Cyber Security Assignment - Introduction to Cyber Security, 2024

Verified

Added on  2022/11/25

|3
|415
|7
Report
AI Summary
This report delves into the realm of cyber security, focusing on key compliance frameworks and defensive strategies. The assignment explores the importance of frameworks such as PCI, HIPAA, DSS, SOX, and GLBA, and their roles in safeguarding sensitive data and ensuring regulatory adherence. It also examines the significance of proactive IT solutions, including anti-spyware, antivirus, firewalls, network access control, DNS filtering, and exception alerts, in fortifying cyber defenses. The report emphasizes the need for intelligent business continuity systems to facilitate recovery from potential breaches and the importance of establishing clear access guidelines for supply chain vendors. Overall, the assignment provides a comprehensive overview of cyber security measures, emphasizing the need for robust strategies and compliance to mitigate risks and protect critical assets. The report also includes references to provide additional context to the concepts discussed.
Document Page
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY 1
Question 1:
Use of top the top five-compliance framework:
PCI: Processes, stores and transmits the data of the cardholders as well as it covers the
operational and technical system components that are included to the data of the cardholders.
HIPAA: Protects the coverage of Health Insurance for the workers as well as their families.
DSS: If a business processes or accepts, card payment that have to comply with the DSS.
SOX: Login failures, Login history, Group and GPO management, Administrative User
actions for an organization.
GLBA: This framework applies to the appraisers of the real estate, non bank mortgage
lenders, loan brokers and return preparers.
The compliance framework is so much important, as the concept is that the
organizations have to obtain the evidence of the compliance with laws, standards, regulations
and stated policies. At the time the organisations faces third party or privileged access that
becomes one apparent nightmare for ensuring the authorized access. The compliance
frameworks provides security against the cyber-attack.
Question 2:
The experts businesses themselves by implementing defensive and proactive IT
strategies consistently. It is including the IT solutions that are standard such as anti-spyware,
antivirus and the technologies that are related to the firewall. However, the IT related
technologies that are advanced, including network access control, DNS filtering and the
altering of exception are some incredible resources for securing and providing tough
Document Page
2CYBER SECURITY
protection as well as for controlling the external resources consistently. The business
continuity systems that are intelligent would be implemented for allowing for a full recovery
in the incident of any type of breach. By implementing extensive, proactive and validated
Security solutions that are related to IT and to establish limited and clear access guidelines
for the vendors of supply chain, provide great defence against the cyber-attack.
References:
Almuhammadi, S., & Alsaleh, M. (2017). Information Security Maturity Model for Nist
Cyber Security Framework. Computer Science & Information Technology, 51.
Henrie, M. (2013). Cyber security risk management in the SCADA critical infrastructure
environment. Engineering Management Journal, 25(2), 38-45.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]