Recommendation of solution report

1 answer below »
Recommendation of solution report
Answered 3 days AfterApr 22, 2021

Answer To: Recommendation of solution report

Neha answered on Apr 25 2021
153 Votes
Subject Code
Subject Name
Title
Date
Word Count
Student Name
Student Id
Email Address
Subject Coordinator
Facilitator
Contents
Introduction    2
Reduce relying over information technology    2
Know that security has been penetrated    4
Detection    4
Assessment    6
Policy Framework    7
Conclusion    9
References    9
Introduction
In this report we will study about the security concerns present in the global mall and how we can overcome it. In the first part of the report, we discusse
d different types of securities and validity present in the global mall. In this report we will discuss how we can improve the cyber security for mall. The business currently is not using encryption which can keep their data safe, and it does not have any proper security system to find out the value represent in their software. This can result in data breach and also like some sensitive information out of the organization.
This can be a greater bad impact for the customer experience as the organization is currently not paying complete attention to the cyber security. There are different types of methods which has been used by the tackers to attack over the global malls. In this report we will discuss how we can improve the cyber security by following different types of methods and also propose for policy of the framework which can be used by the global mall to make sure that they have security environment.
Reduce relying over information technology
The very basic method which can be utilised by the organization for improving the cyber security is to reduce the usage of the information technology when we are having critical context. Advantage of the usage of information technology should be heavier than the security risk which can be present in the technology. There are few cases in which security this risk cannot be removed for the sufficient degree and it is important that we can reject at least the information technology which we are using. There are other cases also in which the security risk can be mitigated easily with some degree of the effort and expense and this cost can be used as the factor to take the decision whether we you should use information technology or not. But they should not happen as the security risk was not ignored completely.
For example, to reduce the rely over information technology is a great decision and it can be used to refrain from getting connected with the computer system to the Internet and even if not connected this can increase the cost on decrease the overall utility of the system. Get theory which is present under this type of decision is the absence of Internet connection for the computer and it will not allow the intruders to get access of the system and hence the whole information present in computer system will be safe.
The lack of such type of connection can reduce the attackers’ impact but it cannot prevent it completely and has the safety of the system cannot be taken for the granted in future. This disconnection from the Internet can be helpful in some of the circumstances. If we talk at the broader level, then we can use the supervisory control and data acquisition system in some of them are connected with the computer. These types of systems can be used to control different elements which are present in the physical infrastructure. The physical structure can be the chemical plants, oil pipelines, gas pipelines or many others. The infrastructure operators are allowed to connect their SCADA system with the Internet to provide communication between them and the communication hardware will be best over the Internet protocols which are least expensive, and it is the manner in which we can provide the communication.
But the Internet connections always have the potential to provide the access path to the SCADA systems which can be used by the attackers. It is important to note that if we are disconnected from the Internet then it is not easy to accomplish. The SCADA system can be disconnected from the Internet but when we connect these types of system with the administrative computer then they itself gets connected with the Internet which means that SCADA systems are indirectly connected with the Internet.
Know that security has been penetrated
Detection
When we are working over the individual system all like the network operator then the worst thing to face is getting penetrated and not knowing any information about it. It is very important for the organization to detect the target of the hostile cyber operation and it is the first step which we can perform for the remedial action. The detection in was taking a decision that something like some action of the file is harmful or not harmful.
We can take such type of decisions, but they can be problematic because whatever we are counting as the harmful or not harmful is the most important part for...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here