Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cyber Security Process and Technologies

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

1

Cyber Security Process and Technologies

Author’s Name

The Institutional Affiliation

Course Number and Name

Instructor Name

Assignment Due Date


CYBER SECURITY PROCESS AND TECHNOLOGIES 2

Cyber Security Process and Technologies

Introduction

The revolution in information technology is going concrete in the society. Cybersecurity is

the implementation of technology, procedures and regulations to secure the cyber-attack

mechanisms, networks, services, computers and records. This aims at reducing the possibility

of cyber threats and defending against the malicious device, network and infrastructure abuse.

Cybersecurity aims to secure data networks against unauthorized access and harm or

inaccessibility (Anonymous, 2020). IT departments have to constantly upgrade their

protections based on recent developments in the hazard. IoT, web ransomware, crypto-

jacking, and botnets are key priorities for malicious hackers nowadays (Tarun, 2018). There

were threats of computer manipulation and the illegal use of computer systems. The

perpetrators have continuously established innovative methods for initiating assaults, evoking

the need for creativity and the development of security technologies to maintain the safety of

data in organisations (Tarun, 2018). Firewalls, Virtual Private Networks (VPNs), spam

detection, antivirus, and intrusion detection is part of a more conventional approach to layer

protection (Brandt, 2010). Ransomware helps the intruder to encrypt the device of the client

and malware is a software which damages the device of the customer. Such attacks are

harmful to the country, so to disguise such cybersecurity risks, the private industry is

upgrading its soft wares. For every company, cybersecurity is a complex business problem.

Discussion

Features, Capabilities and Deficiencies of National Defensive Strategy

Cybersecurity is the major issue these days. Many organizations have taken out numerous

strategies to overcome this issue. The National Defense Strategy identifies an inherently

dynamic international security climate, marked by active threats to truly free global order as

well as the re-emergence of long-term, competitive political rivalry (Gov of USA, n.d.).
CYBER SECURITY PROCESS AND TECHNOLOGIES 3

Rapid technical developments and the growing complexity of battle are now impacting the

security climate. The push to build innovative technology remains constant, growing to more

players with lower initial hurdles and running at high pace. The National Cyber Security is

therefore not a single topic; five separate divisions of government are collaborating on five

specific initiatives to render National Defensive Strategy a victory. Counter-Intelligence

operations provide services providing therapy and support. Processes are important in

determining how the operations, responsibilities, and documents of the company are utilized

to minimize the threats of knowledge regarding the enterprise. The goal of this strategy is to

introduce a defence policy primarily aimed at handling knowledge and technical threats,

safeguarding, safeguarding partners ' priorities based on an economic awareness framework

or a comprehensive economic battle (Ghernouti-Hélie, 2010). The key aims are to establish a

safe, robust and reliable electronic operating climate, encourage economic and social

stability, nurture confidence, market and industrial development, resolve ICT risks and

improve technology responsiveness. All such approaches must stay up-to-date as the

environment of cyber challenge continues to change.

Features, Capabilities and Deficiencies of layered Defensive Strategy

Considering the development in information technology and protection technologies

available in today's ever-changing environment, there are varying theories about what is

required to secure a device. Safeguarding the data network from different attacks has been a

crucial feature of protection in information technology as computer networks are becoming

part of daily life. Inside an information systems policy, structured protection may be applied

at any point (Brandt, 2010). A maximum of 48 national cybersecurity strategies (NCSS) was

published in the duration 2013-2016, focused on NATO and ENISA (Teoh & Mahmood,

2017). This method will function with anybody, whether they are a server manager with their

own computer connecting to the internet from any place, or the communications network
CYBER SECURITY PROCESS AND TECHNOLOGIES 4

support desk individual needed by workers with connection problems in the business.

Technology advancement has intensified cybercrime both at the regional and foreign levels.

Threats and problems are growing exponentially, including the increase of cybercrime.

Infrastructure is important when it comes to information defence. When talking about safety

layering, not just each layer can be aimed at for protection. Through defining the security

threats posed by the company, you will start looking at what safeguards you need to put in

action and what tools you need to do so. To promote the economic growth of emerging

economies, the need for effective national operational frameworks to cope with cybersecurity

problems is now critical.

Comparison of Layered Security vs Defence and benefits of Implementing Defensive

Strategy

Comparison

Layered Security Defence Strategy

A method of ensuring several systems are One feature of its strategy will be a multi

placed in order to capture some component layered systematic approach where layered

missing at the moment of a cyberattack. defence.

If there is a mistake at one point, there are Defence in Depth is more interested than

more levels to trap the attack, or at least with the extreme threat but considers a

delay. larger and more complex security source.

Focus levels typically involve: Perimeter Focus rates include: surveillance & alert,

Protection, Network Safety, Device emergency management, approved

Protection, Computer Safety and Physical personnel operation, recovery of accidents,

Security documentation of illegal activities and

forensic investigation
CYBER SECURITY PROCESS AND TECHNOLOGIES 5

Benefits of Protection, Detection, prevention of Incidents

Common Defence strategy specifies that an individual who just accesses the data and does

not modify or manipulate it must be a robbery suspect, and no other offence will be

committed against the attacker. There will be regional technology initiatives, as well as

domestic and multinational approaches for combating cybercrime from a global viewpoint.

Another benefit is that if one program fails, then other systems must operate (Elamawy,

2017). Safety in any particular form in software program is difficult to ensure; there are often

bugs and vulnerabilities. Not only is a defensive technique vital to large organisations in

general, but businesses will turn to one in order to defend themselves entirely as soon as

possible.

