Cybersecurity in Organisations: Strategic Analysis and Implementation

Verified

Added on  2023/06/10

|21
|6178
|387
Report
AI Summary
This report provides a comprehensive overview of cyber security in organizations, focusing on the challenges and solutions related to protecting sensitive information and maintaining secure operations. The report begins with an introduction to cyber security, highlighting its importance and the evolving threat landscape, particularly in the context of fire and rescue services. It then delves into various methods of authentication, including password protection, public key cryptosystems, hash functions, and digital signatures, discussing their strengths and weaknesses in securing access to systems and data. Furthermore, the report examines security lockdown requirements, addressing the need for robust policies and procedures to mitigate risks and ensure business continuity. The report considers the implications of mobile data terminals and the specific security considerations for the fire and rescue services. The report also includes an analysis of research methods used to assess the security of mobile data terminals. The report concludes with a summary of key findings and reflections on the future of cyber security in organizations, emphasizing the need for continuous adaptation and proactive measures to stay ahead of emerging threats. The report aims to offer insights into the design, implementation, and application of information assurance and testing methodologies in an organizational setting, considering professional, legal, and ethical aspects.
Document Page
Running head: CYBER SECURITY IN ORGANISATIONS
Cyber Security in Organisations
Name of the Student:
Student ID:
Name of the University:
Author’s note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CYBER SECURITY IN ORGANISATIONS
Table of Contents
Part 1 Introduction and Overview....................................................................................................2
Part 2 Methods of Authentication....................................................................................................4
Part 3 Security Lockdown Requirements........................................................................................7
Part 4 Summary and Reflections...................................................................................................11
References......................................................................................................................................15
Document Page
2CYBER SECURITY IN ORGANISATIONS
Part 1 Introduction and Overview
Cyber Security is one of the most crucial problems forming the contemporary
improvisation development supporting the development of the implicational development for
listing the utilization of the effective implication of the activities (Abawajy 2014, pp-237). The
improvement of the cyber activities had listed the utilization of the cyber system development for
the fire and rescue services. Many fire and rescue services have introduced mobile based system
for their fire and rescue service activities as it have helped them in reaching the site at an
increased speed. The introduction of the Internet Cloud system has made it possible for all
vendors to extend their fire and rescue service operations to a larger extend with the help of
technology development and improved fire safety equipments (Korpela 2015, pp-75). The issues
of cyber security would result in listing the formation of the hindrance of security, privacy,
misconception of the information of the mobile data terminal solution, and information of the
mobile data terminal solution infiltration for the fire and rescue service operations. The
alignment of the factors would align for the implication of the factors for security integration.
The security issues would be dealt for aligning with the development of the factors that would
help in easing the processes of the fire and rescue service operations development (Kortjan and
Von Solms 2014, pp-32). The integration would be utilized for easing the processes developing
the integration of the factors listing the utilization of the development factors.
Cyber security development is one of the most crucial factors that would integrate the
alignment of the operations for integrating the simplification of the cyber issues for the
information of the mobile data terminal solution storage (Abawajy 2014, pp-242). The
combination of the operations would help the formation of the global functional development.
The integration would be helpful for easing the alignment of the operations supporting the
Document Page
3CYBER SECURITY IN ORGANISATIONS
formation of the activities. The improvement of the cyber activities had listed the utilization of
the cyber system development for the fire and rescue services. The cyber security development
would be implied for aligning with the mobile based system development. The issues of cyber
security would result in listing the formation of the hindrance of security, privacy, misconception
of the information of the mobile data terminal solution, and information of the mobile data
terminal solution infiltration for the fire and rescue service operations. The alignment of the
factors would align for the implication of the factors for security integration (Safa, Von Solms
and Futcher 2016, pp-71). The security issues would be dealt for aligning with the development
of the factors that would help in easing the processes of the fire and rescue service operations
development. The cyber security issues would be analyzed in the following report and it would
form the utilization of the effective integration and formation development. The utilization
would be formed for listing the analysis of the improved communication development. The
simplification would be helpful for listing the utilization of the effective performance integration.
