Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Executive Summary:
Cyber security has its unique role in securing information in every sector. Protecting information from hackers has become more challenging. The first thing that strikes in mind with the word hacker is cyber threats which is a major concern for every data handling organization. Various policies and regulation acts were being implemented by organizations and governments to prevent cybercrimes. The world is facing and required techniques and technologies to prevent them.
Over the years, the term Cyber Security has gained much importance and become a common part of each one’s life who is associated with a computer or a smartphone device. When people submit their data online, it becomes vulnerable to cyber-attacks or cyber-crimes. Moreover, cyber-attacks can happen over an external-facing DNS server or an internal firewall, which in turn affects the data within the enterprise that inherently causes significant damage to the business of the associated organization. Cyber Security offers security, from unauthorized access or exploitation, through online services to the massive data, associated appliances, and network that is used for communication. The Cyber Security Life Cycle is classified into various phases.
The main element of Cyber Security is the use of authentication mechanisms. For example, a username identifies an account that a user wants to access, while a password is a mechanism that proves the user is who he claims to be. Each year, Check Point Research (CPR) reviews the previous year’s cyber incidents to gather key insights about the global cyber threat landscape.
Introduction:
Introduction to Cyber Security
CYBER SECURITY refers to a set of techniques used to protect the integrity of networks, programs, and data from attack, damage, or unauthorized access. Cyber security is the protection of Internet-connected systems, including hardware, software, and data from cyber-attacks. It is made up of two words one is cyber and the other is security.
Cyber is related to the technology which contains systems, networks,s and programs or data.
Security is related to the protection which includes systems security, network security and application, and information security.
Cybersecurity is a process that’s designed to protect networks and devices from external threats. Businesses typically employ Cyber Security professionals to protect their confidential information, maintain employee productivity, and enhance customer confidence in products and services. Cyber Security involves protecting key information and devices from cyber threats. It is a critical part of companies that collect and maintain huge databases of customer information, social platforms where personal information is submitted, and government organizations where secret, political, and defense information are involved. It describes how personal and key government data is protected against vulnerable attacks that possess threats to important information, may it be on the cloud, or across various applications, networks, and devices.
Background Information:
For nearly two decades after the creation of the world’s first digital computer in 1943, carrying out cyberattacks was tricky. Yet, computer systems have suffered vulnerabilities for much longer. So, Cybercriminals have played a role for a long time as a threat.
Background of Cyber Security
Cybersecurity came into existence as a research project on ARPANET in the year 1972. Bob Thomas, a researcher, invented the first computer virus and named it “Creeper”. The Creeper moved across the network leaving a trail. Wherever it went, it printed the message “I’M THE CREEPER: CATCH ME IF YOU CAN”.
Ray Tomlinson, the inventor of email created the first antivirus called “Reaper”. Reaper would chase and delete the creeper along its trail. In the late 1990s, when the world entered online, computer viruses turned into serious threats from mere academic pranks.
Statement of the Problem Purpose:
Privacy and security of the data will always be top security measures that any organization takes care of. We are presently living in a world where all the information is maintained in a digital or a cyber form. Cybercriminals continue to target social media sites to steal personal data. Not only social networking but also during bank transactions there must take all the required security measures.
The world’s largest email validation company, Verifications.io fell victim to a major data breach due to an unprotected MongoDB database. Data from over 800 emails were exposed, containing sensitive information that included Much personally identifiable information (PII).
Top Countries with Cybercrime Percentage
A lot of money is invested in protecting all this information in an online platform. With the number of people accessing information online increasing each day, threats to the information are also increasing, with the cost of online crimes estimated in billions. Following is an image showing the top 20 countries with appropriate cybercrime percentage levels.
Significance of the Study:
Significance of Cyber Security In every sector cybersecurity has its own Significance to secure companies’ data. Below are the reasons why cyber security is so Significant in what’s become a predominantly digital world:
- Cyber-attacks can be extremely expensive for businesses to endure.
- In addition to financial damage suffered by the business, a data breach can also inflict untold reputational damage.
- Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using more sophisticated ways to initiate cyber-attacks.
- Regulations such as GDPR are forcing organizations into taking better care of the personal data they hold.
Because of the above reasons, cyber security has become an important part of the business and the focus now is on developing appropriate response plans that minimize the damage in the event of a cyber-attack. But an organization or an individual can develop a proper response plan only when he has a good grip on cyber security fundamentals.
