Cyber Security – Challenges and Solutions

Verified

Added on  2021/01/02

|13
|3663
|313
AI Summary
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Computing risks, challenges
and solutions, approaches to
cyber security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
Computing risks on Cyber security........................................................................................1
Cyber Security – Challenges and Solutions...........................................................................2
The Latest Approaches of Cyber security..............................................................................3
CONCLUSION................................................................................................................................9
REFERENCES..............................................................................................................................10
Document Page
INTRODUCTION
Cyber security is an important technology which is helpful for design methodology for
controlling and protecting the network or system from cyber-attack. It is very helpful for
reducing the risk on cyber-attacks. Further. It enables for providing protection to the organization
from any type of theft or loss of information in a proper manner.
This assignment covers information about cyber security approaches which is helpful for
providing the best quality of facilitates and provide the best services in Information technology.
Further, it also includes different type of challenging issue face in the organization. In addition to
this, it covers about the solutions of cyber security and computing risk.
MAIN BODY
Computing risks on Cyber security
A cyber security is an essential for each and every organization to manage business
operations and functions with the help of technology. Cyber security of computing risk will
determine different information that could affect data of customer, computer system, laptop,
hardware, etc. Computing risk is usually generated at time of execution and controls threat
identifies risk in system with the help of cyber security. Computing security is mainly concerned
about the large number of domains which are protecting their different platforms and hardware
(Ashibani and Mahmoud, 2017). Important resources and data is required in the organization.
Cyber security is helps for reducing the risk in the hardware system and provides protection to
their personal data and information. Most of the organizations uses this technology to protect the
security for data and information.
There are various types of computing risk involved in the cyber security which are as follows:
Data Breaches- The organization protects their data by cloud data storage. The illegal
use of new technique to damage the information and data in the system. It is important for Chief
security officer to use new security techniques to measure threats in the network. The data breach
affects the trade secret, customer information and intellectual property. For Example- Most of
the companies faces many challenging issues which damages brand image in market.
Data Loss- Data loss is a crucial part of organization when disk driver is damaged and
the owner of company has not been created backup of important data and information. Data loss
is the major problem in organization because the data is encrypted and their key is unlocked. For
1
Document Page
example- Amazon Web server is server which suffering for loss of data due to generate the error
in 2011.
Hacked Interfaces and insecure applications- Most of the application and cloud
services are communicated by cloud services. This application security directly affects the
security of cloud services (Berry and Berry, 2018). They have chances to hack data because third
party access the application. This is the major cause to lose confidential data by parties and
customers.
Distributed denial of services attack- Denial of service attack affects the business
process and their infrastructure as well as availability. This attack will affect the system and their
process which may cause the system is slow down and time out. Denial of services is very
expensive to run for the organization.
Cyber Security – Challenges and Solutions
Cyber Security is the biggest approach which is beneficial for technology to protect their
data and system in a proper manner. The cyber criminals are started to damage the system and
they also damage the devices or technology like thefts and frauds. Sometimes, it is very difficult
to handle cyber-attack in the enterprises because some organizations uses specific protocols to
manage business operations and functions (Gai and Hassan, 2017). There are some important
few challenge issue faced in the cyber security discuss following:
Digital Data Threat-Digital data threat is one of the main problem in the computer
system while growing the online transaction is the biggest target for criminals to hack the data
and personal information of customer such as Bank account number etc. The chief Security
officer is identify business process and also monitors the company. Security officer will also
implement the new policies regarding the security and it also identifies the risk on the business.
Chief security officer plays an important role to manage functionality of business process and
analyses threats which affect the entire data (Gou and Gupta, 2017). The data security officer
provide the training to their employee for improve the performance and solve the problem in
effective ways.
