TABLE OF CONTENTS INTRODUCTION...........................................................................................................................1 MAIN BODY...................................................................................................................................1 Computing risks on Cyber security........................................................................................1 Cyber Security – Challenges and Solutions...........................................................................2 The Latest Approaches of Cyber security..............................................................................3 CONCLUSION................................................................................................................................9 REFERENCES..............................................................................................................................10
INTRODUCTION Cyber security is an important technology which is helpful for design methodology for controlling and protecting the network or system from cyber-attack. It is very helpful for reducing the risk on cyber-attacks. Further. It enables for providing protection to the organization from any type of theft or loss of information in a proper manner. This assignment covers information about cyber security approaches which is helpful for providing the best quality of facilitates and provide the best services in Information technology. Further, it also includesdifferent type of challenging issue face in the organization. In addition to this, it covers about the solutions of cyber security and computing risk. MAIN BODY Computing risks on Cyber security A cyber security is an essential for each and every organization to manage business operations and functions with the help of technology. Cyber security of computing risk will determine different information that could affect data of customer, computer system, laptop, hardware, etc. Computing risk is usually generated at time of execution and controls threat identifies risk in system with the help of cyber security. Computing security is mainly concerned about the large number of domains which are protecting their different platforms and hardware (Ashibani and Mahmoud, 2017). Important resources and data is required in the organization. Cyber security is helps for reducing the risk in the hardware system and provides protection to their personal data and information. Most of the organizations uses this technology to protect the security for data and information. There are various types of computing risk involved in the cyber security which are as follows: Data Breaches-The organization protects their data by cloud data storage. The illegal use of new technique to damage the information and data in the system. It is important for Chief security officer to use new security techniques to measure threats in the network. The data breach affects the trade secret, customer information and intellectual property. For Example- Most of the companies faces many challenging issues which damages brand image in market. Data Loss-Data loss is a crucial part of organization when disk driver is damaged and the owner of company has not been created backup of important data and information. Data loss is the major problem in organization because the data is encrypted and their key is unlocked. For 1
example- Amazon Web server is server which suffering for loss of data due to generate the error in 2011. Hacked Interfaces and insecure applications-Most of the application and cloud services are communicated by cloud services. This application security directly affects the security of cloud services (Berry and Berry, 2018). They have chances to hack data because third party access the application. This is the major cause to lose confidential data by parties and customers. Distributed denial of services attack-Denial of service attack affects the business process and their infrastructure as well as availability. This attack will affect the system and their process which may cause the system is slow down and time out. Denial of services is very expensive to run for the organization. Cyber Security – Challenges and Solutions Cyber Security is the biggest approach which is beneficial for technology to protect their data and system in a proper manner. The cyber criminals are started to damage the system and they also damage the devices or technology like thefts and frauds. Sometimes, it is very difficult to handle cyber-attack in the enterprises because some organizations uses specific protocols to manage business operations and functions (Gai and Hassan, 2017). There are some important few challenge issue faced in the cyber security discuss following: Digital Data Threat-Digital data threat is one of the main problem in the computer system while growing the online transaction is the biggest target for criminals to hack the data and personal information of customer such as Bank account number etc. The chief Security officer is identify business process and also monitors the company. Security officer will also implement the new policies regarding the security and it also identifies the risk on the business. Chief security officer plays an important role to manage functionality of business process and analyses threats which affect the entire data (Gou and Gupta, 2017). The data security officer provide the training to their employee for improve the performance and solve the problem in effective ways. Supply Chain Inter-connection-The supply chain is essential for organizations to create connection between the customers and vendors. They create a strong network between the customer and management. Sometimes, it disconnects the connection between them. The data will be loss. It is important for organization to establish a strong security wall between. The 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Security officer applies the security method to maintain the business process. They easily share the information between customer and vendor. The supply chain Inter-connection is required for organization to maintain the communication between the vendor and organization. They secure the operations to use layered defence approach to provide the security in different layers.For Example- Many organizations are constructing the other building like open space to monitor on the darks space and there should be wide range of visibility.It also covers all the security Policies with the helpful for providing the security to manage the cyber security by the hackers. Hacking-Hacking is a process which is damage or control the entire computer system and also access the private information of personal and organization.In past year, there are hundreds of Cyber-attack cases are generated.The information is available on internet makes it is very easy to hack the data and information (Harel and Elovici, 2017). The chief security Officer is an intelligent and highly skilled person who easily analyses the needs and understands the hacker’s perspectives. A Security system is required for organization to hire the intelligent people whounderstanding the requirement and them actually creating the efficient method to solve the problem. The