The study had been developed for integrating the successive alignment of the development
consideration of the factor development for the fire and rescue service development (Korpela
2015, pp-76). The study would list the various documentation and reports that are helpful for
aligning with the factors of developing the improvement activities. The fire and rescue services
would have to face the following
According to Abawajy (2014, pp-35), the key research methods adopted for the study of
the probable security issues for the development of the mobile data terminal for the fire and
rescue operation services were program security analysis, data security protection, and defect
research. The combination of the three methods of research would be helpful for developing the
list of errors that would cause the harm for the operations. The defect research would be based on
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4CYBER SECURITY IN ORGANISATIONS
the analysis of the kernel for the common security threats affecting the vulnerabilities of the
mobile platform. The native code execution of C language and C++ language also results in
forming the hidden danger for the security considerations of the mobile data security (Kortjan
and Von Solms 2014, pp-35). The complete security consideration for the mobile data terminal
would be based on the security sandbox that is present in Linux kernel and the permissions while
installation. There are many security issues that not related to the platform selected for the
development of the mobile data terminal. The passwords, user information, and other sensitive
data would be stored in the mobile data terminal and the requirement for keeping the information
safe from the infiltration would be required in the for fire and rescue services. According to
Korpela (2015, pp-73), the passing of information in a non encrypted form would also result in
forming the possible issues for the operations and moreover, intent mechanism flaw is also a
major flaw for the android operations.
Part 2 Methods of Authentication
According to Kortjan and Von Solms (2014, pp-35), many fire and rescue services have
introduced mobile based system for their fire and rescue service activities as it have helped them
in reaching the customers on larger scale. The deployment of the functional development of the
activities for the online operations would be assisted by the implication of the functional
development. The use of the effective project execution would imply the deployment of the
professional development functions. The utilization of the specific deployment would be helpful
for considering the alignment of the activities favouring the utilization of the improved
functional development model (Luiijf and te Paske 2015). The implication would be helpful for
aligning the possibility of adjusting global operations. The deployment of the functional
development of the activities for the online operations would be assisted by the implication of
Document Page
5CYBER SECURITY IN ORGANISATIONS
the functional development. The use of the effective project execution would imply the
deployment of the professional development functions. The policies included in the development
of the authentication for the information processing in mobile data terminal for the fire and
rescue operations would include,
i. Development of the respect for the business requirements
ii. Development of the policy for controlling the information access
iii. Controlling the access to the networks and its varied services
iv. Management of the access rights for all the users present in the system
v. Development of the process for the user registration for the system
vi. Setting up the user access controlling the user provision process in the system
vii. Setting up the restriction for controlling the secret authentication services
viii. Privileged rights for access should be restricted for being used
ix. Access rights would be limited to the alignment of the proper development and
execution
x. Review of rights affecting the access in the system after specific intervals
xi. User Authentication would be encrypted for protection from being misused
xii. Restriction of the information access and the application use
xiii. Formal Password protection for the user development
xiv. Utility programs and source codes would be controlled
The various authentication operations would include the following facilities,
Password Protection: The use of the password protection would be helpful for developing
the support and development of the proper documentation would be aligned for using the
formation of the effective and alignment methods (Luiijf and te Paske 2015). The utilization of
the password protection would be developed for forming the alignment of the support and
development. The use of the password protection would be aligned for the development of the
Document Page
6CYBER SECURITY IN ORGANISATIONS
effective alignment processing for the development of the listing of professional development of
the activities. The password protection would be required for the development of the improved
limitation of the processes.
