Sunday, December 8, 2019
IT Infrastructure Management
Question: Research study on Cyber Security, Business Continuity and Compliance. Answer: Abstract: One of the major issues in today IT world is Cyber Attack. Wang and Lu, (2013) opined that Cyber security is the type of protection of different information system from doing different types of damages and thefts of both the software and hardware and also different types of misdirection and disruption of provided services. To stop and mitigate these types of attacks proper types of security measures are needed. This report reflects about the types of risks and different mitigation strategies that are used to mitigate the risks with different possible solutions needed in the business organization. Index terms: hacking, cyber security, firewall, business continuity Introduction Now days with the rapid technological advancements the large areas of different potential sources and different new opportunities the cyber security mainly defined for doing the protection of networks, systems and data of cyberspace. On the other side, Younis, and Kifayat, (2013) opined that cyber security is mainly referred to different information technological security and also focused on the process of protecting networks, computers and data from different nature of unauthorized accesses and destruction. The process of cyber security mainly enforced in different business operations in terms of protecting the confidential resources and data (Dutt, Ahn, Gonzalez, 2013). Different types of cyber security software are available in the markets which are not getting sufficient to provide appropriate security on office networks. According to Kolkowska, Dhillon, (2013), cyber security process is mainly adopted for the protection of lots of confidential data and information of business organization. Based on collected reports, lost of confidential information of large business organization gets affected due to unethical cyber attacks in the every year. This particular report mainly reflects about the types of cyber attacks and effects of cyber attacks (Verlinde Verlinde, 2013). It also discussed about different security measures that are implemented in doing the protection from all these cyber attacks and business compliance implicated in the context are discussed. Cyber Security: Business Continuity, Compliance and Impacts on IT System Cyber Security: According to Liu et al., (2012), cyber security is one of the information systems which is implemented for doing domestic purposes in terms of preventing different cyber attacks with the help of different internet sources. The main aim of this system is to protect all types of types of unethical attacks and the protection of all confidential information stored in the system. The process of cyber security system discussed about the development of firewall in term of preventing malicious file to enter, virus source detection, and different types of antidote software for doing the decryption and deletion of virus effected files (Liu et al., 2012). It also discussed that in the cloud storage device, all documents are stored in the cloud online virtual interface. Compliance of Business Systems According to Kott and Arnold, (2015), cyber security system gets developed for doing the protection of different important documents as well as confidential information of business organization. Based on the collected report, large organization loses lots of critical documents due to different types of unethical cyber attacks. Tran et al., (2013) also discussed that cyber security rules emphasized to ensure the firewall system of company systems in terms of penetrating different malicious files to enter the system. The company must also comply with different security guidelines to guarantee the security of stored documents. Business Continuity The process of business continuity mainly defined with the help of different actions plans, contingency design and concerned security plan implemented by business organization (Liu et al., 2012). All business organization needs to have definite action plan to implement the new system. It also endured proper security system to ensure the safety of critical documents and protection from infection of malicious plans. Some of the aspects of contingency business discussed below (Tran et al., 2013): Recovery: It helps to destroy different types of malicious files from entering to the system and recovering the lost materials. Flexibility: It ensure to boost up the systems defense against different cyber attacks Contingency: The active actions plan is placed to retrieve original state of system at the time high priority cyber attacks which forced the system to the common network. All these three aspects are get implemented in terms of maintaining the continuity of the business in commercial organizations (Venkatesh, Thong Xu, 2012). Effects on Information technology: Based on the increasing number of cyber attacks and hacking, this particular topic became one of the important concerns. Based on these attacks, the large number of information and different important documents get lost every year (Venkatesh, Thong Xu, 2012). It caused huge damage in the IT sectors. Based on large scale of multinational business organizations, all attacks damages the reputation and competitiveness by doing the leakage of different business strategies and confidential files. Therefore, the effective security system should get designed in the proper manner to protect the It industry from different unethical hackers (Holtshouse, 2013). Conclusion This particular study concludes that cyber security is mainly referred to security system which is employed in various domestic internet networks and offices. The basic goal of the system is to protect all unethical attacks and to prevent all types of confidential documents stored in the system. Depending on the implementation strategies of different cloud storage system, the significance of cyber security increased more when the cloud system becomes susceptible of cyber attacks. In this study, it also discussed about different cyber security software which get available in market, which are not get sufficient to provide best security in the office networks. Apart from that, it also discussed about different types of unethical hackers which gets developed for doing stronger and better hacking tools to break the systems. That is why; it deduced that more types of cyber security systems need to be designed for the protection of the industry from different types of security breaches and kind of unethical hackers. Turnitin Test Answer 1: In the turnitin test, it did not found any types of originality and matches of relevant ideas and existing works. Both bold matches and colored also not been identified Answer 2: No similarities with the existing articles is also identified Answer 3: No types of direct quotation is used in the assignment Answer 4: The types of in-text citation also used from the authenticated and authorized sources Answer 5: No types of similarities also identified in the entire assignment Answer 6: All the references and sources are used to gather knowledge and ideas which are provided under the reference header References Mo, Y., Kim, T. H. J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B. (2012). Cyberphysical security of a smart grid infrastructure. Proceedings of the IEEE, 100(1), 195-209. Sheoran, P., Singh, S. (2014). Applications of Ethical Hacking. International Journal of Enhanced Research in Science Technology Engineering, 3(5), 112-114. Tran, S. T., Le Ngoc Thanh, N. Q. B., Phuong, D. B. (2013). Introduction to information technology. In Proc. of the 9th inter. CDIO conf.(CDIO). Venkatesh, V., Thong, J. Y., Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 36(1), 157-178. Verlinde, E., Verlinde, H. (2013). Passing through the Firewall. arXiv preprint arXiv:1306.0515. Wang, W., Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), 1344-1371. Younis, M. Y. A., Kifayat, K. (2013). Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.