Information Security and Cybersecurity Challenging Issues (ISCSCIs) are a top priority for all organizations nowadays. No organisation can afford to ignore information about ICSCIs. Hackers or...

1 answer below »
Information Security and Cybersecurity Challenging Issues (ISCSCIs) are a top priority for all organizations nowadays. No organisation can afford to ignore information about ICSCIs. Hackers or imposters target highly vulnerable information systems and poorly managed security risk systems can cause organizations to lose company funds and customers’ confidential data or records. Many business owners have realised the importance of optimising their systems to keep them safe and secure and approached Mission Impossible Cyber Team (MICT) for advice. MICT management believes that research must be conducted on the sources of such information prior to making any recommendations to their clients. You are employed by MICT as a junior cybersecurity analyst, and your security manager has asked you to investigate one business from the healthcare, government agency, finance, education or SMEs industry that has encountered an information security issue or a cyberattack before and write a report that includes recommendations for addressing the cybersecurity threat. Your recommendations can include ideas from information security best practices, tools, techniques, mechanism, and measures that were discussed from week 1 to week 6 Webinar. TASK You will research articles based on one of following criteria and summarise two factors that contribute to information security or cybersecurity risks: 1. Articles which explain the importance of information security in achieving organisational goals and objectives. 2. Articles which show explain appropriate governance, assurance and internal control techniques for managing information risks and security. 3. Articles which show on assessing security management standards and frameworks to real-word case-based scenarios 4. Articles which show an understanding and applying major theories, concepts and methodologies for assuring the integrity and security of information assets; From each article, highlight two factors related to Information Security or Cybersecurity that were reported on the Internet. Each factor must be discussed in the report. What to research: You research articles related to two ISCSC issues (e.g. two factors) . These two issues can be related to technology, people, process and practices. For each ISCSC issue, you must clearly state its category and justify how it critically affects organisations. Please see marking guide below. Where to do your research: Restrict your research to information security or cybersecurity case studies and incidents published on the Internet during the period 2016-2020. How much research to do: Do not rely on a single source of information. You should consult a minimum of two sources about the impact and synthesise your understanding from these sources.
Answered Same DayOct 02, 2021

Answer To: Information Security and Cybersecurity Challenging Issues (ISCSCIs) are a top priority for all...

Umakant answered on Oct 03 2021
143 Votes
Introduction
Currently millions of data generated by system in daily basis and this critical data must be secured. So, data security store data into data center and only authorized person can access the data from this information security system center anywhere and anytime. In case, if we are not able to access this data center or due to some circumstance, then always have a policy to diverts all resources or request forward, so work should not b
e blocker.
Cyber security, Computer security and information technology security these three are used to protect the system and network from unamortized user or can say from theft. They can damage their hardware, electronic or digital data or damage to their hardware.
Information Security is one kind of security, refers to the methodologies and processes in terms of network. which are typically designed and implemented to protect digital electronic media, print, and all connected device in form of the confidential privacy data, private information and data sensitive information. Electronics data from unauthorized access can be modification, disclosure, disruption, misuse or destruction. Another big challenge of cyber security is dealing with the dynamically increasing the number overlap between the dynamic physical and virtual worlds of sensitive information exchange data between multiple media. As take an example, driverless vehicles and other self-regulated electronic or smart devices become the normal. Latest technology the Internet of Things (IoT) business policies give criminals more access to these cyber-physical systems.
Importance of information security
For Large number of organizations, privacy data is their critical thing and becomes most important asset, so protecting it is crucial. Information security can be defined as “the practice of preventing unauthorized access i.e. can access to authorized person only, can use, disruption, inspection, disclosure, recording, modification or destruction of this critical information”. Information can take in many forms, such as physical and electronic. These Information securities (IT) security can performs four important roles:
1. Protects the multi-level organization data collects and uses.
2. Protects the organization’s ability to function.
3. Enables the safe side operation of existing download applications already implemented on the organization’s internal IT systems.
4. Safeguards the technology the organization uses.
Internal control techniques for managing information risks and security
When any one of them thinks to securing information organization risk and security, then the initial steps to proceed that they would come across is to create a strong password that is tough to crack like strong password consist of at least 8 to 12 characters long and combination of letter, numeric and some special character.(often so tough that the user forgets it!). after some interval of time these passwords should be change. Password should be share with any member as well as not to write in any platform where anyone can reach and guess your password.
To combat this critical situation, organizations are investing in cyber or information security protocols and digital frontiers. However, some organization believe that information security is a burden.
Following reasons why investing in information security is significant:
    Increasingly sophisticated attackers
    Number of cyber-attacks are increasing day by day Like DDoS, ransom and malware.
    Rising cost of breaches
    Cost of a breach = actual financial loss + cost of incident handling
Globally average cost of breaches is $31.26 million, in which the United States is leading with $4.11 million dollar.
    Funded hackers and wide availability of hacking tools
    Intellectual property threats account in every year by 26% of more than $650 billion cost of cybercrime to our world economy. The commercial of cybercrime provides easy access to the resources that needs to be launch severe attacks
    Regulatory compliances
    Not just only breaches but the regulatory laws declare by world security core member, like GDPR, they also enforce information security team to measures. The violation of these compliances may be cost heavily to the business’s perspective.
    Proliferation of IoT devices
    IoT (Internet of Things) is an easiest way for cyber criminals entered into the business. IoT devices are expected to grow to 23.4 billion by 2020 with $167 billion annual investment till 2023 on their...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here