Supply Chain Inter-connection-The supply chain is essential for organizations to create
connection between the customers and vendors. They create a strong network between the
customer and management. Sometimes, it disconnects the connection between them. The data
will be loss. It is important for organization to establish a strong security wall between. The
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Security officer applies the security method to maintain the business process. They easily share
the information between customer and vendor. The supply chain Inter-connection is required for
organization to maintain the communication between the vendor and organization. They secure
the operations to use layered defence approach to provide the security in different layers. For
Example- Many organizations are constructing the other building like open space to monitor on
the darks space and there should be wide range of visibility. It also covers all the security
Policies with the helpful for providing the security to manage the cyber security by the hackers.
Hacking- Hacking is a process which is damage or control the entire computer system
and also access the private information of personal and organization. In past year, there are
hundreds of Cyber-attack cases are generated. The information is available on internet makes it
is very easy to hack the data and information (Harel and Elovici, 2017). The chief security
Officer is an intelligent and highly skilled person who easily analyses the needs and understands
the hacker’s perspectives. A Security system is required for organization to hire the intelligent
people who understanding the requirement and them actually creating the efficient method to
solve the problem. The hacker always checks their own system to make it hack proof. Black
hacker hacks hardware system to control the entire hardware and access personal information.
On the other hand, Grey hacker only hacks computer language and their system located in the
private network and loopholes security system (Huang and Choo, 2017). The organization using
the approach such as backdoor which helps the organization to secure their data for Example- 1
Billion peoples are using WhatsApp. In this way, they are protecting their private details and
information.
Phishing- Phishing is the most common security attack which is sending fake messages,
email and create a fake website. This is the attempt which damage the sensitive detail like
password, username and information of credit card etc. In 2014, Microsoft released computing
safety index which is helpful for organizations to manage the information. Phishing is the most
common example of Social engineering to exploit weakness of cyber security. Phishing is the
major problem to avoid the unwanted link and text messages. It is important to update new
security approaches which are helpful for keeping the system secure and use the internet
carefully.
3
Document Page
The Latest Approaches of Cyber security
The organization is using different approaches to analyse behaviour and risk mitigation in
business. There are various types of emerge information technology security systems that affect
organization and it also implementing the new approaches for improvement.
Block-chain for IT security- Block chain technology is the best approach for
organization to store their data in the form of decentralize and distribute in proper manner. This
technology is helpful for enhancing the cyber defence to prevent fraudulent activities such as
data encryption, immutability etc. (Mollah and Vasilakos, 2017). This technology provides
safety and security of database. Block chain is the best way to distribute the database which are
used for both the public and private application and for all the important information to store in
the large database. People use authenticate device which is requires password with the help of
block chain technology. The technology offering strong authentication and solving the problems
and issues. This system provides the specific SSL certificate for the password. This certificate is
utilised to identify the fake data. The organization maintains the block chain in their computer
system and it makes sure that the chain not collapse. This approach is applicable in the public
and private block chain in digital sign and time stamp. It means that the organizations can easily
track transactions in particular time intervals.
Focus on insider threats- This is the important concept because most of organizations
have lack of visibility in their behaviour so that it will create a vulnerable threat in the
organization. It is important to provide the security to secure and prevent the sensitive
information (Ramachandra and Khan, 2017). The organization will force insider breach to
establish strict rules and regulation for maintaining overall activity of information business
environment.
Continuous Adaptive Risk and Trust Assessment- Continuous risk and trust
assessment approach are determined to provide security as a continuous method which is helpful
for changing the time are regularly viewed. This is the best approach for implementing the new
ideas related cyber security posture and risk on mitigate. Most of the organizations uses this
approach to regularly identify the risk associated with business activities. It is important for
companies to maintain trust between employees and management system.
Growing demand for advanced analytics- The chief security officer determine the new
approach to increase demand in marketplace. The organization generates a security software to
4
Document Page
analyse complete picture of information technology environment. Most of the companies uses
growing adoption approaches to easily understand weak points of company.
Organization-specific approach to IT security- Each and every organization needs to
plan an effective strategy to improve the performance of business in a proper manner. It is
necessary part for company to secure their data in the form of database. The security is necessary
part of organization to develop strong relationship that is connected to system. The organization
offers many personalised benefits and this approach covers the entire budget of information
technology, size of company and the complexity of business environment. This approach
provides the opportunity to implement new ideas in the product development and make sure that
it is required to match the wants and needs of vendor (Smith and Paté-Cornell, 2018). It provides
the efficient software to complete their task on large areas.