Public key cryptosystem: The use of the public key cryptosystem would be helpful for
developing the support and development of the proper documentation would be aligned for using
the formation of the effective and alignment methods. According to Luiijf and te Paske (2015),
the utilization of the public key cryptosystem would be developed for forming the alignment of
the support and development. The use of the public key cryptosystem would be aligned for the
development of the effective alignment processing for the development of the listing of
professional development of the activities. According to Bada and Sasse (2014), the setting up
the user access controlling the user provision process in the system would be helpful for forming
the effective identification of the user that can help in forming the proper authentication in the
organization. The access set up of the users with the effective alignment of the proper
documentation would help the users with the development of the access control for the mobile
data terminal of fire and rescue services. The public key cryptosystem would be required for the
development of the improved limitation of the processes. The management of the access rights
for all the users present in the system would provide successive functions that would limit the
information access in the fire and rescue services (Arachchilage and Love 2014, pp-306). The
access rights would also be helpful for supporting the alignment of the possible factors that are
limited by the formation of the improved communication and development. It is possible that the
access rights functions would help in easing the alignment of the improved functional and
development factor for the organization.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CYBER SECURITY IN ORGANISATIONS
Hash functions: The use of the hash functions would be helpful for developing the
support and development of the proper documentation would be aligned for using the formation
of the effective and alignment methods (Von Solms and Roussel 2015, pp-157). The utilization
of the hash functions would be developed for forming the alignment of the support and
development. The use of the hash functions would be aligned for the development of the
effective alignment processing for the development of the listing of professional development of
the activities. According to Bada and Sasse (2014), the setting up the user access controlling the
user provision process in the system would be helpful for forming the effective identification of
the user that can help in forming the proper authentication in the organization. The access set up
of the users with the effective alignment of the proper documentation would help the users with
the development of the access control for the mobile data terminal of fire and rescue services.
The hash functions would be required for the development of the improved limitation of the
processes. The management of the access rights for all the users present in the system would
provide successive functions that would limit the information access in the fire and rescue
services (Arachchilage and Love 2014, pp-306). The access rights would also be helpful for
supporting the alignment of the possible factors that are limited by the formation of the improved
communication and development. It is possible that the access rights functions would help in
easing the alignment of the improved functional and development factor for the organization.
Digital signature: According to Bada and Sasse (2014), the setting up the user access
controlling the user provision process in the system would be helpful for forming the effective
identification of the user that can help in forming the proper authentication in the organization.
The access set up of the users with the effective alignment of the proper documentation would
help the users with the development of the access control for the mobile data terminal of fire and
Document Page
8CYBER SECURITY IN ORGANISATIONS
rescue services. The use of the digital signature would be helpful for developing the support and
development of the proper documentation would be aligned for using the formation of the
effective and alignment methods (Al-Janabi and Al-Shourbaji 2016, p.1650007). The utilization
of the digital signature would be developed for forming the alignment of the support and
development. The use of the digital signature would be aligned for the development of the
effective alignment processing for the development of the listing of professional development of
the activities. The digital signature would be required for the development of the improved
limitation of the processes. The management of the access rights for all the users present in the
system would provide successive functions that would limit the information access in the fire and
rescue services (Arachchilage and Love 2014, pp-306). The access rights would also be helpful
for supporting the alignment of the possible factors that are limited by the formation of the
improved communication and development. It is possible that the access rights functions would
help in easing the alignment of the improved functional and development factor for the
organization.
CIA Triad Assessment
Confidentiality Integrity Availability
The information for the
mobile terminal data security
would be highly confidential
The information stored would
be integrated for the
development of the effective
information
It should be available in case
of emergency and
compatibility.
