.

   Added on 2022-09-27

ShareRelated Documents
Addressing cyber security risksAddressing cyber security risks
Reason behind the attacks
Type of cyber attackers
Information Security Cycle
Information security cycle has to be maintained
by major commercial establishments as well as
in our society so that essential data, online
assets and the intellectual properties can be
secured from the cyber threats (Assal &
Chiasson, 2018).
Policy management and asset management are
the two most significant contribution of this
cycle (Alshaikh et al., 2016).
References
Addressing cyber security
There are diverse categories of cyber
attackers who are primarily responsible
for most of the cyber attacks such as the
insiders and the outsiders (Khaloufi et al.,
2018).
The threats coming from the insiders are
mainly from the trusted employees of the
cloud service providers, careless
employees working with essential data,
disgruntled employees and the malicious
insiders (Huang et al., 2019).
The threats coming from outside are
mainly from the social engineers, amateur
hackers and organized criminal groups
(Eckhart et al., 2019).
Alshaikh, M., Maynard, S. B., Ahmad, A., & Chang, S.
(2016). Information Security Policy: A Management
Practice Perspective. arXiv preprint arXiv:1606.00890.
Assal, H., & Chiasson, S. (2018). Security in the
software development lifecycle. In Fourteenth
Symposium on Usable Privacy and Security ({SOUPS}
2018) (pp. 281-296).
Eckhart, M., Ekelhart, A., Lüder, A., Biffl, S., &
Weippl, E. (2019, October). Security Development
Lifecycle for Cyber-Physical Production Systems. In
IECON 2019-45th Annual Conference of the IEEE
Industrial Electronics Society (Vol. 1, pp. 3004-3011).
IEEE.
Huang, Y., Bian, Y., Li, R., Zhao, J. L., & Shi, P.
(2019). Smart contract security: A software lifecycle
perspective. IEEE Access, 7, 150184-150202.
Khaloufi, H., Abouelmehdi, K., Beni-hssane, A., &
Saadi, M. (2018). Security model for Big Healthcare
Data Lifecycle. Procedia Computer Science, 141, 294-
301.
Safa, N. S., Von Solms, R., & Furnell, S. (2016).
Information security policy compliance model in
organizations. computers & security, 56, 70-82.
Security patches of the computer systems has to be
checked and updated in a regular basis.
All the transactional data has to be encrypted .
Complex alphanumeric passwords must be used in
the systems which have essential documents.
Limiting the number of login attempts of the
organizational portal or cloud account.
Creation of a kill switch in the private network
Setting up of a password management system.
Reject automated backup facilities.
Incorporation of Intrusion Detection System
There are numerous reasons behind
the conduction of a cyber attack
such as vulnerabilities in the
business financial documents,
financial details of the consumers,
sensitive personal information
which are stored in an
organizational databases and
vulnerabilities in the intellectual
properties (Safa, Von Solms &
Furnell, 2016). USA UK Australia
0
2
4
6
8
10
12
Increased cyber attacks over the years
2018 2019 2020
Two factor
authenticati
on
Advanced
threat
prevention
Investing in
cyber
security
insurance
Data
encryption
at rest
Dedicated
firewall
manageme
nt
Training
sessions for
the
employees
Virtual
private
Network
Unified log
manageme
nt
Anti
malware
solution
Addressing Cyber Security Risks Information 2022_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security | Task Report
|11
|2699
|24

Cyber Security Assignment 2022
|13
|965
|14