logo

Embedding Cyber Resilience Principles for Board

16 Pages2997 Words436 Views
   

Added on  2019-11-12

About This Document

Running Head: Corporate Governance [Year] Corporate Governance [Year] Corporate Governance Contents Introduction 3 Elements of cyber security 4 Application security 4 Information security 4 Network security 5 Disaster Recovery 5 Cyber Resilience Principles for Board 6 Embedding cyber resilience 7 Board Cyber Risk Framework. 8 Lingering cyber risk portfolio post threat management or mitigation actions 9 Businesses impacted by cyber security incidents 11 Considerations while purchasing cyber risk insurance 12 Future of cyber resilience 13 Conclusion 14 References 15 Introduction Cyber security or information technology security is the procedure of

Embedding Cyber Resilience Principles for Board

   Added on 2019-11-12

ShareRelated Documents
[Year]Corporate Governance
Embedding Cyber Resilience Principles for Board_1
Running Head: Corporate GovernanceContentsIntroduction.................................................................................................................................................3Elements of cyber security..........................................................................................................................4Application security.................................................................................................................................4Information security................................................................................................................................4Network security.....................................................................................................................................5Disaster Recovery....................................................................................................................................5Cyber Resilience Principles for Board.........................................................................................................6Embedding cyber resilience.........................................................................................................................7Board Cyber Risk Framework.....................................................................................................................8Lingering cyber risk portfolio post threat management or mitigation actions..............................................9Businesses impacted by cyber security incidents.......................................................................................11Considerations while purchasing cyber risk insurance..............................................................................12Future of cyber resilience..........................................................................................................................13Conclusion.................................................................................................................................................14References.................................................................................................................................................152
Embedding Cyber Resilience Principles for Board_2
Running Head: Corporate GovernanceIntroduction Cyber security or information technology security is the procedure of shielding, networks,computers, programs and data from attack, damage or illicit access that are aimed forexploitation. In a computing context securityincludes bothcyber securityand physical security.One of the most challenging essentials of cyber security is that the security risk factor is veryprompt and constant. The conventional approach has been to emphasise large number of assetson the critical items to guard against major threats, the same necessitates parting ways with lesscritical constituents and even minor dangerous threats not safe guarded against. This kind ofapproach is inadequate in the present scenario.Cyber security demands focus and dedication. Cyber security professionals face few challenges which are Kill chains, zero-day attacks, ransom ware, alert fatigue and budgetary constraints. Cyber security professionals need a powerful understanding of the above topics and many others,so that they are able to tackle those challenges more efficiently.According to Forbes, the world wide cyber securitymarket has risen to $75 billion for the year 2015and is projected to reach $170 billionin 2020.3
Embedding Cyber Resilience Principles for Board_3
Running Head: Corporate GovernanceVarious elements of cyber securityThere are various elements of cyber security which includes 1. “Application security”, 2. Information security”, 3. “Network security” and 4. “Disaster recovery/business continuity planning”.Application securityApplication security involves procedures through the improvement life-cycle to protect applications from risks which may occur due to mistakes in the application design, development, consumption, improvement or maintenance [ CITATION Has16 \l 1033 ]. Methods used for application security are as follows:Input parameter authenticationUser/Role Validation & ConsentSession supervision, parameter management & exemption managementAuditing and data entryInformation securityInformation security shield information from illicit contact to evade individuality theft and to defend confidentiality. Few techniques which are used to shield this are as follows:oDocumentation, verification & agreement of useroCrypto technique4
Embedding Cyber Resilience Principles for Board_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: ABC Technologies
|16
|3805
|242

Cyber Security and Resilience: A Report for the Board of the Company
|10
|3070
|72

Countering cyber risk EXECUTIVE SUMMARY: Cyber Resilience Principles for Business Activities
|11
|3086
|363

Developing Cyber Resilience in Abacus Property Group: Findings and Analysis
|16
|4022
|372

Cyber Security: Exploring the Various Aspects and Solutions
|29
|8168
|290

Applications of Cyber-Security in Higher Education
|28
|7698
|11