Cyber Security: Policy Analysis and Recommendations for Skyward Co.
VerifiedAdded on  2023/06/10
|10
|1963
|53
Report
AI Summary
This report presents a comprehensive cyber security policy analysis conducted for Skyward Co., addressing the critical need for robust protection of computer systems and data against cyber threats. As a cyber security analyst, the author outlines the responsibilities associated with the role, including planning, implementing, and upgrading security measures, conducting audits, and managing network security. The report details a specific cyber security policy tailored for Skyward Co., encompassing a vision, mission, and objectives focused on creating a secure cyber environment, protecting information infrastructure, and ensuring regulatory compliance. Key strategies include creating a secure cyber environment, establishing an assurance framework, encouraging open standards, and strengthening the regulatory framework. The report concludes with specific recommendations for Skyward Co., such as analyzing network designs and updating architectures and protocols, emphasizing the importance of a proactive and adaptive approach to cyber security. Desklib offers a wealth of resources, including past papers and solved assignments, to support students in their academic endeavors.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author’s Note:
Cyber Security
Name of the Student
Name of the University
Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
CYBER SECURITY
Table of Contents
Introduction...................................................................................................................2
Discussion....................................................................................................................2
Cyber Security Analyst..............................................................................................2
Cyber Security Policy................................................................................................3
Recommendations for Skyward Co..........................................................................6
Conclusion....................................................................................................................6
References...................................................................................................................8
CYBER SECURITY
Table of Contents
Introduction...................................................................................................................2
Discussion....................................................................................................................2
Cyber Security Analyst..............................................................................................2
Cyber Security Policy................................................................................................3
Recommendations for Skyward Co..........................................................................6
Conclusion....................................................................................................................6
References...................................................................................................................8

2
CYBER SECURITY
Introduction
Cyber security or computer security can be defined as the proper protection of
various computer systems from being damaged or theft to the respective software,
hardware or any form of electronic data (Von Solms & Van Niekerk, 2013).
Moreover, this type of security is also effective to disruption as well as misdirection of
services, they are providing. This cyber security even involves perfect control of
physical access to the system hardware and also securing from harm that could be
done through access of network, injection of code and malicious data. Due to the
malpractices by various operators, irrespective of the fact that it is accidental or
intentional, the personnel of IT security could be tricked from deviation of the secure
processes (Wang & Lu, 2013). The wireless networks like Wireless Fidelity and
Bluetooth are utilized for the means of cyber security.
The following report outlines a brief discussion on the cyber security and
being the analyst of cyber security in the new organization or Skyward Company.
This is mainly because to prepare a proper briefing for the executive management.
The CIO or chief information officer contains of the understanding of IT or
information technology. Relevant details will be provided in this report.
Discussion
Cyber Security Analyst
Cyber security is the perfect security of the Internet connected systems that
comprise of the software, hardware or data from any type of cyber attack (Hahn et
al., 2013). The security consists of physical security and cyber security for protecting
against the unauthorized access to the data centres or the other computerized
CYBER SECURITY
Introduction
Cyber security or computer security can be defined as the proper protection of
various computer systems from being damaged or theft to the respective software,
hardware or any form of electronic data (Von Solms & Van Niekerk, 2013).
Moreover, this type of security is also effective to disruption as well as misdirection of
services, they are providing. This cyber security even involves perfect control of
physical access to the system hardware and also securing from harm that could be
done through access of network, injection of code and malicious data. Due to the
malpractices by various operators, irrespective of the fact that it is accidental or
intentional, the personnel of IT security could be tricked from deviation of the secure
processes (Wang & Lu, 2013). The wireless networks like Wireless Fidelity and
Bluetooth are utilized for the means of cyber security.
The following report outlines a brief discussion on the cyber security and
being the analyst of cyber security in the new organization or Skyward Company.
This is mainly because to prepare a proper briefing for the executive management.
The CIO or chief information officer contains of the understanding of IT or
information technology. Relevant details will be provided in this report.
