$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Ensuring Containment Of Cyber And Assurance

tag 0 Download11 Pages 2,527 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


How Human Behavior can be Applied as one of the aspect in Ensuring Containment of Cyber and Assurance?



Information security administration has become essentially in the course of the most recent 25 years what's more, is presently a typical and consistent thing inside people in general space. With buzz words, for example, hacking and digital security being incorporated inside features and being a typical point of discussion among regular innovation clients; data security is at the forefront of individuals' psyches (Ahmad, Maynard and Park 2014). The National Initiative for Cyber security Careers and Studies characterizes digital security inside its glossary as process, capacity , then again state whereby data and interchanges frameworks and the data contained in that are shielded from or potentially guarded against harm, unapproved utilize or alteration, or abuse.

This article is assembled in view of ebb and flow inquires about related to digital security confirmation and the effect of the human component on information. The target of this work is to distinguish components of digital security that would profit by further research and improvement in light of the writing audit discoveries (Ahmad, Maynard and Park 2014). The comes about plot in this article introduce a requirement for the digital security field to look into set up industry regions to profit by powerful rehearses for example, human dependability evaluation along with enhanced techniques for approval, for example, measurable quality control with a specific end goal to get genuine confirmation. The article proposes the improvement of a system that will be in view of characterize and repeatable evaluation which predominantly relating to the compass of individual aspect activities that give, or are designed not to contrarily manipulate by cyber security acts.


Theoretical background and literature review

There have been huge volumes of genuine human services related information breaks regardless of the presentation of the Information Governance Toolkit (IGT) with over seven thousand two hundred and fifty five users. NHS information ruptures in the vicinity of year 2014 and 2011 demonstrating a pattern of volume increments whereby there was a 101 percent expansion from the year 2013 to the year 2014 (Blyth and Kovacich 2011). Outside of the Australia as a country the pattern continues with unexpected presentation of private or delicate data being 83% higher for social insurance associations than different ventures however the most minimal performing industry in episode reaction . Dunn likewise detailed that 93% of ruptures were expected to human mistake and 95% of information misfortune in the country is expected to contain social elements of individuals (Blyth and Kovacich 2011).

The Government 2015 security breaks overview found that there had been an expansion in the quantity of security breaks from 81% of extensive associations to 90% indicating why security breaks are seen to proceed and be a normal component of business now and later on that can't be totally destroyed. The overview additionally recognized that about 9 out of 10 vast associations reviewed now languish some over of security break proposing that these episodes are presently a close conviction (Blyth and Kovacich 2016). The report likewise expressed that organizations ought to guarantee they are overseeing the hazard in like manner, and in spite of the expansion in staff mindfulness preparing, individuals are as prone to bring about a break as infections and different sorts of pernicious programming. Strikingly the overview found that levels of security mindfulness conveyed had gone up contrasted with the earlier year despite the fact that staff related breaks had additionally risen. The study demonstrated that 72% of expansive associations now convey continuous security mindfulness preparing to their staff contrasted and 68% the earlier year (Clevestig 2009). This highlights that just pushing out standard security mindfulness data to the representatives of an association is not an impassive methods for digital security affirmation in connection to human conduct.


Confirmation Definition

As indicated by the National Institute of Standards and Technology, affirmation is characterized as being 'Justification for certainty that the other four security objectives; Respectability, accessibility, classification, and responsibility have been satisfactorily improvement by a specific usage (Clevestig 2009). Accordingly, having that as a main priority, it is troublesome for capable individuals dwelling at the highest point of the hierarchical progressive system, for example, Chief Official Officers, Boards, Managing Directors, Owners and Senior Managers to have certainty or ensure that the data that their individual association is in charge of handling is satisfactorily secured. This issue has been aggravated by the change of wording utilized throughout the years including usage of the term confirmation inaccurately where it is really alluding to the supporting controls or countermeasures being connected. CESG distinguished four components of affirmation inside a confirmation display (Dilek, Çak?r and Ayd?n 2015).

These four components were inborn affirmation, extraneous confirmation, execution as assurance and operational affirmation. In light of the distributed digital security occurrences and breaks in the ranges of operational affirmation and outward confirmation inside the field of digital security this article will concentrate on those regions. CESG characterizes open levelheaded confirmation as the exercises important to keep up the item, framework or administration's security usefulness once it has entered operational utilize (Evans, Maglaras and Janicke 2016). Outward affirmation is additionally characterized as any movement autonomous of the improvement condition which provides a level of trust in the item, framework or administration. 

Affirmation Strategies

There is by all accounts a present position inside normal guidelines whereby security affirmation programs should be adaptable and require the association to figure out what needs to be checked and the technique for observing as expressed inside statements 9.1a and 9.1b by the English Standards Institution . Standard affirmation exercises have been static for quite a while and not advanced at the pace of innovation and digital security (Blyth and Kovacich 2016). It is fundamental to have a lithe security confirmation structure set up to address the issues of contrasting associations and bodies. Be that as it may, the present structures are extremely wide and notwithstanding being in presence for some time does not seem, by all accounts, to be completely tending to digital security particular affirmation necessities as the ruptures and measurements laid out in this article have appeared (Evans, Maglaras and Janicke 2016) .


