logo

Assessment on Cyber Security 2022

   

Added on  2022-10-04

8 Pages1799 Words18 Views
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the Organization
Author Note

CYBER SECURITY
1
Importance fact about the assessment risk:
The overall procedure of the risk analysis and the identifying process is very much
important for the cyber security. There are several education institution are facing the
problem of the risk for the several cyber problems. Hardware, software and the system
problem also done by the assessment of the risk. The data last of the hacking problem is also
a dangerous spam. The estimation as well as the evaluation risk are also visible in this matter.
The process of the selecting controls are taking part to create this problems. It is very much
essential to take care the various risk that are happening in the case of the cyber security. The
organization should be maintained properly to complete the process. If the cyber-attack has
been done by the attacker of the hackers, then all data will be lost or the huge demand has to
be fulfil to the hackers. Risk analysis is needed for the each and every organizations(Öğütçü
et al. 2016). The adoption of the Cloud technology is needed for the proper privacy and the
security. The company or the organization are needed to solve the security problem properly.
The flexibility, agility, security are crucial part of the system. All of these are maintained
through the cloud computing. The interoperability issue and the data ownership also taking
care by the cloud computing. In today’s world, the data mining is done through the data
migration. There are several experts are assigned to take care of the responsibility and the
vendor security. The Department of Administrative Services has been taken care of the cyber
surety from a decade. The multi cloud computing has been done with the different type of
cloud environment. This formation is applicable for the multiple cloud platform and the
services. The cloud operation has been done sometimes with the third party. Data integration
is also done by this procedure. The final procedure and the complexity is needed to be
complete that the organization security remain stable. The SaaS or the software as a service is
the distribution model of the software which is the third party provider which is capable of
the application service (Shamala et al. 2013)

CYBER SECURITY
2
Critical asset Identification:
In a singular entity the asset information has been defined properly. The critical
should be maintained properly and manage through a unit. The attack should be understood
and protected for the system. The assets of the information will be manageable if the
information will be cleared properly. The value of the asset is tend to be physical. It is very
much essential that the identification. Without identification it is impossible to target the
responsible malware. University should develop a register system for maintenance properly.
A database is also needed for all data backup and the security. If any malware attack has been
took place, then it will be easy to format the system and take the essential document from the
backup. The asset storing is needed to complete the procedure of the security. If the cyber-
attack has been happened in the educational institute, then it is difficult to recover it. That is
why the each and every documents should be maintained and have to take the backup
properly. If the backup process has been done properly, then the system reboot process will
be done. The all data of the corrupted device will be removed and the backup data will be
effected. That is why the asset of the data should be recorded. It will take little time if the
system should be rebooted to avoid the attack, but the demand of the hacker does not have to
proceed(Hartmann, K. and Steup, C, 2013)They are targeting the educational organization,
because those organizations are full of sensitive documents with the student details, notes,
results and the questions. That is why, if any of these document missing will hamper the
organization. So it will be great, if all the document have the proper security and the backup.
The backup has been done through the cloud computing or the huge space of the hard drives.
If any attack, like the ransom ware has taken the place; then the system will be rebooted by
the technical support team and all documents should be recovered. So the precaution is
needed properly to complete the security (Cherdantseva et al. 2016)

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Vulnerabilities and Recommendations for ABC Technology
|10
|3323
|1

Ransomware & Malware
|5
|581
|276

Cyber Security PowerPoint Presentation 2022
|8
|761
|16

Cyber Security Assignment PDF
|9
|2867
|2114

Online Coursework on Computer and System Security
|6
|1112
|484

(Solved) Cyber security challenges Assignment
|8
|2715
|216