Products Recommended for Implementing the Defensive Security Strategy

Technologies have been made as to products to implements the strategies’. Systems must

always be monitored continuously: security challenges evolve constantly and systems will

adjust with them (Dutton, 2017). NIST also set up a Smart Grid Cyber Safety Coordination

Task Group (CSCTG), which currently includes over 200 voluntary representatives from the

domestic and foreign industries, academics, governmental authorities and government

agencies (Lee & Brewer, 2009). This has implemented the capacity for spatial awareness, to

enable shareholders to respond quickly in cybersecurity emergencies. Several federal

departments engage strongly in both financing and undertaking work to establish protective

techniques and solutions to counter chemical / biological risks (National Research Council.,

2006). Big data analysis was used in the applications to detect unusual actions by a customer.

In case of a good hack, cyber-attackers can't commercialize the results. Data can be

transferred and utilized safely around the expanded organization— business operations and

analyses can be conducted on the information in its safe state, reducing transparency and

vulnerability significantly.
CYBER SECURITY PROCESS AND TECHNOLOGIES 6

Cybersecurity Objectives Supported by Products

The block chain system operates based on authentication between the two parties to the deal.

Similarly, the information protection system operates on the grounds of the peer-to-peer

network principles of the system application. Deep learning incorporates a range of

innovations, including artificial intelligence and machine learning and was implemented to

overcome cybersecurity issues.

Five Examples and its impact on IT

1. The Transportation Security Agency, which is responsible for the federal regulation of

U.S. airports ' security activities, will incorporate defensive plans against chemical /

biological threats into the overall protection strategy to secure the U.S. air transport

network. The authority line and responsibility should be specifically described for

executing such strategies (National Research Council., 2006).

2. The Transportation Security Administration would establish a strong-level working

group to conduct the security tasks, in coordination with other related agencies inside

the Department of Homeland Security.

3. The Transportation Safety Administration will keep up with current work on chemical

and biological detection technology without undertaking an in-house R&D operation.

Then it will aim to exploit other organizations ' study programs.

4. There has to be a safer method of verification. One approach is to integrate

verification into hardware for a customer.

5. The corporation should guarantee that even if one program crashes, the mechanism

itself is also secured by the usage of several mechanisms to minimize losses.


CYBER SECURITY PROCESS AND TECHNOLOGIES 7

Conslusion

Cybercrime was initially a negative innovation. This was initiated to obtain revenue through

illegal means. Theft of data, harassment, internet theft or deception, trolling, botnets and

other similar forms have been a danger to humanity and the networks. To eradicate

cybercrime various laws have been implemented and applied. Cybercrime poses a still-

present danger to companies of all sizes. To secure themselves against several effective data

thefts, IT teams need to keep a place ahead of cyber attackers by protecting against a flood of

big-volume, extremely complex threats. Many thought in terms of technologies and

resources, about a complex solution to cybersecurity. Companies will hold daily training

exercises during the year to keep workers aware of possible threats and the areas in which

they may protect their companies. Some of the approaches to improve faith and trust in

cyberspace is to introduce regional information defence policies that tackle cybersecurity

concerns. Education programmes such as this can build a good safety community and will go

a long way towards mitigating risks. The current architecture of the cybersecurity comprises

of several laws. Some of these are very effective while others need some amendments to

overcome the failures. The sharing of cyber information is a single piece to achieve the goal

of prevention from the cyberattacks.

References

Lee, A., & Brewer, T. (2009). Smart grid cybersecurity strategy and requirements. Draft

Interagency Report NISTIR, 7628.

http://oemmndcbldboiebfnladdacbdfmadadm/https://www.hsdl.org/?view&did=33561

Anonymous. (2020). Cyber Security. Itgovernance.co.uk.

https://www.itgovernance.co.uk/what-is-cybersecurity.

Dutton, J. (2017). Three pillars of cyber security - IT Governance UK Blog. IT Governance

UK Blog. https://www.itgovernance.co.uk/blog/three-pillars-of-cyber-security.
CYBER SECURITY PROCESS AND TECHNOLOGIES 8

Ghernouti-Hélie, S. (2010). A National Strategy for an Effective Cybersecurity Approach and

Culture. 2010 International Conference On Availability, Reliability And Security.

https://doi.org/10.1109/ares.2010.119

Tarun, R. (2018). A Layered Approach to Cybersecurity: People, Processes, and Technology.

CSO Online. Retrieved 12 March 2020, from

https://www.csoonline.com/article/3326301/a-layered-approach-to-cybersecurity-

people-processes-and-technology.html.

Teoh, C., & Mahmood, A. (2017). National cyber security strategies for digital

economy. 2017 International Conference On Research And Innovation In

Information Systems (ICRIIS). https://doi.org/10.1109/icriis.2017.8002519

Brandt, O. (2010). Layered Security Solutions Over Dependency Within Any Layer. All
Regis University Theses.. Retrieved 16 March 2020, from
https://epublications.regis.edu/cgi/viewcontent.cgi?article=1287&context=theses.
Elamawy, S. (2017). Cyber Security Tips - The Importance of a Defense-in-Depth Strategy -
CWPS. Cwps.com. Retrieved 16 March 2020, from https://www.cwps.com/blog/cyber-
security-tips-the-importance-of-a-defense-in-depth-strategy.
Gov of USA. Dod.defense.gov. Retrieved 16 March 2020, from
https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-
Summary.pdf.
National Research Council. (2006). Defending the U.S. air transportation system against
chemical and biological threats. National Academies Press.

You might also like