Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

You are tasked as the Cyber Security Analyst at your new organization (Skyward Co.) to prepare a briefing for executive management (comprised of people with anywhere from a basic understanding of Information Technology [IT] to a Chief Information Officer with a vast knowledge of IT). The purpose of the briefing is to let them know after you have analyzed network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace; how it may impact your organization, and to develop a policy to be prepared for it.

Include:
1.Background section
2.Analysis of current research on the subject matter
3.Recommendations
4.Use current and real world data to make your points, not just the textbook
Your report may focus only on the topic of your choosing  - imagine yourself working on one aspect of the report while team members complete the other areas following the same structure.

Understanding Cyber Security

Cyber security or computer security can be defined as the proper protection of various computer systems from being damaged or theft to the respective software, hardware or any form of electronic data (Von Solms & Van Niekerk, 2013). Moreover, this type of security is also effective to disruption as well as misdirection of services, they are providing. This cyber security even involves perfect control of physical access to the system hardware and also securing from harm that could be done through access of network, injection of code and malicious data. Due to the malpractices by various operators, irrespective of the fact that it is accidental or intentional, the personnel of IT security could be tricked from deviation of the secure processes (Wang & Lu, 2013). The wireless networks like Wireless Fidelity and Bluetooth are utilized for the means of cyber security.

The following report outlines a brief discussion on the cyber security and being the analyst of cyber security in the new organization or Skyward Company. This is mainly because to prepare a proper briefing for the executive management. The CIO or chief information officer contains of the understanding of IT or information technology. Relevant details will be provided in this report.

Cyber security is the perfect security of the Internet connected systems that comprise of the software, hardware or data from any type of cyber attack (Hahn et al., 2013). The security consists of physical security and cyber security for protecting against the unauthorized access to the data centres or the other computerized systems. This type of security is for maintaining the integrity, availability and confidentiality of data. The cyber security analyst comprises of various important and significant responsibilities. The first and the foremost responsibility of a security analyst is to plan, implement as well as upgrade the security measures or controls (Amin et al., 2013). Moreover, various plans or protocols are also established for the protection of information systems and digital files from the destruction, unauthorized access and modification of data. The data is maintained and monitored from the security access. The vulnerability testing is performed properly. The other important responsibilities of a cyber security analyst mainly include conducting internal and external security audits, analysis of security breaches, managing network, prevention systems and intrusion detection. The major cause of security breach is detected by analysis. The corporate security policies are properly defined maintained and implemented by the cyber security analyst (Elmaghraby & Losavio, 2014). Appropriate tools or counter measures are installed and recommended by cyber security analyst.

The Role of a Cyber Security Analyst

Vision

To build a secure and resilient cyberspace for Skyward Co.

Mission

To protect information as well as information infrastructure in the cyber space, to respond or prevent from cyber threats or attacks and to reduce or diminish vulnerabilities or minimize damage from the cyber incidents in Skyward Co.

Objectives

  1. i) To create secured cyber environment for the employees of Skyward Co.
  2. ii) To secure information and information infrastructure for Skyward Co.

iii) To create an assurance framework for design of security policies and for promotion and enabling actions for compliance to global security standards and best practices by way of conformity assessment in Skyward Co (Buczak & Guven, 2016).

  1. iv) To make stronger Regulatory framework to ensure secured cyber environment.
  2. v) To enhance as well as create mechanisms to obtain strategic information about threats or attacks to the ICT infrastructure and hence scenarios should be created for crisis management in an effective manner in Skyward Co (Dunn Cavelty, 2013).
  3. v) To improve the visibility of integrity of various products or services of ICT by the establishment of testing or validation of product security in Skyward Co.

