Analyzing Cyber Security Threats and Business Continuity Strategies

Verified

Added on  2019/09/30

|6
|1387
|568
Report
AI Summary
This report, submitted by Demetrius L. Jenkins, analyzes the critical role of cyber security in ensuring business continuity. It begins with an executive summary highlighting the significance of cyber security for businesses of all sizes and the common threats they face, including phishing, malware, DDoS, and ransomware attacks. The literature review emphasizes the importance of proactive IT management. The description section details various cyber security threats and their impact, while the strategic plan section proposes measures such as business continuity planning, data backups, employee training, and the use of virus detection tools. The report also explores emerging trends like banking system upgrades and anti-activist measures. The conclusion reiterates the necessity of vigilance and the adoption of advanced security tools to protect against unethical activities. The report references key sources to support its findings.
Document Page
Assignment
On
The Role of Cyber Security fFor The Continuity of Business
Submitted by
Demetrius L. Jenkins
Registration No: 2
April 27, 2019
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Executive summary...............................................................................................................................2
Literature review...................................................................................................................................2
Description............................................................................................................................................2
Common Cyber security threats for business.....................................................................................2
Strategic plan to handle cyber security threats...................................................................................4
Emerging Trend in cyber security......................................................................................................4
Conclusion.............................................................................................................................................5
Reference...............................................................................................................................................5
Executive summary
Cyber security is one of the top concerns for any small, medium, or large- scale business.
Cyber security threats always make businesses to suffer more., and Ffour types of cyber
security threats for businesses are reported as pPhishing attacks, malware attacks, and
DDistributed denial of service attacks and ransom ware. It is very important to prepare a
strategic plan which can help businesses to prevent cyber security attacks and strengthen the
internal and external network. Some of the recommended steps to handle cyber security
attacks will be discussed in this report. From small to large businesses they have all started
taking initiatives so that they can to fight from hacking and unethical activities. We will
discuss some of the latest trends in cyber security space in this report.
Literature review
According to this paper Järveläinen, J. (2019),. It there are some is being observed that it has
highlighted on the of the common steps which which should be taken by managers of IT
companies so that they can maintain security at their placein their businesses. CCloud-
computing, inter- organizational system and operations work should be managed in a
specified plan so that they can protect their company from any kind of damage. However,
that is not enough according to current trends because there are still many modifications
which has been took have not taken place so that every moment of work hours can be
secured. We will discuss some of the steps to tackle cyber security attacks in this paper.
2
Document Page
Description
Common Cyber security threats for business
Most of the businesses haves to come across many challenges and attacks if their re security
system is not strength strong enough to handle any predictable or unpredictable threats. Some
of the cyber security threats which can affect the continuity of businesses are listed as
Distributed denial of service attack, phishing, ransom ware, and malware attack. These are
very common since the deployment of Information technology in business but most of the
time the user always made a mistake and the network security get was compromised. If the
security system in the internal or external network was compromised thisat would cause
many problems in terms of data management.
Malware Attack
Some common mistakes which we make during our work time is by ignoringre notifications.
and that make us little closer to the attack. For example, if an antivirus pop up alert for an
update of security is missed that is the reason of attack, or if the user can mistakenly clicked
on a malicious email attachment. If any malicious email attachments haves been downloaded
onin the computer or network that that can be vulnerablevulnerable, and this can cause a data
breach. Attackers strive to get inside the user’s computer so that they can enter into the office
network and makde disruptions as per their demand. This situation makes businesses to suffer
more because they do not know through which mode the attackers haves entered into their
network. It is difficult to notice such type of attacks because some timesometimes it takes
more time to notify security management to inform about the attack.