These approaches are applicable in IT security to provide the best quality of services in
the organization. Nowadays, many companies are using different types of approaches for
increasing their businesses all over the world. This is the best approach to provide the security to
the organization. The data and information are protected by the security software. These
approaches are finding various types of malware and they are trying to detect all threats that are
generated in the network. According to Chief Security officer, they focus on to create
architecture that is helpful for managing the platform. It is useful for secure the data and detect
the threats in the system attack share to all the environment. According to these approaches,
attack indicators are shared among all IT threats which affect the business operations and
activities. Respective technologies are synchronized to provide multiple-layers of protections,
and all entry points are protected with no security gap between. Chief security officer is
concerned about preventing data with the help of these approaches.
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber Security Framework
This is important for organization to follow different approaches to identify the malicious
virus which affect business operations and functions. Cyber security is the framework which is
performs different functions such as identify, protect, recover and response etc. These are
important functions which is beneficial for organization to remove all the unwanted threats that
are generated at the time of Executions. Cyber security is major concern to provide the safety
and security with the help of security methodology. Many organization uses modern
technologies to identify the actual unwanted virus, Hacker will send the virus with the help of
fake website, fake links and text messages etc. The viruses directly enter in system to damage
hardware and so organizations design effective software and eliminated the unwanted threats,
viruses etc. Apart from this, it also makes sure that they are using new approach to manage
system in proper manner.
Identify – This is the first stage of cyber security which is to identify the threat that can
damage business operations and activities. Every organization using the various types of
6
I
llustration 1: Security framework
(Source: Security Frame work, 2017)
Document Page
Antivirus platforms are helpful for removing virus and malware from the system and these
viruses directly affects, hardware, computer system, etc. (Vayansky and Kumar, 2018). Cyber
security is the main concern to protect their system in proper ways. The organization is planning
an effective strategy to identify threats in system which is more important because they directly
damage the system. Sometimes, they face many problems and issues in the business
environment. The enterprise assists management system to plan strategy and implement it in
development process. Cyber security is important because most of the time, hacker can hack the
data for company therefore, it is essential for company to maintain their security level. The chief
security officer is playing important role to manage entire process in a proper manner. Security
officer is intelligent person to identity fraudulent and other activities. They are performing
different functions to provide the security. They also plan strategy to solve the problem and
issues regarding security.
Protect- This is another method which is helpful for providing cyber security because it
is required for development and growth. Most of the companies provides the training to their
employee to secure their data and information. The chief security officer follow specific
procedure to provide security and protection. For Business process, the data security is main part
because lack of security directly damages the organization. Most of the hackers hack the data
which inversely affects the organization. It is important to provide awareness about cybercrime
to their employees. Every organization generating cyber security software helps the company to
secure personal information and organizational data. Organization design effective methodology
to be flexible for implementing in the business operations. Privacy and security are major factors
for every companies to provide safety and security.
Detect- The Chief Security officer should identify the threats that are generated in the
organization so that there is a continuous maintenance of security in proper manner. They always
check security issues that is generated in the business process. Sometimes, the Business
execution process will detect and most of organization does not understand that what type of
threats are generated which is difficult to find out in process. Security officer help of analyse
different type of attack such as Denial of service attack which affect the entire business process.
The organization is conducting various type of events which is helping to remove threats and
virus in organization.
7
Document Page
Respond- This stage is helping organization to manage communication process, analysis
business process and planning strategy for improvement. This stage will execute after the
detection process. Cyber security is changing according to situations because most of the times,
organization face many challenging issue regarding hacker because they use technology to
smartly hack the data. It is important to change their strategy according to the requirement.
Cybercrime is raising day by day and most of the people scare of sharing their personal
information and data that it can be easily hacked by hackers (Zhang and Hayel, 2017). They are
smarter than company because they use modern technology to easily change and track the IP
Address. Most of the company hires the efficient Security officer to manage business processes
and provide the security in a proper manner. After removing the threats in the system, they
generate positive impact on organization.
