Cyber Security: Analyst, Policy, and Recommendations for Skyward Co
Verified
Added on  2023/06/10
|10
|1963
|53
AI Summary
This report outlines a brief discussion on the cyber security and being the analyst of cyber security in the new organization or Skyward Company. Cyber security policy, recommendations for Skyward Co, and strategies are discussed in detail.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER SECURITY Cyber Security Name of the Student Name of the University Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 CYBER SECURITY Table of Contents Introduction...................................................................................................................2 Discussion....................................................................................................................2 Cyber Security Analyst..............................................................................................2 Cyber Security Policy................................................................................................3 Recommendations for Skyward Co..........................................................................6 Conclusion....................................................................................................................6 References...................................................................................................................8
2 CYBER SECURITY Introduction Cyber security or computer security can be defined as the proper protection of various computer systems from being damaged or theft to the respective software, hardwareoranyformofelectronicdata(VonSolms&VanNiekerk,2013). Moreover, this type of security is also effective to disruption as well as misdirection of services, they are providing. This cyber security even involves perfect control of physical access to the system hardware and also securing from harm that could be done through access of network, injection of code and malicious data. Due to the malpractices by various operators, irrespective of the fact that it is accidental or intentional, the personnel of IT security could be tricked from deviation of the secure processes (Wang & Lu, 2013). The wireless networks like Wireless Fidelity and Bluetooth are utilized for the means of cyber security. The following report outlines a brief discussion on the cyber security and being the analyst of cyber security in the new organization or Skyward Company. This is mainly because to prepare a proper briefing for the executive management. TheCIOorchiefinformationofficercontainsoftheunderstandingofITor information technology. Relevant details will be provided in this report. Discussion Cyber Security Analyst Cyber security is the perfect security of the Internet connected systems that comprise of the software, hardware or data from any type of cyber attack (Hahn et al., 2013). The security consists of physical security and cyber security for protecting against the unauthorized access to the data centres or the other computerized
3 CYBER SECURITY systems.Thistypeofsecurityisformaintainingtheintegrity,availabilityand confidentiality of data. The cyber security analyst comprises of various important and significant responsibilities. The first and the foremost responsibility of a security analyst is to plan, implement as well as upgrade the security measures or controls (Amin et al., 2013). Moreover, various plans or protocols are also established for the protection of information systems and digital files from the destruction, unauthorized access and modification of data. The data is maintained and monitored from the security access. The vulnerability testing is performed properly. The other important responsibilities of a cyber security analyst mainly include conducting internal and external security audits, analysis of security breaches, managing network, prevention systems and intrusion detection. The major cause of security breach is detected by analysis.Thecorporatesecuritypoliciesareproperlydefinedmaintainedand implementedbythecybersecurityanalyst(Elmaghraby&Losavio,2014). Appropriate tools or counter measures are installed and recommended by cyber security analyst. Cyber Security Policy Vision To build a secure and resilient cyberspace for Skyward Co. Mission To protect information as well as information infrastructure in the cyber space, to respond or prevent from cyber threats or attacks and to reduce or diminish vulnerabilities or minimize damage from the cyber incidents in Skyward Co. Objectives
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4 CYBER SECURITY i) To create secured cyber environment for the employees of Skyward Co. ii) To secure information and information infrastructure for Skyward Co. iii) To create an assurance framework for design of security policies and for promotion and enabling actions for compliance to global security standards and best practices by way of conformity assessment in Skyward Co (Buczak & Guven, 2016). iv)TomakestrongerRegulatoryframeworktoensuresecuredcyber environment. v) To enhance as well as create mechanisms to obtain strategic information about threats or attacks to the ICT infrastructure and hence scenarios should be created for crisis management in an effective manner in Skyward Co (Dunn Cavelty, 2013). v) To improve the visibility of integrity of various products or services of ICT by the establishment of testing or validation of product security in Skyward Co. Strategies i)Creation of secured cyber environment: This is the first and foremost strategy for the Skyward Co. Being the cyber security analyst, all the matters that are related to the cyber security are well coordinated (Sommestad, Ekstedt & Holm, 2013). Moreover, the CIO or chief information officer would encourage all private or public departments for the efforts of cyber security and initiatives. A particular budget should be maintained for the implementation of cyber security initiatives and thus to meet the emergency response in any type of cyber incident. Furthermore, a specific mechanism should be established to share important information and also to identify or respond to the incidents of cyber security (Wells et al., 2014). Proper guidelines
