Cyber Security Process and Technologies
Cyber Security Process and Technologies
Cyber Security Process and Technologies
Author’s Name
Instructor Name
Introduction
mechanisms, networks, services, computers and records. This aims at reducing the possibility
of cyber threats and defending against the malicious device, network and infrastructure abuse.
Cybersecurity aims to secure data networks against unauthorized access and harm or
protections based on recent developments in the hazard. IoT, web ransomware, crypto-
jacking, and botnets are key priorities for malicious hackers nowadays (Tarun, 2018). There
were threats of computer manipulation and the illegal use of computer systems. The
perpetrators have continuously established innovative methods for initiating assaults, evoking
the need for creativity and the development of security technologies to maintain the safety of
data in organisations (Tarun, 2018). Firewalls, Virtual Private Networks (VPNs), spam
detection, antivirus, and intrusion detection is part of a more conventional approach to layer
protection (Brandt, 2010). Ransomware helps the intruder to encrypt the device of the client
and malware is a software which damages the device of the customer. Such attacks are
harmful to the country, so to disguise such cybersecurity risks, the private industry is
upgrading its soft wares. For every company, cybersecurity is a complex business problem.
Discussion
Cybersecurity is the major issue these days. Many organizations have taken out numerous
strategies to overcome this issue. The National Defense Strategy identifies an inherently
dynamic international security climate, marked by active threats to truly free global order as
well as the re-emergence of long-term, competitive political rivalry (Gov of USA, n.d.).
CYBER SECURITY PROCESS AND TECHNOLOGIES 3
Rapid technical developments and the growing complexity of battle are now impacting the
security climate. The push to build innovative technology remains constant, growing to more
players with lower initial hurdles and running at high pace. The National Cyber Security is
therefore not a single topic; five separate divisions of government are collaborating on five
operations provide services providing therapy and support. Processes are important in
determining how the operations, responsibilities, and documents of the company are utilized
to minimize the threats of knowledge regarding the enterprise. The goal of this strategy is to
introduce a defence policy primarily aimed at handling knowledge and technical threats,
or a comprehensive economic battle (Ghernouti-Hélie, 2010). The key aims are to establish a
safe, robust and reliable electronic operating climate, encourage economic and social
stability, nurture confidence, market and industrial development, resolve ICT risks and
improve technology responsiveness. All such approaches must stay up-to-date as the
available in today's ever-changing environment, there are varying theories about what is
required to secure a device. Safeguarding the data network from different attacks has been a
part of daily life. Inside an information systems policy, structured protection may be applied
at any point (Brandt, 2010). A maximum of 48 national cybersecurity strategies (NCSS) was
published in the duration 2013-2016, focused on NATO and ENISA (Teoh & Mahmood,
2017). This method will function with anybody, whether they are a server manager with their
own computer connecting to the internet from any place, or the communications network
CYBER SECURITY PROCESS AND TECHNOLOGIES 4
support desk individual needed by workers with connection problems in the business.
Technology advancement has intensified cybercrime both at the regional and foreign levels.
Threats and problems are growing exponentially, including the increase of cybercrime.
Infrastructure is important when it comes to information defence. When talking about safety
layering, not just each layer can be aimed at for protection. Through defining the security
threats posed by the company, you will start looking at what safeguards you need to put in
action and what tools you need to do so. To promote the economic growth of emerging
economies, the need for effective national operational frameworks to cope with cybersecurity
Strategy
Comparison
A method of ensuring several systems are One feature of its strategy will be a multi
placed in order to capture some component layered systematic approach where layered
If there is a mistake at one point, there are Defence in Depth is more interested than
more levels to trap the attack, or at least with the extreme threat but considers a
Focus levels typically involve: Perimeter Focus rates include: surveillance & alert,
forensic investigation
CYBER SECURITY PROCESS AND TECHNOLOGIES 5
Common Defence strategy specifies that an individual who just accesses the data and does
not modify or manipulate it must be a robbery suspect, and no other offence will be
committed against the attacker. There will be regional technology initiatives, as well as
domestic and multinational approaches for combating cybercrime from a global viewpoint.