Phishing
Phishing attacks areis very easy to be planned by attackers because most of the time we have
made this mistake and become victim. Suppose the user needs to open some files or
attachment and instead of that it demands the users to download or install some other
software then thatthis could cause the security system to get be compromised. There can be
situations where attackers can send email like trusted users and mistakenly users will open
this mail as they think it arrives from their boss or superiors. This is a very common mistake
which can cause users to suffer a lot in terms of privacy and security of data.
3
Document Page
Ransomware
It is theIn this situation when attackers illegally keep some important data, files or folders and
then they demand some money for it. By the use of unethical practicses, they get inside the
network, and steal important data and information and threaten to reveal those the data.
they demandif they do not receive money from the company. Productivity can ruin the
business and cause it to be shut down immediately. That again cause business to shut down
immediately and also it affects in the productive hours of the business.
DDoS
Distributed denial of service attack is something which when it happens in any company can
cause huge loss in the smooth running of business. When there is increased number of users
on in any website more than its service loads would allow then that this can cause websites
to behave improperly. When there is an increased number of user traffic on any site more
than its the allotted limit then it will not display users the site pages correctly. The reason
behind attackers perform Tthis activity is that they want can cause the site to shut down
completely. This makes businessThis can cause the business to suffer a huge loss because
without website most of the work cannot be completed in its normal way.and make the
website unable to perform and operate in its normal way.
Strategic plan to handle cyber security threats
[I.] Make a business continuity plan in which that will always make separate sections for
work and or each department. There are some departments or areas section within
companies which can not’t be shut down for a minute or two temporarily because
that can bring huge loss, that section should be immediately started after the
disaster to prevent the loss.
I.[II.] Make a backup of all data so that it can be immediately used for recovery for
important files and folders.
[III.] Engage employee and superiors in training section sessions which deals about with
the steps to maintain optimum security at work. Dos and Don’ts as well as best
practices should be included in these section this secssion so that employees can
understand how they can maintain security at work.
II.[IV.] Use of virus detection and removal tools helps business to identify and mitigate
risk so that they can work in protective environment.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Emerging Trend in Ccyber security
[I.] Banking system upgrades where banking process will be made easier and, simpler but
difficult to hack because its security system is being upgraded in every interval so
that any unethical issues could not affect business continuity. The e time windows
is are designed in such a way that it allows the authority to catch up to the threat
and threat and freeze the fund immediately which allows companies to save their
revenue. Revenue maintenance is very much extremely important for the smooth
running of business and that is possible to be saved if the banking system is being
upgraded to the latest security system.
[II.] The uUse of software tools which can immediately send responses no matter if it is
about the threat or notification which can be needed to upgrade the security
system.
[III.] Anti-activists attacks helps companies to fight from threat and protect the system.
Displacement of workers to a different team or company can cause social issues
and that is not recommended in most of the situations. Activist always plan
smartly to make disruptions and that can be tackled by Anti activist groups in the
companies.
Conclusion
While concluding this research we have come across ill effects of cyber security attacks.
Further w We have also discussed how to strengthen the network and system to be protected
from any kind of unethical activities. As a result of this research, we have found that the use
of software tools and upgrades to of the security system is the current demand of any
business. and not only small but larger All companies should be more alert and attentive
regarding these matters.
Reference
References
Admin, R. (2019). Common Types of Cybersecurity Attacks and Hacking Techniques |
Rapid7. Retrieved from https://www.rapid7.com/fundamentals/types-of-attacks/
5
Document Page
Järveläinen, J. (2019). Information security and business continuity management in
interorganizational IT relationships | Information Management & Computer Security | Vol
20, No 5. Retrieved from
https://www.emeraldinsight.com/doi/abs/10.1108/09685221211286511?
fullSc=1&journalCode=imcs
Nish, D. (2019). Business continuity has a defined role with cyber resilience strategies.
Retrieved from https://www.thebci.org/news/business-continuity-has-a-defined-role-with-
cyber-resilience-strategies.html
Tanner, B. (2019). Three Steps to Integrating Cybersecurity With Business Continuity.
Retrieved from https://www.drj.com/myblog/three-steps-to-integrating-cybersecurity-with-
business-continuity.html
6
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]