Human behavior

This study proposes that human conduct is not steady and can be emphatically affected by connections, there is likewise a general gullible conviction that terrible things as it were happen to other individuals (Holstein and Stouffer 2010). Look into likewise found that individuals were eager to attempt unsafe practices (Holstein and Stouffer 2010). People were really rewarded as they were viewed as accommodating for permitting an occasion to occur without applying security controls or rehearse. Amid the writing audit investigate into different parts of affirmation and human conduct was likewise explored. These included the utilization of dread interests and furthermore client impressions of hazardous conduct relating to PC security.

Fear as one of the elements offers are influential interchanges that incorporate a component of dread keeping in mind the end goal to get a result wanted by administration. A positive fear ring would propel a danger control handle which can incite a productive outcome as the message recipient grasps a mental methodology to dismiss a hazard (Liu 2012). Fear offers are by and large used inside human administrations and promoting, for instance, to propel threatening Tosmo ruler. Johnston and Warkentin also laid out a Fear Appeals Model (FAM) intertwining parts, for instance, saw chance reality, and saw risk shortcoming, response sufficiency, self ampleness, social effect which then prompts behavioral purpose (Liu 2012). Johnston and Warkentin also communicates that the audit helps the routine of information security organization by revealing the characteristic dangers of customer self-administration and that end customers are not dependable in their practices which approach to manage advanced security care and get ready does not offer adequate confirmation. A view that is moved around the present scene estimations highlighted before in this article (Ahmad, Maynard and Park 2014).

Furthermore associated with the human direct some portion of advanced security, was the endeavor of risky lead whereby people would grasp activity despite a known danger related with the movement (Liu 2012). Johnston likewise, Warkentin express that individuals show a fairly guileless conviction that loathsome things simply happen to different people and Aytes Connolly commented that the self picture of present day, security astute customers does not track to a great degree well with their readiness and certified practices. Likewise, there is an especially entrancing thought included by Aytes and Connolly which communicated: Most by a wide margin of the time, customers can share passwords, open email associations without checking them for diseases, and so forth, with any negative outcomes. They are in truth repaid in this lead, since they are either seen as strong in the occasion of sharing passwords or they save time by not checking for diseases (Blyth and Kovacich 2011).

In connection to the dread interest system highlighted inside this article, it has been demonstrated that dread interests in detachment don't give powerful or sufficient affirmation, according to its definition and associations ought not to depend upon this kind of system. The message could be misjudged, overlooked or even disregarded in view of recognitions, connections and social impact. Hence, this approach ought to be utilized as a cautioning mechanism just and keeping in mind the end goal to present affirmation obliges criticism to the dread interest sender to affirm consistence.

This could be a return affirmation message, filter, appraisal, report, test or review. A decent relationship here would be the utilization of TCP in computer systems administration to affirm/ensure conveyance as set out later in this article (Maglaras 2016). Characterized affirmation is fundamental for powerful data security administration as Aytes and Connolly express: The discoveries recommend that it is impossible that PC clients will essentially change their conduct because of basically being furnished with extra data with respect to figuring dangers and hone. It is likely that associations should authorize consistence when the dangers warrant data extract (Maglaras 2016).


Research gaps

There are several research gaps that can be deduced from the previous study. These gaps should be utilized in the recent study in order to expand past literature. The previous literature does not cover various cover various teenage behavior which results into the increased cyber crimes (Theoharidou 2015). The behavior of the youthful individuals totally varies from adults who own various firms and may not have extreme behaviors increasing the rate of cyber security issues. It is evident that most of the cyber security offenders are youths.  The current research should therefore cover the relationship between teenage behaviors and the cyber security breach.

Another research gap in the management of information risk and security is how unemployment results into an increased cyber crime. With reference to various publications most of the cyber crimes are related to unemployment where most of the people committing these cyber crimes are unemployed. This current research should therefore capture the relation between the behaviors of jobless individuals (Theoharidou 2015).
Possibility of expanding existing literature

Based on the increasing number of data breaches and cyber crimes, there is possibility of conducting an extensive research (Stallings and Brown 2008). There are several cyber security incidents which have occurred even with the available literatures and studies suggesting the need to expand the past studies. The gaps in the previous part above also suggest the need to expand the previous study in order to cover all the aspects related to human elements and cyber security breaches. It is possible to expand the literature to cover all the aspects relate to human behavior and human information risk management (Stallings and Brown 2008). The available literature can be expanded to cover the behavior of unemployed individuals and how teenage behavior results in to cyber crimes as well as how the situation can be controlled.