Document Page
9CYBER SECURITY IN ORGANISATIONS
Part 3 Security Lockdown Requirements
The two main types of access control requirements for the mobile terminal data security
of fire and rescue services were physical access controls and logical access controls (Bada and
Sasse 2014). The combination of the two access controls would be helpful for the
implementation of the improved security considerations for the organizational development. The
utilization of the successive improvement methods would help them in taking care of the
operations that would support the alignment of the successful integration development. The
implication of the effective and profound system development for the security consideration
would be helpful for the execution of the operations aligning with the Microsoft security
considerations. The windows security domain (users, computers, sites) would be aligned with the
active directories for forming the effective security considerations (Von Solms and Roussel
2015, pp-157). The key research methods adopted for the study of the probable security issues
for the development of the mobile data terminal for the fire and rescue operation services had
been program security analysis, data security protection, and defect research. The combination of
the three methods of research had been helpful for developing the list of errors that had cause the
harm for the operations. According to (Al-Janabi and Al-Shourbaji 2016, p.1650007), the defect
research had been based on the analysis of the kernel for the common security threats affecting
the vulnerabilities of the mobile platform. The native code execution of C language and C++
language also results in forming the hidden danger for the security considerations of the mobile
data security (Fenz, Plieschnegger and Hobel 2016, pp-452). The complete security
consideration for the mobile data terminal had been based on the security sandbox that is present
in Linux kernel and the permissions while installation. There are many security issues that not
related to the platform selected for the development of the mobile data terminal. The passwords,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10CYBER SECURITY IN ORGANISATIONS
user information, and other sensitive data had been stored in the mobile data terminal and the
requirement for keeping the information safe from the infiltration had been required in the for
fire and rescue services (Alotaibi et al. 2016). The passing of information in a non encrypted
form had also result in forming the possible issues for the operations and moreover, intent
mechanism flaw is also a major flaw for the android operations. According to Fenz,
Plieschnegger and Hobel (2016, pp-454), the following are the ISO27002 guidelines of access
control for the security system lockdown requirements,
Business Requirement Identification: The development of the respect for the business
requirements for the mobile data terminal of fire and rescue operations would be deployed for
easing the processing of the smart development and alignment of the facilities supporting the
implication of the successive activity development model (Alotaibi et al. 2016). The
identification of the business requirements would be required for executing the successful
deployment of the analysis.
Access rights: The management of the access rights for all the users present in the system
would provide successive functions that would limit the information access in the fire and rescue
services (Arachchilage and Love 2014, pp-306). The access rights would also be helpful for
supporting the alignment of the possible factors that are limited by the formation of the improved
communication and development. It is possible that the access rights functions would help in
easing the alignment of the improved functional and development factor for the organization.
User Registration: The development of the process for the user registration for the system
would be helpful for forming the effective identification of the user that can help in forming the
proper authentication in the organization (Arachchilage and Love 2014, pp-306). The registration
Document Page
11CYBER SECURITY IN ORGANISATIONS
of the users with the effective alignment of the proper documentation would help the users with
the development of the access control for the mobile data terminal of fire and rescue services.
User Access set up: According to Bada and Sasse (2014), the setting up the user access
controlling the user provision process in the system would be helpful for forming the effective
identification of the user that can help in forming the proper authentication in the organization.
The access set up of the users with the effective alignment of the proper documentation would
help the users with the development of the access control for the mobile data terminal of fire and
rescue services.
User restriction set up: Setting up the restriction for controlling the secret authentication
services would be helpful for forming the effective identification of the user that can help in
forming the proper authentication in the organization (Alotaibi et al. 2016). The restriction set up
of the users with the effective alignment of the proper documentation would help the users with
the development of the restriction control for the mobile data terminal of fire and rescue services.
Lockdown Requirements for security Threats
Privileged rights: The management of the privileged rights for all the users present in the
system would provide successive functions that would limit the information access in the fire and
rescue services (Cruz et al. 2014, pp-59). The privileged rights would also be helpful for
supporting the alignment of the possible factors that are limited by the formation of the improved
communication and development. It is possible that the privileged rights functions would help in
easing the alignment of the improved functional and development factor for the organization.
Access Control: The controlling of the access to the networks and its varied services
would provide successive functions that would limit the information access in the fire and rescue
chevron_up_icon
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]