logo

Foundation of Cyber-Security: Information Security Policies and Encrypted E-mail Solutions

   

Added on  2023-05-28

12 Pages4083 Words98 Views
Foundation of cyber-security

FOUNDATION OF CYBER-SECURITY
1
Table of Contents
Q.2 Information security policies...........................................................................................................2
Wiping Utilities..................................................................................................................................3
Reset computer with Windows 8......................................................................................................4
Clean external drives.........................................................................................................................4
Use encryption technique to protect data files.................................................................................4
Destroy drives....................................................................................................................................5
Q.3 current state of encrypted e-mail solution.....................................................................................5
Complete the security checklist of g-mail account............................................................................6
Select safe email passwords..............................................................................................................6
Turn on 2 step verification process....................................................................................................7
Use the encryption process to protect emails...................................................................................7
Use of proton mail.............................................................................................................................7
Cryptography technology..................................................................................................................8
Keep networks and software up-to-date...........................................................................................8
Use a secure backup plan..................................................................................................................8
Adopt some protection......................................................................................................................8
Revoke unauthorized applications.....................................................................................................9
Enable HTTPS Security.......................................................................................................................9
References...........................................................................................................................................10

FOUNDATION OF CYBER-SECURITY
2
Q.2 Information security policies
Global designs limited is an IT organization that provide various information system
related services to their consumer ‘s like communication, mobile networks, computer
devices and many more [1]. The data stored by this organization has a lifetime of one
year after that the data or information of consumers are deleted. The deletion of data is
completed by using the delete function of the operating system and it does not delete
the complete data due to which hackers collect such data and demand money to restore
back. The main aim of this investigation it to develop the information security policies
to avoid the issue of data hacking and protect the deleted data. Today information and
technology developed a number of hardware and software to store data or information
that uses global organization which are also associated with data breach [2]. There are
few tools and techniques uses by hackers to recover the deleted data of an organization,
for example, forensic computer technology which is used by governments for
investigation purpose. But hackers develop their own algorithm and use the concept of
forensic tools to recover that deleted data. It is observed when any person deletes a
data file from the computer system but it does not leave your hard drive. The deleted
files from a hard drive only avoid the pointers which make it easy for hackers to recover
the data of an organization. Immense caching is a kind of process that saves all data or
information by using search engines, for example, Google. Most the attackers use other
tools to block the e-mail and personal information such as phishing scams, remote
access and password break system.
Forensic is very common technology which is used by the global organization to recover
the deleted data or information but attackers produce a complex process to block user’s
peripheral devices. Information security policy is defined as a protection approach that
handles the unauthentic servers and analysis the key factors that increase the issue of
hacking or data breach. It is observed that information security follows the main three
principles to develop policies which are described below:
Confidentially: it means that data or information is only utilized by consumers that are
authorized to access them and global organization provided this authentication to their
whole management team that create the risk for deleting data.

FOUNDATION OF CYBER-SECURITY
3
Integrity: it means that any changes to the data through unauthorized consumers are
not possible and changes by authorized consumers are tracked.
Availability: it means that the data is accessible when authorized consumers require it.
So, to develop security policies for global designs limited all these steps can be used and
management team can hire an IT team that can control the security-related issues.
There are various kinds of reasons to maintain the efficiency of the computer system
and devices in order to prevent data from unauthentic networks which are the
following:
Maybe the backup data collected on a CD-ROM has touched a certain level and
requires to be obliterated.
Maybe a hard disk has become injured and is broken
Most the attackers first identify the location and remote access to enter into the
organization system and they use an easy restoration algorithm to get the deleted data
of an employee. This issue faced by many organizations and Global limited is one of
them that lost their personal data deleted from the computer system [3].
Information and communication technology developed few steps and approaches to
delete the unwanted data or information properly which can be applied for Global
limited organization which are described below:
Wiping Utilities
It is one of the best security policies to address the problem of a data breach that scrubs
all unused or unwanted data from computer systems. This organization communicates
with numbers of consumers in a day and them stores their private details in computing
devices for which they can adopt such process. Information technology also developed
much software to avoid the issue of hacking such as Cyber-Cide, Declasfy, East-West's,
PDA Defence, DBAN, Symantec Ghost’s gdisk32, and Dispose of Secure. The disk wiping
takes more time to delete the data or information from computers but the Global
organization can implement this step to improve the security of data [4]. A recent study
shows that Mac OS X provides a platform to secure the wiping of hard drives and it also
helps to back up the consumer's data if they want before wiping the hard disk.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Foundation of Cyber Security
|6
|1679
|89

Demonstration of Autopsy
|22
|1475
|22

Introduction to Cyber Security
|14
|3209
|388

Cyber Security Assignment PDF
|9
|2867
|2114

cyber security threats and attacks
|4
|749
|141

Business Proposal for Cyber Security and Digital Forensics by Quickrecovery Private Limited
|16
|1351
|283