hacker always checks their own system to make it hack proof. Black hacker hacks hardware system to control the entire hardware and access personal information. On the other hand, Grey hacker only hacks computer language and their system located in the private network and loopholes security system (Huang and Choo, 2017). The organization using the approach such as backdoor which helps the organization to secure their data for Example- 1 Billion peoples are using WhatsApp. In this way, they are protecting their private details and information. Phishing-Phishing is the most common security attack which is sending fake messages, email and create a fake website. This is the attempt which damage the sensitive detail like password, username and information of credit card etc. In 2014, Microsoft released computing safety index which is helpful for organizations to manage the information. Phishing is the most common example of Social engineering to exploit weakness of cyber security. Phishing is the major problem to avoid the unwanted link and text messages. It is important to update new security approaches which are helpful for keeping the system secure and use the internet carefully. 3
The Latest Approaches of Cyber security The organization is using different approaches to analyse behaviour and risk mitigation in business. There are various types of emerge information technology security systems that affect organization and it also implementing the new approaches for improvement. Block-chainforITsecurity-Blockchaintechnologyisthebestapproachfor organization to store their data in the form of decentralize and distribute in proper manner. This technology is helpful for enhancing the cyber defence to prevent fraudulent activities such as data encryption, immutability etc. (Mollah and Vasilakos, 2017). This technology provides safety and security of database. Block chain is the best way to distribute the database which are used for both the public and private application and for all the important information to store in the large database. People use authenticate device which is requires password with the help of block chain technology. The technology offering strong authentication and solving the problems and issues. This system provides the specific SSL certificate for the password.This certificateis utilised to identify the fake data. The organization maintains the block chain in their computer system and it makes sure that the chain not collapse. This approach is applicable in the public and private block chain in digital sign and time stamp. It means that the organizations can easily track transactions in particular time intervals. Focus on insider threats-This is the important concept because most of organizations have lack of visibility in their behaviour so that it will create a vulnerable threat in the organization. Itisimportant to provide the securitytosecureand preventthesensitive information (Ramachandra and Khan, 2017). The organization will force insider breach to establish strict rules and regulation for maintaining overall activity of information business environment. ContinuousAdaptiveRiskandTrustAssessment-Continuousriskandtrust assessment approach are determined to provide security as a continuous method which is helpful for changing the time are regularly viewed. This is the best approach for implementing the new ideas related cyber security posture and risk on mitigate. Most of the organizations uses this approach to regularly identify the risk associated with business activities. It is important for companies to maintain trust between employees and management system. Growing demand for advanced analytics-The chief security officer determine the new approach to increase demand in marketplace. The organization generates a security software to 4
analyse complete picture of information technology environment. Most of the companies uses growing adoption approaches to easily understand weak points of company. Organization-specific approach to IT security-Each and every organization needs to plan an effective strategy to improve the performance of business in a proper manner. It is necessary part for company to secure their data in the form of database. The security is necessary part of organization to develop strong relationship that is connected to system. The organization offers many personalised benefits and this approach covers the entire budget of information technology, size of company and the complexity of business environment. This approach provides the opportunity to implement new ideas in the product development and make sure that it is required to match the wants and needs of vendor (Smith and Paté-Cornell, 2018). It provides the efficient software to complete their task on large areas. These approaches are applicable in IT security to provide the best quality of services in the organization. Nowadays, many companies are using different types of approaches for increasing their businesses all over the world. This is the best approach to provide the security to the organization. The data and information are protected by the security software. These approaches are finding various types of malware and they are trying to detect all threats that are generatedinthenetwork.AccordingtoChiefSecurityofficer,theyfocusontocreate architecture that is helpful for managing the platform. It is useful for secure the data and detect the threats in the system attack share to all the environment.According to these approaches, attack indicators are shared among all IT threats which affect the business operations and activities. Respective technologies are synchronized to provide multiple-layers of protections, and all entry points are protected with no security gap between.Chief security officer is concerned about preventing data with the help of these approaches. 5
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cyber Security Framework This is important for organization to follow different approaches to identify the malicious virus which affect business operations and functions. Cyber security is the framework which is performs different functions such as identify, protect, recover and response etc. These are important functions which is beneficial for organization to remove all the unwanted threats that are generated at the time of Executions. Cyber security is major concern to provide the safety andsecuritywiththehelpofsecuritymethodology.Manyorganizationusesmodern technologies to identify the actual unwanted virus, Hacker will send the virus with the help of fake website, fake links and text messages etc. The viruses directly enter in system to damage hardware and so organizations design effective software and eliminated the unwanted threats, viruses etc. Apart from this, it also makes sure that they are using new approach to manage system in proper manner. Identify– This is the first stage of cyber security which is to identify the threat that can damage business operations and activities. Every organization using the various types of 6 I llustration1: Security framework (Source: Security Frame work, 2017)
