Cyber Security Report: Risk, Infrastructure, Roles, and Mitigation

Verified

Added on  2021/04/17

|9
|1816
|28
Report
AI Summary
This report delves into the multifaceted realm of cyber security, examining the intricacies of risk assessment, particularly concerning critical infrastructure at national, regional, and local levels. It explores the diverse threats within the cyber world, including intrusion and data breaches. The report also identifies the key roles and responsibilities of various stakeholders, such as government, industry, academia, and non-governmental organizations, in mitigating cyber security risks. The analysis encompasses the implementation of new laws, the establishment of backup systems, training initiatives, and awareness campaigns. The report aims to provide a comprehensive understanding of the challenges and proactive measures essential for safeguarding critical infrastructure and sensitive data in an increasingly interconnected digital landscape.
Document Page
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2CYBER SECURITY
Table of Contents
Question 1..................................................................................................................................3
Question 2..................................................................................................................................3
Question 3..................................................................................................................................4
References..................................................................................................................................6
Document Page
3CYBER SECURITY
Question 1
Risk information change
Decision making evolve around the basic need of making a choice, either to execute
something or not to execute something. The choice often can have different types of option
related to it. The decision-making choice have a variety of constraints available such as
technical, social, business, environmental requirement and the main objectives. Successful
decision-making aspect requires a basic understanding of the different objectives and the
requirement, the importance relating to this field and the how to access the options and make
the best option takes into consideration is the one of the important sectors to deal with. The
overall process, which is relating to the decision making can be considered very much same
as taking into consideration risk based decision. The main prospective, which is applied to the
concept, is defining the direct issue, the options are examined and the decision are
implemented. The main difference, which can be, stated taking into consideration risk factors
is that the aspect of the decision can be arrived by an understanding, which is structured of
the risk reward uncertainties and balance (Graham, Olson & Howard, 2016).
The main input and the output, which is seen on the aspect of decision-making, knows
the main origin of the risk. The input in these cases are majorly the risk factor, which it
occurs, and the output in such cases are the steps, which are taken in order to minimize the
overall effect of the risk (Hill, 2015). In most of the scenario it is seen that the input of the
risk comes from the sectors which are unknown and the mitigation aspect of the risk are of
upmost propriety due to the threats in possess on the overall working of the system.
Question 2
Risk associated with critical infrastructure
Document Page
4CYBER SECURITY
Nationally
Nationally the risk, which is associated with critical infrastructure, comes from the
sector of the stakeholders. This is mainly due to the factor that national project mainly
include cross-cultural interaction. This level of complexity can make the project very much
risk oriented due to the factor that different cultural aspect working into one project concept.
Moreover it can be stated that the risk which is seen in these cases are very much difficult to
be handled and needs proper nurturing to the problem it order to execute these types of
project (Gordon et al., 2015). There can be different types of approach, which can be applied
to a form a project. This can include a sense of different mentality, which is applied to a
single instance of a project.
Regionally
Regionally the risk, which are associated with the infrastructure, which are critical,
can be come from the sector of the internal working factors. The internal working factors
mainly include the factor of the relation, which is between the project manager and the team.
In most of the cases, it can be seen that the relation between the project manager and the team
are not appropriate and it directly hampers the overall working of the project. In some cases,
it can be majorly seen that due to the lack of interaction between the them the project does
not reach the intended level of success. The interaction, which is applicable between them,
should be in a proper form so that the project can reach the desired level of success and which
eliminates the risk factors, which are associated within them (Ben-Asher & Gonzalez, 2015).
They should always work as a team and should involve in active interaction, which can help
in mitigation of the factors of the risk, which are associated within the project.
Locally
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5CYBER SECURITY
Locally the risk, which are associated with the infrastructure, which are critical, can
be come from the sector of external risk factors, which are involved, into the working of the
project. This is due to the factor that in most of the cases external risk factors may involve
budget and time constraints. The budget and the time constraint can be considered one of the
most factors, which play a vital role in the sphere of the risk orientation in any sector of
development. It can be stated here that both the factors of time and cost are very much
interrelated to each other. If one of the factors in this context are hampered it can directly
affect the overall working of the project. It should be taken into consideration that the project
should achieve the means of the budget and time so that it can reach the level of success.
Cyber world
Taking into consideration the cyber world the risk, which are associated with the
infrastructure, which are critical, can be come from underlying infrastructure, which is
applied, to the concept of cyber. There can be different types of risk in the indicated sectors
for example the indulgence of the intruders in the aspect can be one of the biggest example of
the risk in this sector. In this type of infrastructure, there are different types of data, which
have to be secured, and maintaining them is the duty of the infrastructure. There can be also
hackers who can indulge into different types of activity, which can affect the overall working
of the aspect. The main risk is this aspect is the gaining of the important information of any
organization and making them use for their own personal benefit.
Question 3
Key roles and responsibility
Government
Document Page
6CYBER SECURITY
The government in order to reduce the risk factors are implementing new laws, which
are enforced which would be directly reducing the risk factors, which are related to the
infrastructure. The main aim of the new laws is to create a risk free infrastructure, which
would directly incorporate all the necessary working in a proper manner.
Industry
The industry area in order to minimize the risk factors tend to have a backup, which
are, be imposed if any risk scenario circumstances occur. In most of the cases the industrial
sector appoint special person who would be looking after the overall working so that risk
factors are not imposed in their working (Liu et al., 2015).
Academia
The main aspect to reduce the risk factor in the aspect of the academia is to give
training to the people so that they are more aware of the risk factors, which can be faced in
different sectors. The people are trained highly so that it can make themselves prepared for
the risk factors and work according so that the risk factor when faced can be mitigated an
early stage before the factors can superimpose a big threat in the concerned sector. In some
cases, it is seen risk factors are imposed but are not mitigated and eventually it possess a
serious threat to the overall working of the sector.
Non-government organization
Non-government organization tend to conduct campaign which aim at increasing the
awareness among people so that they have an in depth knowledge of the risk factors and how
to mitigate those risk factors. They tend to reach more and more people in this aspect so that
the people can build a sense of responsibility among themselves. It also makes the people
more concerned about the risk and know how to reduce the risk factors when they actually
Document Page
7CYBER SECURITY
face the problem in any situation and minimize the overall affect ( Buczak, A. L & Guven,
2016).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8CYBER SECURITY
References
Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack
detection. Computers in Human Behavior, 48, 51-61.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications Surveys & Tutorials,
18(2), 1153-1176.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K.
(2016). A review of cyber security risk assessment methods for SCADA systems.
Computers & security, 56, 1-27.
Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Zhou, L. (2015). Externalities and the
magnitude of cyber security underinvestment by private sector firms: a modification
of the Gordon-Loeb model. Journal of Information Security, 6(1), 24.
Graham, J., Olson, R., & Howard, R. (Eds.). (2016). Cyber security essentials. CRC Press.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI Global.
Hill, R. (2015, May). Dealing with cyber security threats: International cooperation, ITU, and
WCIT. In Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 7th
International Conference on (pp. 119-134). IEEE.
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of
cyber security management in industrial control systems. International journal of
critical infrastructure protection, 9, 52-80.
Document Page
9CYBER SECURITY
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in
healthcare: A systematic review of modern threats and trends. Technology and Health
Care, 25(1), 1-10.
Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M., & Liu, M. (2015,
August). Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In
USENIX Security Symposium (pp. 1009-1024).
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]