5 CYBER SECURITY should be adopted by Skyward Co for providing procurement of the indigenously manufactured products of ICT. ii)Creation of Assurance Framework: The second important strategy for the organization of Skyward Co. is that an assurance framework should be created properly. The adoption of the information security or compliance should be promoted properly for enhancing posture of cyber security. The infrastructure should also be created in certification of the cyber security guidelines or standards. A proper risk management process or plan should also be undertaken by the organization of Skyward Co (Cavelty, 2014). Moreover, the cyber crisis management plan should also be made by them. The software development process must be ensured and for securing the application. A conformity assessment framework should be created for the periodic verification of compliance for cyber security. The information technology systems are to be ensured with security or compliance. The networks would also be secured with this. iii)EncouragingOpenStandards:Thenextimportantandsignificant strategy for the organization of Skyward Co is the encouragement of the open standards. The interoperability is well facilitated and the exchange of data within several products and services (McGraw, 2013). The enhancement of the certified information technology services or products on the basis of the open standards should be done properly. iv)Strengthening the Regulatory framework: The final important strategy for Skyward Co is the strengthening of the regulatory framework. A dynamic legal framework is properly developed and all the cyber security issues or challenges are welladdressedwithinthecyberspace(Elmaghraby&Losavio,2014).The
6 CYBER SECURITY international frameworks are harmonized for the Internet governance. A proper awareness is enabled of this regulatory framework. Recommendations for Skyward Co Skyward Co has an extremely strong impact of cyber security policy. This type of policy would be extremely effective for them. The various recommendations for the organization of Skyward Co are given below: i) The network designs and the topologies should be properly analyzed by them. ii) The second recommendation is to update the architectures, infrastructure and protocols of Skyward Co. iii) The network should be completely wireless for saving money or time. Conclusion Therefore, from the above discussion, it can be concluded that cyber security can be easily defined to the set of tools or techniques that are utilized for the protection of integrity of networks, data or programs from unauthorized access, damage or attack. The fast growth of market is significantly fuelled by the array of various trends of technology that includes several security requirements. The major requirements of cyber security are IoT or internet of things and BYOD or bring your own device. The fast adoption of the cloud based applications or workloads that extend security needs or requirements beyond data centre and mandates of data protection like NIST or National Institute of Security Technology Cyber Security FrameworkandGeneralDataProtectionRegulation.Themostsignificant functionalityofthecybersecuritymajorlyincludesprotectionofsystemsor
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7 CYBER SECURITY information from the several cyber threats and cyber risks. All of these cyber risks couldbetakingvariousformslikemalwareransomware,applicationattacks, phishing and many more. The cyber adversaries comprise of the role for launching automated as well as sophisticated attacks by utilizing all the tactics at extremely lower costs. Some of the most common forms of cyber threats are cyber terrorism, cyber warfare and cyber espionage. The above report has clearly outlined a cyber security policy for the organization of Skyward Company. Significant details are provided within the report.
8 CYBER SECURITY References Amin, S., Litrico, X., Sastry, S., & Bayen, A. M. (2013). Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks.IEEETransactionsonControlSystemsTechnology,21(5),1963- 1970. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection.IEEE Communications Surveys & Tutorials,18(2), 1153-1176. Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities.Science and Engineering Ethics,20(3), 701-715. DunnCavelty,M.(2013).Fromcyber-bombstopoliticalfallout:Threat representations with an impact in the cyber-security discourse.International Studies Review,15(1), 105-122. Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy.Journal of advanced research,5(4), 491- 497. Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security testbeds:Architecture,application,andevaluationforsmartgrid.IEEE Transactions on Smart Grid,4(2), 847-855. McGraw, G. (2013). Cyber war is inevitable (unless we build security in).Journal of Strategic Studies,36(1), 109-119.
9 CYBER SECURITY Sommestad,T.,Ekstedt,M.,&Holm,H.(2013).Thecybersecuritymodeling language:Atoolforassessingthevulnerabilityofenterprisesystem architectures.IEEE Systems Journal,7(3), 363-373. VonSolms,R.,&VanNiekerk,J.(2013).Frominformationsecuritytocyber security.computers & security,38, 97-102. Wang,W.,&Lu,Z.(2013).Cybersecurityinthesmartgrid:Surveyand challenges.Computer Networks,57(5), 1344-1371. Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical securitychallengesinmanufacturingsystems.ManufacturingLetters,2(2), 74-77.