Discussion
Cyber Security Analyst
Cyber security is the perfect security of the Internet connected systems that
comprise of the software, hardware or data from any type of cyber attack (Hahn et
al., 2013). The security consists of physical security and cyber security for protecting
against the unauthorized access to the data centres or the other computerized

3
CYBER SECURITY
systems. This type of security is for maintaining the integrity, availability and
confidentiality of data. The cyber security analyst comprises of various important and
significant responsibilities. The first and the foremost responsibility of a security
analyst is to plan, implement as well as upgrade the security measures or controls
(Amin et al., 2013). Moreover, various plans or protocols are also established for the
protection of information systems and digital files from the destruction, unauthorized
access and modification of data. The data is maintained and monitored from the
security access. The vulnerability testing is performed properly. The other important
responsibilities of a cyber security analyst mainly include conducting internal and
external security audits, analysis of security breaches, managing network, prevention
systems and intrusion detection. The major cause of security breach is detected by
analysis. The corporate security policies are properly defined maintained and
implemented by the cyber security analyst (Elmaghraby & Losavio, 2014).
Appropriate tools or counter measures are installed and recommended by cyber
security analyst.
Cyber Security Policy
Vision
To build a secure and resilient cyberspace for Skyward Co.
Mission
To protect information as well as information infrastructure in the cyber space,
to respond or prevent from cyber threats or attacks and to reduce or diminish
vulnerabilities or minimize damage from the cyber incidents in Skyward Co.
Objectives
CYBER SECURITY
systems. This type of security is for maintaining the integrity, availability and
confidentiality of data. The cyber security analyst comprises of various important and
significant responsibilities. The first and the foremost responsibility of a security
analyst is to plan, implement as well as upgrade the security measures or controls
(Amin et al., 2013). Moreover, various plans or protocols are also established for the
protection of information systems and digital files from the destruction, unauthorized
access and modification of data. The data is maintained and monitored from the
security access. The vulnerability testing is performed properly. The other important
responsibilities of a cyber security analyst mainly include conducting internal and
external security audits, analysis of security breaches, managing network, prevention
systems and intrusion detection. The major cause of security breach is detected by
analysis. The corporate security policies are properly defined maintained and
implemented by the cyber security analyst (Elmaghraby & Losavio, 2014).
Appropriate tools or counter measures are installed and recommended by cyber
security analyst.
Cyber Security Policy
Vision
To build a secure and resilient cyberspace for Skyward Co.
Mission
To protect information as well as information infrastructure in the cyber space,
to respond or prevent from cyber threats or attacks and to reduce or diminish
vulnerabilities or minimize damage from the cyber incidents in Skyward Co.
Objectives
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
CYBER SECURITY
i) To create secured cyber environment for the employees of Skyward Co.
ii) To secure information and information infrastructure for Skyward Co.
iii) To create an assurance framework for design of security policies and for
promotion and enabling actions for compliance to global security standards and best
practices by way of conformity assessment in Skyward Co (Buczak & Guven, 2016).
iv) To make stronger Regulatory framework to ensure secured cyber
environment.
v) To enhance as well as create mechanisms to obtain strategic information
about threats or attacks to the ICT infrastructure and hence scenarios should be
created for crisis management in an effective manner in Skyward Co (Dunn Cavelty,
2013).
v) To improve the visibility of integrity of various products or services of ICT by
the establishment of testing or validation of product security in Skyward Co.
Strategies
i) Creation of secured cyber environment: This is the first and foremost
strategy for the Skyward Co. Being the cyber security analyst, all the matters that are
related to the cyber security are well coordinated (Sommestad, Ekstedt & Holm,
2013). Moreover, the CIO or chief information officer would encourage all private or
public departments for the efforts of cyber security and initiatives. A particular budget
should be maintained for the implementation of cyber security initiatives and thus to
meet the emergency response in any type of cyber incident. Furthermore, a specific
mechanism should be established to share important information and also to identify
or respond to the incidents of cyber security (Wells et al., 2014). Proper guidelines
CYBER SECURITY
i) To create secured cyber environment for the employees of Skyward Co.
ii) To secure information and information infrastructure for Skyward Co.
iii) To create an assurance framework for design of security policies and for
promotion and enabling actions for compliance to global security standards and best
practices by way of conformity assessment in Skyward Co (Buczak & Guven, 2016).
iv) To make stronger Regulatory framework to ensure secured cyber
environment.
v) To enhance as well as create mechanisms to obtain strategic information
about threats or attacks to the ICT infrastructure and hence scenarios should be
created for crisis management in an effective manner in Skyward Co (Dunn Cavelty,
2013).
v) To improve the visibility of integrity of various products or services of ICT by
the establishment of testing or validation of product security in Skyward Co.