Recover- This is last stage of security frame work and it is ending process to recover all
the data and information in a proper manner. Most of the organization use different security
methodology to generate data and secure in computer system. They are using back features to
recover all the data in correct format. Hacker get access to important data and it is most stressful
concept for both organizational system and personal. Cybercrime makes direct damage to
system and hardware. The main objective to access all the personal information therefore, Data
recovery is a tricky process to recover their data by methodology. Data loss can be happen by
Cyber-attack, natural disaster and human errors. The main objective of recover the data as soon
possible. There are different tools available in marketplace which provide the security to recover
and access the information in effective ways. For Example- Ease Us Data recovery tool is helpful
for the organization to recover all the data and receive files that are lost at the time of Business
execution process.
These are important security framework that protects the entire system effectively and
efficiently.
8
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CONCLUSION
This report is about different type of computing risk faced in the business process and
how computing risk is generating in organization. This assignment describes various approach
for providing the security and safety in accordance with the system of organizational and
personal aspect.
Cyber security is helpful for reducing the risk on cyber-attacks. It is beneficial for
protecting the entire organization in a proper manner. Further, it can be stated that information
technology security system affects the organization so that it is required for organization to
implements the new security approaches and software to improve the performance of business.
9
Document Page
REFERENCES
Books and Journals:
Ashibani, Y. and Mahmoud, Q.H., 2017. Cyber physical systems security: Analysis, challenges and
solutions. Computers & Security, 68, pp.81-97.
Berry, C.T. and Berry, R.L., 2018. An initial assessment of small business risk management
approaches for cyber security threats. International Journal of Business Continuity and Risk
Management, 8(1), pp.1-10.
Gai, K., Qiu, M. and Hassan, H., 2017. Secure cyber incident analytics framework using Monte
Carlo simulations for financial cybersecurity insurance in cloud computing. Concurrency and
Computation: Practice and Experience, 29(7), p.e3856.
Gou, Z., Yamaguchi, S. and Gupta, B.B., 2017. Analysis of various security issues and challenges in
cloud computing environment: a survey. In Identity Theft: Breakthroughs in Research and
Practice (pp. 221-247). IGI Global.
Harel, Y., Gal, I.B. and Elovici, Y., 2017. Cyber Security and the Role of Intelligent Systems in
Addressing its Challenges. ACM Transactions on Intelligent Systems and Technology
(TIST), 8(4), p.49.
Huang, C., Lu, R. and Choo, K.K.R., 2017. Vehicular fog computing: architecture, use case, and
security and forensic challenges. IEEE Communications Magazine, 55(11), pp.105-111.
Mollah, M.B., Azad, M.A.K. and Vasilakos, A., 2017. Security and privacy challenges in mobile
cloud computing: Survey and way ahead. Journal of Network and Computer
Applications, 84, pp.38-54.
Ramachandra, G., Iftikhar, M. and Khan, F.A., 2017. A Comprehensive Survey on Security in
Cloud Computing. Procedia Computer Science, 110, pp.465-472.
Smith, M.D. and Paté-Cornell, M.E., 2018. Cyber Risk Analysis for a Smart Grid: How Smart is
Smart Enough? A Multiarmed Bandit Approach to Cyber Security Investment. IEEE
Transactions on Engineering Management.
Vayansky, I. and Kumar, S., 2018. Phishing–challenges and solutions. Computer Fraud &
Security, 2018(1), pp.15-20.
Zhang, R., Zhu, Q. and Hayel, Y., 2017. A bi-level game approach to attack-aware cyber insurance
of computer networks. IEEE Journal on Selected Areas in Communications, 35(3), pp.779-
794.
10
Document Page
Online:
Cyber Security Framework, 2017[Online]. Available through:
<https://www.stickman.com.au/wp-content/uploads/2016/09/NIST-12-03-985x1024.jpg>
11
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]