Addressing Cybersecurity Risks: Threats, Reporting, and Solutions

Verified

Added on  2022/09/27

|1
|557
|17
Homework Assignment
AI Summary
This document addresses cybersecurity risks and the reasons behind cyber attacks, emphasizing the importance of the information security cycle for protecting data and assets. It categorizes cyber attackers into insiders and outsiders, detailing their motivations and methods. The document outlines essential security measures, including regular system updates, encryption, complex passwords, and intrusion detection systems. Furthermore, it fulfills the assignment brief by researching and presenting policies for reporting spoofed emails from three different companies, providing links and procedures for each, demonstrating a practical application of security awareness and reporting protocols.
Document Page
Addressing cyber security risks
Reason behind the attacks
Type of cyber attackers
Information Security Cycle
Information security cycle has to be maintained
by major commercial establishments as well as
in our society so that essential data, online
assets and the intellectual properties can be
secured from the cyber threats (Assal &
Chiasson, 2018).
Policy management and asset management are
the two most significant contribution of this
cycle (Alshaikh et al., 2016).
References
Addressing cyber security
There are diverse categories of cyber
attackers who are primarily responsible
for most of the cyber attacks such as the
insiders and the outsiders (Khaloufi et al.,
2018).
The threats coming from the insiders are
mainly from the trusted employees of the
cloud service providers, careless
employees working with essential data,
disgruntled employees and the malicious
insiders (Huang et al., 2019).
The threats coming from outside are
mainly from the social engineers, amateur
hackers and organized criminal groups
(Eckhart et al., 2019).
Alshaikh, M., Maynard, S. B., Ahmad, A., & Chang, S.
(2016). Information Security Policy: A Management
Practice Perspective. arXiv preprint arXiv:1606.00890.
Assal, H., & Chiasson, S. (2018). Security in the
software development lifecycle. In Fourteenth
Symposium on Usable Privacy and Security ({SOUPS}
2018) (pp. 281-296).
Eckhart, M., Ekelhart, A., Lüder, A., Biffl, S., &
Weippl, E. (2019, October). Security Development
Lifecycle for Cyber-Physical Production Systems. In
IECON 2019-45th Annual Conference of the IEEE
Industrial Electronics Society (Vol. 1, pp. 3004-3011).
IEEE.
Huang, Y., Bian, Y., Li, R., Zhao, J. L., & Shi, P.
(2019). Smart contract security: A software lifecycle
perspective. IEEE Access, 7, 150184-150202.
Khaloufi, H., Abouelmehdi, K., Beni-hssane, A., &
Saadi, M. (2018). Security model for Big Healthcare
Data Lifecycle. Procedia Computer Science, 141, 294-
301.
Safa, N. S., Von Solms, R., & Furnell, S. (2016).
Information security policy compliance model in
organizations. computers & security, 56, 70-82.
Security patches of the computer systems has to be
checked and updated in a regular basis.
All the transactional data has to be encrypted .
Complex alphanumeric passwords must be used in
the systems which have essential documents.
Limiting the number of login attempts of the
organizational portal or cloud account.
Creation of a kill switch in the private network
Setting up of a password management system.
Reject automated backup facilities.
Incorporation of Intrusion Detection System
There are numerous reasons behind
the conduction of a cyber attack
such as vulnerabilities in the
business financial documents,
financial details of the consumers,
sensitive personal information
which are stored in an
organizational databases and
vulnerabilities in the intellectual
properties (Safa, Von Solms &
Furnell, 2016). USA UK Australia
0
2
4
6
8
10
12
Increased cyber attacks over the years
2018 2019 2020
Two factor
authentication
Advanced
threat
prevention
Investing in
cyber security
insurance
Data
encryption at
rest
Dedicated
firewall
management
Training
sessions for
the employees
Virtual private
Network
Unified log
management
Anti malware
solution
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
[object Object]