Strategies
i) Creation of secured cyber environment: This is the first and foremost
strategy for the Skyward Co. Being the cyber security analyst, all the matters that are
related to the cyber security are well coordinated (Sommestad, Ekstedt & Holm,
2013). Moreover, the CIO or chief information officer would encourage all private or
public departments for the efforts of cyber security and initiatives. A particular budget
should be maintained for the implementation of cyber security initiatives and thus to
meet the emergency response in any type of cyber incident. Furthermore, a specific
mechanism should be established to share important information and also to identify
or respond to the incidents of cyber security (Wells et al., 2014). Proper guidelines

5
CYBER SECURITY
should be adopted by Skyward Co for providing procurement of the indigenously
manufactured products of ICT.
ii) Creation of Assurance Framework: The second important strategy for the
organization of Skyward Co. is that an assurance framework should be created
properly. The adoption of the information security or compliance should be promoted
properly for enhancing posture of cyber security. The infrastructure should also be
created in certification of the cyber security guidelines or standards. A proper risk
management process or plan should also be undertaken by the organization of
Skyward Co (Cavelty, 2014). Moreover, the cyber crisis management plan should
also be made by them. The software development process must be ensured and for
securing the application. A conformity assessment framework should be created for
the periodic verification of compliance for cyber security. The information technology
systems are to be ensured with security or compliance. The networks would also be
secured with this.
iii) Encouraging Open Standards: The next important and significant
strategy for the organization of Skyward Co is the encouragement of the open
standards. The interoperability is well facilitated and the exchange of data within
several products and services (McGraw, 2013). The enhancement of the certified
information technology services or products on the basis of the open standards
should be done properly.
iv) Strengthening the Regulatory framework: The final important strategy
for Skyward Co is the strengthening of the regulatory framework. A dynamic legal
framework is properly developed and all the cyber security issues or challenges are
well addressed within the cyber space (Elmaghraby & Losavio, 2014). The
CYBER SECURITY
should be adopted by Skyward Co for providing procurement of the indigenously
manufactured products of ICT.
ii) Creation of Assurance Framework: The second important strategy for the
organization of Skyward Co. is that an assurance framework should be created
properly. The adoption of the information security or compliance should be promoted
properly for enhancing posture of cyber security. The infrastructure should also be
created in certification of the cyber security guidelines or standards. A proper risk
management process or plan should also be undertaken by the organization of
Skyward Co (Cavelty, 2014). Moreover, the cyber crisis management plan should
also be made by them. The software development process must be ensured and for
securing the application. A conformity assessment framework should be created for
the periodic verification of compliance for cyber security. The information technology
systems are to be ensured with security or compliance. The networks would also be
secured with this.
iii) Encouraging Open Standards: The next important and significant
strategy for the organization of Skyward Co is the encouragement of the open
standards. The interoperability is well facilitated and the exchange of data within
several products and services (McGraw, 2013). The enhancement of the certified
information technology services or products on the basis of the open standards
should be done properly.
iv) Strengthening the Regulatory framework: The final important strategy
for Skyward Co is the strengthening of the regulatory framework. A dynamic legal
framework is properly developed and all the cyber security issues or challenges are
well addressed within the cyber space (Elmaghraby & Losavio, 2014). The

6
CYBER SECURITY
international frameworks are harmonized for the Internet governance. A proper
awareness is enabled of this regulatory framework.
Recommendations for Skyward Co
Skyward Co has an extremely strong impact of cyber security policy. This type
of policy would be extremely effective for them. The various recommendations for
the organization of Skyward Co are given below:
i) The network designs and the topologies should be properly analyzed by
them.
ii) The second recommendation is to update the architectures, infrastructure
and protocols of Skyward Co.
iii) The network should be completely wireless for saving money or time.
Conclusion
Therefore, from the above discussion, it can be concluded that cyber security
can be easily defined to the set of tools or techniques that are utilized for the
protection of integrity of networks, data or programs from unauthorized access,
damage or attack. The fast growth of market is significantly fuelled by the array of
various trends of technology that includes several security requirements. The major
requirements of cyber security are IoT or internet of things and BYOD or bring your
own device. The fast adoption of the cloud based applications or workloads that
extend security needs or requirements beyond data centre and mandates of data
protection like NIST or National Institute of Security Technology Cyber Security
Framework and General Data Protection Regulation. The most significant
functionality of the cyber security majorly includes protection of systems or
CYBER SECURITY
international frameworks are harmonized for the Internet governance. A proper
awareness is enabled of this regulatory framework.
