logo

Cyber Security: Critical Policies, Risks, Framework and Implementation

6 Pages1203 Words72 Views
   

Added on  2023-06-10

About This Document

This article discusses the five critical policies and risks that organizations face in cyber security. It also recommends the NIST 800 37 framework for risk management and highlights the time, resources, and technology required for implementation.

Cyber Security: Critical Policies, Risks, Framework and Implementation

   Added on 2023-06-10

ShareRelated Documents
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author Note
Cyber Security: Critical Policies, Risks, Framework and Implementation_1
1CYBER SECURITY
Question 1.
Name five critical policies you feel the organization should have and why
they are important.
Ans. The five critical policies that the organization must have are:
1. Acceptable Use Policy.
2. Information Security.
3. Security Awareness.
4. Incident Response.
5. Change Management.
The acceptable use policy is implemented on the all employee to make sure
that they will be aware of the all the rules of the company. Several resources of the
corporate are associated with this policies are: computer network of the company, file
servers, host computers, communication servers and many other (Olson et al., 2018).
The policy of the information security look like to manage the security of the
organizations. The information security consists of success control of the system,
access of the information, user id and the password, and several policy of the
password.
The purpose of the security awareness is aware the employees of the
organization about the policies of the data security. One incident of security can make
harm a lot to the business. It is necessary to implement the several policies of the
security (Wall et al., 2017).
It is important for the management to response the incident that happen in the
organization accordingly. If any urgent incident happens then the management can
take the action and send the response to the upper management.
Cyber Security: Critical Policies, Risks, Framework and Implementation_2
2CYBER SECURITY
It is very important to track and approved the change that is happening in the
management. In the IT corporate world the management change happens very
frequently so it is needed to be tracked and maintain as per the requirements.
Question 2
Name five critical risks most organizations face and how they can be
addressed
Ans. The five critical risks that the most of the organization face are:
1. Strategic risks
2. Financial risk
3. Operational risk
4. Cyber security
5. Employee risks.
The strategic risks contains the analysis of the market that is the competitor of
the organization. One organization must have to track the activity of the competitor to
stay in the market race (Reichrath et al., 2018).
The financial risks involved with the loan that the company is taken from the
bank. If the loan cannot be returned in time so that the financial crisis cannot happen
in the organisation.
The operational risk involved the theft of any kind of equipment in the
organization. To prevent the risk of the operation a proper implementation of the
security is needed.
Cyber Security: Critical Policies, Risks, Framework and Implementation_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Develop and Implement Policy: A Case Study of Widget Enterprises
|11
|1683
|323

Security Plan And Security Management
|11
|1883
|12

Cybersecurity Training
|4
|790
|406

Information Security System: Analysis of Incidents and Management Measures
|13
|2018
|472

Importance of Cyber Security Framework and its Components
|5
|1114
|370