Strategies

  1. i) Creation of secured cyber environment: This is the first and foremost strategy for the Skyward Co. Being the cyber security analyst, all the matters that are related to the cyber security are well coordinated (Sommestad, Ekstedt & Holm, 2013). Moreover, the CIO or chief information officer would encourage all private or public departments for the efforts of cyber security and initiatives. A particular budget should be maintained for the implementation of cyber security initiatives and thus to meet the emergency response in any type of cyber incident. Furthermore, a specific mechanism should be established to share important information and also to identify or respond to the incidents of cyber security (Wells et al., 2014). Proper guidelines should be adopted by Skyward Co for providing procurement of the indigenously manufactured products of ICT.
  2. ii) Creation of Assurance Framework: The second important strategy for the organization of Skyward Co. is that an assurance framework should be created properly. The adoption of the information security or compliance should be promoted properly for enhancing posture of cyber security. The infrastructure should also be created in certification of the cyber security guidelines or standards. A proper risk management process or plan should also be undertaken by the organization of Skyward Co (Cavelty, 2014). Moreover, the cyber crisis management plan should also be made by them. The software development process must be ensured and for securing the application. A conformity assessment framework should be created for the periodic verification of compliance for cyber security. The information technology systems are to be ensured with security or compliance. The networks would also be secured with this.

iii) Encouraging Open Standards: The next important and significant strategy for the organization of Skyward Co is the encouragement of the open standards. The interoperability is well facilitated and the exchange of data within several products and services (McGraw, 2013). The enhancement of the certified information technology services or products on the basis of the open standards should be done properly.

  1. iv) Strengthening the Regulatory framework: The final important strategy for Skyward Co is the strengthening of the regulatory framework. A dynamic legal framework is properly developed and all the cyber security issues or challenges are well addressed within the cyber space (Elmaghraby & Losavio, 2014). The international frameworks are harmonized for the Internet governance. A proper awareness is enabled of this regulatory framework.

Skyward Co has an extremely strong impact of cyber security policy. This type of policy would be extremely effective for them. The various recommendations for the organization of Skyward Co are given below:

  1. i) The network designs and the topologies should be properly analyzed by them.
  2. ii) The second recommendation is to update the architectures, infrastructure and protocols of Skyward Co.

iii) The network should be completely wireless for saving money or time.

Conclusion

Therefore, from the above discussion, it can be concluded that cyber security can be easily defined to the set of tools or techniques that are utilized for the protection of integrity of networks, data or programs from unauthorized access, damage or attack. The fast growth of market is significantly fuelled by the array of various trends of technology that includes several security requirements. The major requirements of cyber security are IoT or internet of things and BYOD or bring your own device. The fast adoption of the cloud based applications or workloads that extend security needs or requirements beyond data centre and mandates of data protection like NIST or National Institute of Security Technology Cyber Security Framework and General Data Protection Regulation. The most significant functionality of the cyber security majorly includes protection of systems or information from the several cyber threats and cyber risks. All of these cyber risks could be taking various forms like malware ransom ware, application attacks, phishing and many more. The cyber adversaries comprise of the role for launching automated as well as sophisticated attacks by utilizing all the tactics at extremely lower costs. Some of the most common forms of cyber threats are cyber terrorism, cyber warfare and cyber espionage. The above report has clearly outlined a cyber security policy for the organization of Skyward Company. Significant details are provided within the report.

References

Amin, S., Litrico, X., Sastry, S., & Bayen, A. M. (2013). Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 21(5), 1963-1970.

Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.

Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701-715.

Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105-122.

Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-497.

Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions on Smart Grid, 4(2), 847-855.

McGraw, G. (2013). Cyber war is inevitable (unless we build security in). Journal of Strategic Studies, 36(1), 109-119.

Sommestad, T., Ekstedt, M., & Holm, H. (2013). The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures. IEEE Systems Journal, 7(3), 363-373.

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.

Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344-1371.

Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), 74-77.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Cyber Security: Protecting Your Systems And Data Is Crucial. #essay. Retrieved from https://myassignmenthelp.com/free-samples/bit503-cyber-security-system.

"Cyber Security: Protecting Your Systems And Data Is Crucial. #essay." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/bit503-cyber-security-system.

My Assignment Help (2020) Cyber Security: Protecting Your Systems And Data Is Crucial. #essay [Online]. Available from: https://myassignmenthelp.com/free-samples/bit503-cyber-security-system
[Accessed 27 April 2024].

My Assignment Help. 'Cyber Security: Protecting Your Systems And Data Is Crucial. #essay' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/bit503-cyber-security-system> accessed 27 April 2024.

My Assignment Help. Cyber Security: Protecting Your Systems And Data Is Crucial. #essay [Internet]. My Assignment Help. 2020 [cited 27 April 2024]. Available from: https://myassignmenthelp.com/free-samples/bit503-cyber-security-system.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close