Recommendations for Skyward Co
Skyward Co has an extremely strong impact of cyber security policy. This type
of policy would be extremely effective for them. The various recommendations for
the organization of Skyward Co are given below:
i) The network designs and the topologies should be properly analyzed by
them.
ii) The second recommendation is to update the architectures, infrastructure
and protocols of Skyward Co.
iii) The network should be completely wireless for saving money or time.
Conclusion
Therefore, from the above discussion, it can be concluded that cyber security
can be easily defined to the set of tools or techniques that are utilized for the
protection of integrity of networks, data or programs from unauthorized access,
damage or attack. The fast growth of market is significantly fuelled by the array of
various trends of technology that includes several security requirements. The major
requirements of cyber security are IoT or internet of things and BYOD or bring your
own device. The fast adoption of the cloud based applications or workloads that
extend security needs or requirements beyond data centre and mandates of data
protection like NIST or National Institute of Security Technology Cyber Security
Framework and General Data Protection Regulation. The most significant
functionality of the cyber security majorly includes protection of systems or
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
CYBER SECURITY
information from the several cyber threats and cyber risks. All of these cyber risks
could be taking various forms like malware ransom ware, application attacks,
phishing and many more. The cyber adversaries comprise of the role for launching
automated as well as sophisticated attacks by utilizing all the tactics at extremely
lower costs. Some of the most common forms of cyber threats are cyber terrorism,
cyber warfare and cyber espionage. The above report has clearly outlined a cyber
security policy for the organization of Skyward Company. Significant details are
provided within the report.
CYBER SECURITY
information from the several cyber threats and cyber risks. All of these cyber risks
could be taking various forms like malware ransom ware, application attacks,
phishing and many more. The cyber adversaries comprise of the role for launching
automated as well as sophisticated attacks by utilizing all the tactics at extremely
lower costs. Some of the most common forms of cyber threats are cyber terrorism,
cyber warfare and cyber espionage. The above report has clearly outlined a cyber
security policy for the organization of Skyward Company. Significant details are
provided within the report.

8
CYBER SECURITY
References
Amin, S., Litrico, X., Sastry, S., & Bayen, A. M. (2013). Cyber security of water
SCADA systems—Part I: Analysis and experimentation of stealthy deception
attacks. IEEE Transactions on Control Systems Technology, 21(5), 1963-
1970.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning
methods for cyber security intrusion detection. IEEE Communications Surveys
& Tutorials, 18(2), 1153-1176.
Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs
and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701-715.
Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat
representations with an impact in the cyber-security discourse. International
Studies Review, 15(1), 105-122.
Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart
Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-
497.
Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security
testbeds: Architecture, application, and evaluation for smart grid. IEEE
Transactions on Smart Grid, 4(2), 847-855.
McGraw, G. (2013). Cyber war is inevitable (unless we build security in). Journal of
Strategic Studies, 36(1), 109-119.
CYBER SECURITY
References
Amin, S., Litrico, X., Sastry, S., & Bayen, A. M. (2013). Cyber security of water
SCADA systems—Part I: Analysis and experimentation of stealthy deception
attacks. IEEE Transactions on Control Systems Technology, 21(5), 1963-
1970.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning
methods for cyber security intrusion detection. IEEE Communications Surveys
& Tutorials, 18(2), 1153-1176.
Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs
and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701-715.
Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat
representations with an impact in the cyber-security discourse. International
Studies Review, 15(1), 105-122.
Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart
Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-
497.
Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security
testbeds: Architecture, application, and evaluation for smart grid. IEEE
Transactions on Smart Grid, 4(2), 847-855.
McGraw, G. (2013). Cyber war is inevitable (unless we build security in). Journal of
Strategic Studies, 36(1), 109-119.

9
CYBER SECURITY
Sommestad, T., Ekstedt, M., & Holm, H. (2013). The cyber security modeling
language: A tool for assessing the vulnerability of enterprise system
architectures. IEEE Systems Journal, 7(3), 363-373.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38, 97-102.
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and
challenges. Computer Networks, 57(5), 1344-1371.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical
security challenges in manufacturing systems. Manufacturing Letters, 2(2),
74-77.
CYBER SECURITY
Sommestad, T., Ekstedt, M., & Holm, H. (2013). The cyber security modeling
language: A tool for assessing the vulnerability of enterprise system
architectures. IEEE Systems Journal, 7(3), 363-373.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38, 97-102.
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and
challenges. Computer Networks, 57(5), 1344-1371.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical
security challenges in manufacturing systems. Manufacturing Letters, 2(2),
74-77.
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.