logo

Security Risk Analysis

Personal Copy of: Mr. Zhongliang Deng ISACA® ISACA (isaca.org) helps global professionals lead, adapt and assure trust in an evolving digital world by offering innovative and world-class knowledge, standards, networking, credentialing and career development. Established in 1969, ISACA is a global nonprofit association of 140,000 professionals in 180 countries. ISACA also offers the Cybersecurity NexusTM (CSX), a holistic cybersecurity resource, and COBIT®, a business framework to govern enterprise technology.

4 Pages763 Words256 Views
   

Added on  2022-11-26

About This Document

This document discusses the evaluation of cyber security risk analysis and the challenges faced by cyber security. It explores the best planning tool for cyber security risk analysis and emphasizes the importance of segregating sensitive data securely. The document also highlights various challenges in cyber security, such as ransomware evolution, AI expansion, IoT threats, and block chain revolution. It further discusses the need for advanced encryption, data protection, and element level security.

Security Risk Analysis

Personal Copy of: Mr. Zhongliang Deng ISACA® ISACA (isaca.org) helps global professionals lead, adapt and assure trust in an evolving digital world by offering innovative and world-class knowledge, standards, networking, credentialing and career development. Established in 1969, ISACA is a global nonprofit association of 140,000 professionals in 180 countries. ISACA also offers the Cybersecurity NexusTM (CSX), a holistic cybersecurity resource, and COBIT®, a business framework to govern enterprise technology.

   Added on 2022-11-26

ShareRelated Documents
Running head: SECURITY RISK ANALYSIS
Security Risk Analysis
Name of the student:
Name of the university:
Author Note
Security Risk Analysis_1
SECURITY RISK ANALYSIS
1
Evaluating cyber security risk analysis:
1. Answering the best planning tool:
For the present cyber security, the “intrusion to Epsilon email address database is chosen”. It
is seen that the Epsilon has required that the installed and warning of extra protection is designed.
This is to control the traffic. Further, it helps in alerting the admins in the vent o unusual tasks and
downloaded patterns that are identified. Moreover, it has been apparent that the new system has let
Epsilon in finding the breach very fast. This consists of the effects of just 2% of the customer base. It
is learnt that paying attention to various credible signs, proactively develop the needed security tools
and defenses of reducing the risks are required. This also helps in raising the possibility that the
attack is found and the harm is minimized (Cherdantseva et al.).
Moreover, it is been useful to assure that the data for the customers and specifically the
sensitive data like email databases and private data are been segregated securely from others. Since,
the companies move he data storage and processing to various third part providers, this it is
complicated that the sensitive information can be maintained. This must be in distinct silos such that
the breach of the customer database s never the breach of the databases (Abdo et al.). Beginning
from the premise that this is the matter of time till the information is compromised. This makes the
business to stay in smarter situation in measuring the benefits and drawbacks that engage the third
party and analyses the related risks.
2. Answering the Question 2:
The various challenges faced by the cyber security includes various factors. The first one is
Ransomware evolution. It is a bane for executives, data professionals, IT and cyber security. Then
there is AI expansion. Here, the robots can help to defend against the cyber-attacks that are
Security Risk Analysis_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Application of Risk Mitigation and Planning Tools
|3
|830
|42

Cloud Privacy and Security: Risks and Mitigation Strategies
|14
|4006
|102

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Database and Data Security: Assignment
|17
|4993
|155

Report on Threat to Personal Privacy by Emerging Technology
|8
|1587
|60

Cyber Security Assignment 2022
|12
|2845
|22