Antivirus platforms are helpful for removing virus and malware from the system and these viruses directly affects, hardware, computer system, etc. (Vayansky and Kumar, 2018). Cyber security is the main concern to protect their system in proper ways. The organization is planning an effective strategy to identify threats in system which is more important because they directly damagethesystem.Sometimes,theyfacemanyproblemsandissuesinthebusiness environment. The enterprise assists management system to plan strategy and implement it in development process. Cyber security is important because most of the time, hacker can hack the data for company therefore, it is essential for company to maintain their security level. The chief security officer is playing important role to manage entire process in a proper manner. Security officer is intelligent person to identity fraudulent and other activities. They are performing different functions to provide the security. They also plan strategy to solve the problem and issues regarding security. Protect-This is another method which is helpful for providing cyber security because it is required for development and growth. Most of the companies provides the training to their employee to secure their data and information. The chief security officer follow specific procedure to provide security and protection. For Business process, the data security is main part because lack of security directly damages the organization. Most of the hackers hack the data which inversely affects the organization. It is important to provide awareness about cybercrime to their employees. Every organization generating cyber security software helps the company to secure personal information and organizational data. Organization design effective methodology to be flexible for implementing in the business operations. Privacy and security are major factors for every companies to provide safety and security. Detect-The Chief Security officer should identify the threats that are generated in the organization so that there is a continuous maintenance of security in proper manner. They always check security issues that is generated in the business process. Sometimes, the Business execution process will detect and most of organization does not understand that what type of threats are generated which is difficult to find out in process.Security officer help of analyse different type of attack such as Denial of service attack which affect the entire business process. The organization is conducting various type of events which is helping to remove threats and virus in organization. 7
Respond-This stage is helping organization to manage communication process, analysis business process and planning strategy for improvement. This stage will execute after the detection process. Cyber security is changing according to situations because most of the times, organization face many challenging issue regarding hacker because they use technology to smartly hack the data. It is important to change their strategy according to the requirement. Cybercrime is raising day by day and most of the people scare of sharing their personal information and data that it can be easily hacked by hackers (Zhang and Hayel, 2017). They are smarter than company because they use modern technology to easily change and track the IP Address. Most of the company hires the efficient Security officer to manage business processes and provide the security in a proper manner. After removing the threats in the system, they generate positive impact on organization. Recover-This is last stage of security frame work and it is ending process to recover all the data and information in a proper manner. Most of the organization use different security methodology to generate data and secure in computer system. They are using back features to recover all the data in correct format. Hacker get access to important data and it is most stressful conceptfor both organizational system and personal. Cybercrime makes direct damage to system and hardware. The main objective to access all the personal information therefore, Data recovery is a tricky process to recover their data by methodology. Data loss can be happen by Cyber-attack, natural disaster and human errors. The main objective of recover the data as soon possible. There are different tools available in marketplace which provide the security to recover and access the information in effective ways. For Example- Ease Us Data recovery tool is helpful for the organization to recover all the data and receive files that are lost at the time of Business execution process. Theseareimportantsecurityframeworkthatprotectstheentiresystemeffectivelyand efficiently. 8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CONCLUSION This report is about different type of computing risk faced in the business process and how computing risk is generating in organization. This assignment describes various approach for providing the security and safety in accordance with the system of organizational and personal aspect. Cyber security is helpful for reducing the risk on cyber-attacks. It is beneficial for protecting the entire organization in a proper manner. Further, it can be stated thatinformation technology security system affects the organization so that it is required for organization to implements the new security approaches and software to improve the performance of business. 9
REFERENCES Books and Journals: Ashibani, Y. and Mahmoud, Q.H., 2017. Cyber physical systems security: Analysis, challenges and solutions.Computers & Security,68, pp.81-97. Berry, C.T. and Berry, R.L., 2018. An initial assessment of small business risk management approaches for cyber security threats.International Journal of Business Continuity and Risk Management,8(1), pp.1-10. Gai, K., Qiu, M. and Hassan, H., 2017. Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing.Concurrency and Computation: Practice and Experience,29(7), p.e3856. Gou, Z., Yamaguchi, S. and Gupta, B.B., 2017. Analysis of various security issues and challenges in cloud computing environment: a survey. InIdentity Theft: Breakthroughs in Research and Practice(pp. 221-247). IGI Global. Harel, Y., Gal, I.B. and Elovici, Y., 2017. Cyber Security and the Role of Intelligent Systems in AddressingitsChallenges.ACMTransactionsonIntelligentSystemsandTechnology (TIST),8(4), p.49. Huang, C., Lu, R. and Choo, K.K.R., 2017. Vehicular fog computing: architecture, use case, and security and forensic challenges.IEEE Communications Magazine,55(11), pp.105-111. Mollah, M.B., Azad, M.A.K. and Vasilakos, A., 2017. Security and privacy challenges in mobile cloudcomputing:Surveyandwayahead.JournalofNetworkandComputer Applications,84, pp.38-54. Ramachandra, G., Iftikhar, M. and Khan, F.A., 2017. A Comprehensive Survey on Security in Cloud Computing.Procedia Computer Science,110, pp.465-472. Smith, M.D. and Paté-Cornell, M.E., 2018. Cyber Risk Analysis for a Smart Grid: How Smart is SmartEnough?AMultiarmedBanditApproachtoCyberSecurityInvestment.IEEE Transactions on Engineering Management. Vayansky,I.andKumar,S.,2018.Phishing–challengesandsolutions.ComputerFraud& Security,2018(1), pp.15-20. Zhang, R., Zhu, Q. and Hayel, Y., 2017. A bi-level game approach to attack-aware cyber insurance of computer networks.IEEE Journal on Selected Areas in Communications,35(3), pp.779- 794. 10