Scope of the Study:
Cyber Security is one of the rapidly growing infringements hitting the current reality. Associations and contraptions managing the establishment can be upset on a wide scale. As cyber criminals are ending up being more refined. With the global business environment shifting gears to online and cloud data storage and maintenance, the demand for cybersecurity is at its peak. This has amplified the need for cybersecurity experts, who are adept at and savvy with the latest developments in Artificial Intelligence and Data Science. The scope of cybersecurity has widened significantly in terms of skill sets and jobs.
Limitations of the Study:
Cyber security can be a costly affair as highly trained professionals are required. The latest security patches must be updated regularly with the latest security definitions, which is difficult to keep up with. To keep the system secure, a firewall must be configured appropriately, but it is a difficult task. As several security measures must be implemented appropriately, if done incorrectly it can even block legitimate users of the system.
Providing remote access is an essential element in the business, yet it can become a loophole for the business as the attacker may gain unauthorized access through this network.AI expansion is a challenge for cybersecurity, as robots are being developed in a manner to protect cyber-attacks from happening. Interconnectedness with the advent of IoT is a challenge for cybersecurity, as if the security of one device is compromised, it can easily self-replicate to all the connected devices.
Results and Discussion:
Traditional cyber security vendors often claim that attacks will happen and that there is no way to avoid them. They claim the only thing left to do is to invest in technologies that detect the attack once it has already breached the network and mitigate the damages as soon as possible. With the right technologies in place, most attacks, even the most advanced ones can be prevented without disrupting the normal business flow. Top malicious file types worldwide in 2020. Top malicious file types worldwide 2020 | Statista30480036830000
Conclusion:
Cyber security is a vast topic that is becoming more important because the world is becoming highly interconnected, with networks being used to carry out critical transactions. Cybercrime continues to diverge down different paths with each New Year that passes and so does the security of the information. To summarize, information is a critical part of any organization, and investing in the right service provider keeps businesses in safe hands in the ever-expanding IoT (Internet of Things) world. A scalable and customized cyber security-driven business model includes disaster-recovery capabilities and secures data and the underlying infrastructure of the organization, thus building a safe barrier for the information even before it is attacked and saving the organization from a loss of billions of dollars that could result from the security threat. As there is no perfect solution for cyber-crimes but we should try our level best to minimize them to have a safe and secure future in cyberspace.
Recommendations:
The most basic cybersecurity plan should include the following security practices, at a minimum. The components of this plan are borrowed from the National Institute of Standards and Technology’s framework for improving critical infrastructure cybersecurity.
- Standardized Policies and Procedures
- Proper Identification, Authentication, And Access
- Security Patch Management
- Security Risk Management
LHDs should proactively establish standardized policies and procedures regarding requirements for managing the safety, effectiveness, and security of IT systems, including rules for password protection and data management. The LHD should audit the policies at least once a year to ensure compliance.
LHDs to identify system users and confirm that information is from a trusted source. LHDs should update software packages to fix preexisting bugs or vulnerabilities. The LHD’s computing policy should require that patches be installed as they become available; software companies often alert users or IT managers when a new patch is available.
LHD leaders should understand the IT staff’s process for patch management and communicate to all staff the importance of patch management. These exercises help to identify policies and issues that hinder or support cyber-attack mitigation response. LHD leaders should speak to IT staff about what process is in place to conduct security risk management.
References:
- ‘Cybersecurity [Book] – O’Reilly.’
- https:www.oreilly.comlibraryviewcybersecurity9781633697881.
- ‘Introduction to Cyber Security – Simplilearn.com.’ 01 Apr. 2021, https:www.simplilearn.comintroduction-to-cyber-security-article.
- ‘A Brief History of Cybersecurity | Sentinel One.’ 10 Feb. 2019, https:www.sentinelone.combloghistory-of-cyber-security.
- ‘Statement of the Problem.docx – Statement of the Problem ….’ https:www.coursehero.comfile93140259Statement-of-the-Problemdocx.
- ‘The Significance of Cybersecurity | Cybersecurity Automation.’
- https:www.cybersecurity-automation.comcybersecurity.
- ‘The limitations of Cybersecurity study. – Majestic Grades.’ 06 Jun. 2021, https:www.majesticgrades.comthe-limitations-of-cybersecurity-study.
- ‘Cyber Security Assessment Tools and Methodologies for the ….’ 27 Jan. 2012, https:www.nrc.govdocsML1206ML12060A141.pdf.
- ‘Cybersecurity: Analysis of Issues and Threats.’ 21 Oct. 2021, https:ukdiss.comexamplescybersecurity-issues-threats.php.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.