Another benefit is that if one program fails, then other systems must operate (Elamawy,
2017). Safety in any particular form in software program is difficult to ensure; there are often
bugs and vulnerabilities. Not only is a defensive technique vital to large organisations in
general, but businesses will turn to one in order to defend themselves entirely as soon as
possible.
Technologies have been made as to products to implements the strategies’. Systems must
always be monitored continuously: security challenges evolve constantly and systems will
adjust with them (Dutton, 2017). NIST also set up a Smart Grid Cyber Safety Coordination
Task Group (CSCTG), which currently includes over 200 voluntary representatives from the
agencies (Lee & Brewer, 2009). This has implemented the capacity for spatial awareness, to
departments engage strongly in both financing and undertaking work to establish protective
techniques and solutions to counter chemical / biological risks (National Research Council.,
2006). Big data analysis was used in the applications to detect unusual actions by a customer.
In case of a good hack, cyber-attackers can't commercialize the results. Data can be
transferred and utilized safely around the expanded organization— business operations and
analyses can be conducted on the information in its safe state, reducing transparency and
vulnerability significantly.
CYBER SECURITY PROCESS AND TECHNOLOGIES 6
The block chain system operates based on authentication between the two parties to the deal.
Similarly, the information protection system operates on the grounds of the peer-to-peer
innovations, including artificial intelligence and machine learning and was implemented to
1. The Transportation Security Agency, which is responsible for the federal regulation of
U.S. airports ' security activities, will incorporate defensive plans against chemical /
biological threats into the overall protection strategy to secure the U.S. air transport
network. The authority line and responsibility should be specifically described for
group to conduct the security tasks, in coordination with other related agencies inside
3. The Transportation Safety Administration will keep up with current work on chemical
5. The corporation should guarantee that even if one program crashes, the mechanism
Conslusion
Cybercrime was initially a negative innovation. This was initiated to obtain revenue through
illegal means. Theft of data, harassment, internet theft or deception, trolling, botnets and
other similar forms have been a danger to humanity and the networks. To eradicate
cybercrime various laws have been implemented and applied. Cybercrime poses a still-
present danger to companies of all sizes. To secure themselves against several effective data
thefts, IT teams need to keep a place ahead of cyber attackers by protecting against a flood of
resources, about a complex solution to cybersecurity. Companies will hold daily training
exercises during the year to keep workers aware of possible threats and the areas in which
they may protect their companies. Some of the approaches to improve faith and trust in
concerns. Education programmes such as this can build a good safety community and will go
a long way towards mitigating risks. The current architecture of the cybersecurity comprises
of several laws. Some of these are very effective while others need some amendments to
overcome the failures. The sharing of cyber information is a single piece to achieve the goal
References
Lee, A., & Brewer, T. (2009). Smart grid cybersecurity strategy and requirements. Draft
http://oemmndcbldboiebfnladdacbdfmadadm/https://www.hsdl.org/?view&did=33561
https://www.itgovernance.co.uk/what-is-cybersecurity.
UK Blog. https://www.itgovernance.co.uk/blog/three-pillars-of-cyber-security.
CYBER SECURITY PROCESS AND TECHNOLOGIES 8
https://doi.org/10.1109/ares.2010.119
https://www.csoonline.com/article/3326301/a-layered-approach-to-cybersecurity-
people-processes-and-technology.html.
Teoh, C., & Mahmood, A. (2017). National cyber security strategies for digital
Brandt, O. (2010). Layered Security Solutions Over Dependency Within Any Layer. All
Regis University Theses.. Retrieved 16 March 2020, from
https://epublications.regis.edu/cgi/viewcontent.cgi?article=1287&context=theses.
Elamawy, S. (2017). Cyber Security Tips - The Importance of a Defense-in-Depth Strategy -
CWPS. Cwps.com. Retrieved 16 March 2020, from https://www.cwps.com/blog/cyber-
security-tips-the-importance-of-a-defense-in-depth-strategy.
Gov of USA. Dod.defense.gov. Retrieved 16 March 2020, from
https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-
Summary.pdf.
National Research Council. (2006). Defending the U.S. air transportation system against
chemical and biological threats. National Academies Press.