Cybersecurity Communication Strategy: Aliceo Inc. Analysis

Verified

Added on  2022/08/15

|7
|1242
|13
Report
AI Summary
This report analyzes a cybersecurity incident at Aliceo Inc., a consumer credit ratings agency, following a fictional data breach. The report focuses on the importance of communication systems in identifying and resolving cyber security threats. It discusses the breach, involving misuse of employee credentials, and emphasizes the need for a strong communication strategy. Key aspects include identifying communication recipients, such as the cybersecurity expert Drew Kovonosky, and establishing an instant response system. The report suggests using multimodal communication and cloud-based infrastructure for effective communication, especially during a crisis. It concludes that effective communication is essential for maintaining organizational cybersecurity, enabling instant response, and facilitating decision-making during cyber attacks. The report references several academic papers on cybersecurity, communication, and related topics.
Document Page
Running head: CYBER SECURITY
Cyber Security
Name of the Student:
Name of the University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CYBER SECURITY
Table of Contents
Introduction:....................................................................................................................................2
Importance of Communication System:..........................................................................................2
Recipient of the communication for the breach:..............................................................................3
Strong communication strategy:......................................................................................................3
Risk Mitigation for the cybersecurity:.............................................................................................4
Conclusion:......................................................................................................................................5
References:......................................................................................................................................6
Document Page
2CYBER SECURITY
Introduction:
A month after the Rhododendron patch project, Drew Kovonosky recived a call from the
Reconizant reporting a problem regarding the data security in the organization. It was suspected
that the employee credentials are being misused by some external or internal employees of the
organization to log into some other device in the Mainland China. The issues that has been
identified not only includes logging into several other devices and organization but also for the
purpose of removing data from the system of the parent organization as well. The following
report discusses about the importance of the communication system in the organization along
with how the problems can be resolved with establishment of the strong communication system
in the organization (Peng et al., 2019).
Importance of Communication System:
In order to resolve any matter the best possible way to do that is with the help of the
effective communication. There are numerous ways in which communication can be initiated in
the system. Based on the channel of the communication there are verbal and non-verbal
communication and based on the purpose and the style of the communication the communication
can be divided into the formal and the informal ways of the communication. However, whatever
the mode of communication is, if is implemented with effectiveness, it is capable of resolving the
problems. In order to identify the problems in the organization the importance of the
communication system is very important.
Document Page
3CYBER SECURITY
Figure 1: Types of Communication
Source Google Image
Recipient of the communication for the breach:
For the scenario that is described in the Chapter 2 Case study on the Bueno Aries, the
issues of the cyber breach can be resolved primarily with the help of the communication. The
main recipient of this communication is Drew Kovonosky. He is the expert of the cyber security.
The cyber-criminals are always at large and the cyber-attacks are a constant threats for the
organization (Konečný et al., 2016). The Cyber Security analyst has to establish a proper
communication such that he can make the employees aware of the misusage of the credentials in
the organization.
Strong communication strategy:
In order to develop a strong communication system certain things have to be clarified in
the beginning and that is ‘who are the ones involved in the development of the communication
plan’, ‘what are the basic components of the plan’ and the lastly, ‘where should the plan be
implemented’.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4CYBER SECURITY
The main people who should be involved in the planning is the executive management
team of the firm, the cyber security expert, the Information technology team of the organization.
Apart from them the people involved in the strategy includes, the legal council of the
organization, HR executives and the leaders in the administrative department (Wang & Park,
2017).
The other most important step taken for the cyber-attack is the instant response system.
This is done with the help of the effective communication. The communication helps in the
process of decision making in the system. Instant response team works on the basis of the
communication itself. A plan can be strategically implemented with verbal communication as
well as the nonverbal communications. The stakeholders involved in the organizations are
involved in the strategy as well.
That the system is subjected to the data breach or the security threat is first identified and
conveyed with the help of the communication system (Jasper & Wirtz, 2017). Not only that, the
communication is the only way by which the employees can determine and understand the issues
of the system and convey it to the experts in the field of the subject matter. As per the case study,
the IT people involved in the system received the information regarding the data breach by
analyzing he network where the employee credentials has been in use. Without proper mode
communication it would have been impossible to relay the information the Kovonosky who
would prepare a plan for mitigating the risk. Enquiry is another way of communication which
helps in obtaining information about the problems that are faced by the organization.
Document Page
5CYBER SECURITY
Risk Mitigation for the cybersecurity:
The best solution that can be undertaken for this purpose is the multimodal way of
communication. This is a two ways communication process. This is a better way to achieve a
response from the other end. When a system is compromised, it is important for the Information
technology department to information the business as well as the client about the breach such
that they can communicate and solve any error that is prevailing in the system.
Multi-modality along with the cloud based infrastructure for the communication platform
is another way of ensuring a good communication strategy. This is because the cloud based
infrastructure is not dependent upon a particular network and can helps in maintaining the
communication active status for the employees and the employers when the rest of the system is
compromised (Vargheese, Collinson & Mastho, 2018).
Conclusion:
Hence from the above report it can be concluded that communication is the best way in
which the cyber security of the organization can be maintained. The communication strategy is
important for the organization as it helps in providing instant response plan and the process of
decision making for the Cyber Attacks in the organizations.
Document Page
6CYBER SECURITY
References:
Jasper, S., & Wirtz, J. (2017). Cyber security. In The Palgrave Handbook of Security, Risk and
Intelligence (pp. 157-176). Palgrave Macmillan, London.
Konečný, J., McMahan, H. B., Yu, F. X., Richtárik, P., Suresh, A. T., & Bacon, D. (2016).
Federated learning: Strategies for improving communication efficiency. arXiv preprint
arXiv:1610.05492.
Peng, C., Sun, H., Yang, M., & Wang, Y. L. (2019). A survey on security communication and
control for smart grids under malicious cyber attacks. IEEE Transactions on Systems,
Man, and Cybernetics: Systems, 49(8), 1554-1569.
Vargheese, J. P., Collinson, M., & Mastho, J. (2018). How can persuasion reduce user cyber
security vulnerabilities?. In 2018 Convention of the Society for the Study of Artificial
Intelligence and the Simulation of Behaviour, AISB 2018.
Wang, P., & Park, S. A. (2017). COMMUNICATION IN CYBERSECURITY: A PUBLIC
COMMUNICATION MODEL FOR BUSINESS DATA BREACH INCIDENT
HANDLING. Issues in Information Systems, 18(2).
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]