Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Cybersecurity frameworks may differ significantly depending on the way in which the data is stored. Data servers may require regular supervision and maintenance, whereas usage of the cloud partially delegates cybersecurity to the service provider (Michels and Walden 383). Hence, it may be essential to thoroughly analyze the market and choose the most secure and cost-efficient option. However, regardless of the storage method, it may be vital to address several internal and external cyber threats.
The human factor plays a considerable role in the reliability of cybersecurity, as both user error and abuse of access-related privileges represent cyber threats. First, it may be highly beneficial to educate employees about cybersecurity in order to mitigate the probability of errors. Second, software-defined networking should be utilized to improve network visibility and flexibility. Software-defined networking can also be used to implement micro-segmentation, which may separate secure networks from public networks and prevent cybersecurity breaches by limiting the ability to access secure data from the public segment (Bakhshi 15). Therefore, both employees and external users will be able to access only the data they need.
It is also essential to introduce a comprehensive approach to external cybersecurity threats. A wide variety of threats, including ransomware, social engineering, malware, cloud security breaches, and phishing attacks, should be considered (Alsmadi 229). It may be highly beneficial to rely on third-party cybersecurity providers as they have extensive experience in the field and they may reduce security-related costs. Such providers as Cisco ASA, FortigGate, Sophos, and Meraki offer reliable firewalls for enterprises of different sizes. Nonetheless, it is critical to analyze the cybersecurity landscape in order to identify the most appropriate firewall in terms of both hardware and software.
Works Cited
Alsmadi, Izzat. The Nice CyberSecurity Framework: Cyber Security Intelligence and Analytics. Springer, 2019.
Bakhshi, Taimur. State of the Art and Recent Research Advances in Software Defined Networking. Wireless Communications and Mobile Computing, vol. 2017, 2017, pp. 135. Web.
Michels, Johan David, and Ian Walden. Cybersecurity, Cloud, and Critical Infrastructure. Cloud Computing Law, 2021, pp. 382418. Web.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.