Cyber Security, Compliance, and Business Continuity in IT Management

Verified

Added on  2021/06/18

|9
|1468
|145
Report
AI Summary
This report delves into the critical aspects of cyber security, compliance, and business continuity within IT infrastructure management. It begins by emphasizing the paramount importance of cyber security in safeguarding sensitive data from network attacks and malicious threats, particularly in an era where information storage is predominantly online. The report then explores the significance of compliance, highlighting its role in ensuring that businesses adhere to industry and security standards, thereby mitigating risks. Furthermore, the report elaborates on the business continuity plan, detailing its function in maintaining normal business operations even after a system failure or disaster. The report covers the necessity of business continuity plans by identifying critical business points, estimating resource needs, and choosing the right recovery techniques. It also provides a comprehensive conclusion summarizing the rising importance of cyber security and the role of business continuity plans. The report includes references to supporting literature and an appendix.
Document Page
Running Head: Cyber security
IT
Infrastructur
e
Management
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber security 1
Abstract
In the limelight of below presented analysis it has been concluded that cyber security
is the key concern for every organisation. As almost all the data is stored online it is
necessary to protect the information from getting leaked. Apart from cyber security,
compliance is one of the factors that can be used to secure the network. These are the set of
rules that need to be followed at time of miss-happening. Sometimes a bug hits the system
and due to which it can cause harm to the business. Thus business continuity plan has the
ability to recover the system from unexpected situation as they assure the success of business
even in the critical condition. Thus it can be noted that every business should built a business
continuity plan by identifying the purpose of disaster recovery plan and usefulness of
business continuity plan.
Document Page
Cyber security 2
Table of Contents
Abstract.................................................................................................................................................1
Introduction...........................................................................................................................................3
Cyber -Security, Compliance, and Business Continuity..........................................................................3
Cyber security....................................................................................................................................3
Compliance........................................................................................................................................3
Business continuity plan....................................................................................................................3
Conclusion.............................................................................................................................................3
References.............................................................................................................................................4
Appendix................................................................................................................................................5
Document Page
Cyber security 3
Introduction
In today’s era almost all the sensitive data is stored online and the society completely
relies on internet for storing information. Thus it is very important to make sure that the
networks re security through which communication take place. Cyber security plays a crucial
role in this scenario. Cyber security protects the system from network attacks, malicious
attacks and from hackers. In this article the importance of business continuity plan is
discussed as it is true many a time’s system crashes due to some bugs. In such case a proper
business continuity plan is required to make sure that business work normally and it do not
cause any harm to the business.
Cyber -Security, Compliance, and Business Continuity
Security of data is fundamental part of every organisation thus it is important to keep
the data safe and assure the business continues to work normally even after disaster hit the
system. Business depends on the information stored online thus it is necessary to protect the
web from all the attacks (Buczak and Guven, 2016). This includes ensuring the information
resources of a business and keeping the data available, confidential and integrated. Business
continuity plan helps in bring the system back to the normal condition. Briefly discussing all
the three terms:
Cyber security
Cyber security is basically a protection used to protect the hardware and software
from various malicious attacks. Cyber is related to group of computers that are connected to
form a network via internet these computers store important data and files that need to be
secured. Cyber security is protection of these computer networks and the data stored in these
computers against hackers (Digitalguardian, 2018). Cyber security is incomplete without end
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber security 4
users. Cyber security is very important to protect the digital data and protecting the data from
hackers. Cyber security protects data from unauthorized access and unauthorized
modification to maintain integrity and confidentiality. Cyber security is essential for each
organisation as it uses set of strategies to maintain the privacy of information. Cyber security
acts as a shield for information so that it does not get access by invalid user (Furfaro, et. al,
2016). The fast development of innovation in the market has expanded the danger of cyber
security. In an organisation cyber security is vital to ensure the systems which contain private
data inside them are protected (Yuasa, et. al, 2017).
Compliance
Compliance is very important to make sure that business works efficiently and to assure
that no attack can cause any harm to the business. Compliance is about the individual efforts
and the company efforts to ensure that business meets both industry standard and security
standards (Gupta, Agrawal and Yamaguchi, 2016) . It is important to make sure that every
individual is good corporate citizen and protect the company. There are some predefined
regulators that need to be followed at time of failure. The main goal of compliance is to
identify the risks associated with an organisation and advise them the ways to overcome from
the risk. For this plans are designed and implemented to protect the system from all the
possible risk (Mattei and Satterly, 2016). They also monitor the system at regular interval of
time so that whenever a risk is detected proper plan could be executed. Apart from that they
also resolve the failures by advising the ways to control the risk and stop the risk from
mitigating in the system.
Business continuity plan
Business continuity plan guarantees that even after a specific attack business
proceeds. It incorporates all conditions that can happen and cause dangers for an organization
Document Page
Cyber security 5
so making a protective arrangement is necessary (Safa, Solms and Furnell, 2016). Speed of
recovery from the misfortune is likewise vital and it depends upon the type of server weather
it is hot site or a warm site. Plan must be designed to bring the business to normal condition
involves two steps. First is identifying all the critical points in a business then estimating the
number of resources needed to resolve the query then choosing right recovery technique and
calculating the funding expected to achieve the objective. Business continuity or disaster
recovery plan can also be said as a proactive plan (Wallace and Webber, 2017) . This plan is
designed to avoid the occurrence of risk and stop the risk to penetrate in the system and cause
future disruption of operations (Graham, et. al, 2016). They provide detail steps to need to be
under taken before the disaster and even after the occurrence of disaster to maintain the
financial viability of an organization.
Conclusion
Thus it can be concluded from this article that use of cyber security is rising day by
day as it helps the organisation to keep their data secure. Rising use of cyber security has
opened the doors for attackers to access the data unknowingly. Thus to make sure that the
system works effectively even when disaster hits the system, business continuity plan is
developed. Thus helps an organisation to form smoothly by undertaking few steps.
Document Page
Cyber security 6
References
Buczak, A.L. and Guven, E. (2016) A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2),
pp.1153-1176.
Digitalguardian, (2018). What is Cyber Security[ONLINE]. Available from
https://digitalguardian.com/blog/what-cyber-security [Accessed on 30 April 2018]
Furfaro, A., Gallo, T., Garro, A., Saccà, D. and Tundis, A. (2016) Requirements specification
of a cloud service for cyber security compliance analysis. In Cloud Computing Technologies
and Applications (CloudTech), 2016 2nd International Conference on (pp. 205-212). IEEE.
Graham, J., Olson, R. and Howard, R. eds. (2016) Cyber security essentials. CRC Press.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds. (2016) Handbook of research on modern
cryptographic solutions for computer and cyber security. 2(2), p.56.
Mattei, M.D. and Satterly, E. (2016) Integrating Virtualization and Cloud Services into a
Multi-Tier, Multi-Location Information System Business Continuity Plan. Journal of
Strategic Innovation and Sustainability, 11(2), p.70.
Safa, N.S., Von Solms, R. and Furnell, S.(2016) Information security policy compliance
model in organizations. Computers & Security, 56, pp.70-82.
Wallace, M. and Webber, L. (2017) The disaster recovery handbook: A step-by-step plan to
ensure business continuity and protect vital operations, facilities, and assets. AMACOM Div
American Mgmt Assn., pp. 23-89
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber security 7
Yuasa, Y., Nakano, S., Shimada, K. and Tanaka, Y. (2017) Improvement of Municipal
Business Continuity Plan Using Self-Check Sheets and Future Issues. Journal of Japan
Society of Civil Engineers, Ser. F6 (Safety Problem), 73.
Document Page
Cyber security 8
Appendix
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]