logo

Cyber Security Resilience Assignment

12 Pages2844 Words265 Views
   

Added on  2019-11-08

Cyber Security Resilience Assignment

   Added on 2019-11-08

ShareRelated Documents
Cyber Security Resilience 1CYBER SECURITY RESILIENCEAuthor’s name Course Name of the professorName of the institutionLocation of the institutionDate
Cyber Security Resilience Assignment_1
Cyber Security Resilience 2AbstractTraditionally, companies were focused on mitigation of risks posed by cyber threats. However, with the fast growth of technology, there is a need for measures to ensure organizations survive and recover from attacks. This is cyber resilience which is a strategy that isspear headed by the board but includes, the employees, suppliers, customers, partners. There are various forms of attacks but findings of a research carried out indicate ransomware as a common threat to cyber security in 2016 (Telstra Cyber Security Report 2017, 2017). The essay focuses on the cyber resilience framework used in accordance with the ITIL service management lifecycle. The recommendation is the all departments should be involved in the process and information should be classified according to priority. Contents
Cyber Security Resilience Assignment_2
Cyber Security Resilience 3Abstract.......................................................................................................................................................2Introduction.................................................................................................................................................4Methodology...............................................................................................................................................4Findings.......................................................................................................................................................51.Threats.............................................................................................................................................52.Adoption of security protocols.........................................................................................................73.Framework.......................................................................................................................................7Recommendations.......................................................................................................................................9Conclusion.................................................................................................................................................11References.................................................................................................................................................12
Cyber Security Resilience Assignment_3
Cyber Security Resilience 4IntroductionAs the computer industry has evolved so have the security measures used to safeguard data. To start with, there was computer security which involved limiting the level of access of ordinary users to the level that enabled them to only perform their tasks. Information security was the second aspect after users got personal computers and began innovating. The third term was cyber security was developed after the introduction of the digital era. Nowadays, there is cyber resilience that ensures that cyber security is implemented from the top level using the top down approach. Using this strategy, cyber security is not solely the task of the Information Technology (IT) department. Due to an increase cybercrime, companies ought to start embedding resilience protocols in their business models. This should be done through governance and management processes. This is aimed at protecting information in business processes such as product development whichnot only minimizes risk but also increases efficiency. According to a research carried out by Telstra, Australian companies are recognizing the significance of involving all stakeholders in cyber security (Telstra Cyber Security Report 2017, 2017). In addition, their research indicated that the Information Technology (IT) department was held responsible for the security breaches experienced in 2015 and 2016. However, their research also indicated that the blame has shifted towards top level managers due to an increase from 19 percent in 2015 to 61 percent in 2016 (Telstra Cyber Security Report 2017, 2017). Moreover, there is a rise in the involvement of executives in cyber security initiatives. MethodologyThe research carried out involved secondary data retrieved from the internet. One of the sources was the Telstra Cyber Security report comprised of findings from a research carried out by Frost & Sullivan. The online surveys conducted by Telstra gained 360 responses and 42
Cyber Security Resilience Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security and Resilience: A Report for the Board of the Company
|10
|3070
|72

Countering cyber risk EXECUTIVE SUMMARY: Cyber Resilience Principles for Business Activities
|11
|3086
|363

Report On Cybersecurity Policy | ACC03043 Corporate Governance
|15
|3207
|33

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

System Security Assessment using Vulnerability Repositories
|42
|12515
|74

Computer Data Breaches10 RECENT COMPUTER DATA Breaches AND SOLUTIONS
|10
|2036
|269