Possible research questions

  • What is the relationship between human behavior and the increasing cyber security breaches?
  • How can a formal assurance relating to human behavior be created in order to set out various ways that can be used to contain cyber crimes?
  • What should companies do in order to cub increasing cyber attacks on various firms within various industries?
  • Can human behavior be modified to ensure reduced cyber security breaches and create assurance?

As portrayed out inside this article, affiliations and society continue being affected by both general and practically identical computerized security breaks. These cracks identify with specific executions and what's more normal treatment of private electronic information. Disregarding this extent of activities, it has been shown that half of these have human mix-up at their middle. In this manner, there should be extended test and theoretical research into human practices in connection to computerized security in perspective of the volumes of human mistake related scenes with a particular ultimate objective to set up courses in which standard advanced security practice can benefit and data very much oversaw. This article has shown that there is further research required into digital security affirmation and evaluation in connection to human components to build up a viable confirmation or assurance structure. This approach would profit the field of cyber security as a typical useable arrangement is not right now accessible and associations are depending upon autonomous aptitudes and information of people. It is suggested that a particular system is created in light of characterized and repeatable measurement particularly identifying with the scope of human viewpoint assignments that give, or are expected not to contrarily influence digital security act. Strategies that this structure ought to be based upon incorporate human unwavering quality appraisal, measurable quality control and a digital security human angle helplessness scoring framework. All in all, the digital security group ought to proceed to advance and grow yet it must not overlook its foundations and the undeniable insights that demonstrate we have not yet tended to the dangers related with the one steady component of digital security in relation to all aspects of human behavior.



Ahmad, A., Maynard, S.B. and Park, S., 2014. Information security strategies: towards an organizational multi-strategy perspective. Journal of Intelligent Manufacturing, 25(2), pp.357-370.

Blyth, A. and Kovacich, G.L., 2011. What is Information Assurance?. In Information Assurance (pp. 3-16). Springer London.

Blyth, A. and Kovacich, G.L., 2016. What is Information Assurance? (pp. 3-15). Springer London.

Clevestig, P., 2009. Handbook of applied biosecurity for life science laboratories. Stockholm International Peace Research Institute (Stockholms internationella fredsforskningsinstitut)(SIPRI).

Dilek, S., Çak?r, H. and Ayd?n, M., 2015. Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review. arXiv preprint arXiv:1502.03552.

Evans, M., Maglaras, L.A., He, Y. and Janicke, H., 2016. Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), pp.4667-4679.

Holstein, D.K. and Stouffer, K., 2010, January. Trust but verify critical infrastructure cyber security solutions. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on (pp. 1-8). IEEE.

Liu, P., 2012. Architectures for intrusion tolerant database systems. In Computer Security Applications Conference, 2002. Proceedings. 18th Annual (pp. 311-320). IEEE.

Maglaras, L., He, Y., Janicke, H. and Evans, M., 2016. Human Behaviour as an aspect of Cyber Security Assurance.

Stallings, W. and Brown, L., 2008. Computer security. Principles and Practice.

Theoharidou, M., Kokolakis, S., Karyda, M. and Kiountouzis, E., 2015. The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24(6), pp.472-484.


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Ensuring Containment Of Cyber And Assurance. Retrieved from

"Ensuring Containment Of Cyber And Assurance." My Assignment Help, 2018,

My Assignment Help (2018) Ensuring Containment Of Cyber And Assurance [Online]. Available from:
[Accessed 29 March 2020].

My Assignment Help. 'Ensuring Containment Of Cyber And Assurance' (My Assignment Help, 2018) <> accessed 29 March 2020.

My Assignment Help. Ensuring Containment Of Cyber And Assurance [Internet]. My Assignment Help. 2018 [cited 29 March 2020]. Available from: is one of the noted service providers that deliver essay help. We provide tailored essay assistance to make sure that student gets online essay help exactly in the way they want it to be written. We at have built teams of consultants, who readily attend every query related to help me writing my essay. We provide essay writing help in forms of tips and steps in order o assist students with tough essay assignments.

Latest It Write Up Samples

ISY3001 E-Business Fundamentals And Systems Management

Download : 0 | Pages : 14
  • Course Code: ISY3001
  • University: Australian Institute Of Higher Education
  • Country: Australia

Answer: Task A: The Concept of Business-To-Business (B2B) Model In this assignment, the Business-to-Business (B2B) model of e-commerce have been chosen. The B2B model of e-commerce business can be defined as the collaboration of more than two different business organisations based on performing several forms of business transactions. This scenario also depicts the involvement of businesses based within wholesalers, retailers or different manu...

Read More arrow

COIT20249 Professional Skills In Information Communication Technology 3

Download : 0 | Pages : 10
  • Course Code: COIT20249
  • University: Central Queensland University
  • Country: Australia

Answer: Introduction Augmented Reality (AR) has emerged different technologies and it uses artificial intelligence and machine learning algorithms for providing a superimposed images and videos of real things for better understanding. In this report, AR technology will discuss with their uses in different fields as well as how it is beneficial for education system. AR is a latest technology, which is highly used for understanding of different t...

Read More arrow

BUS707 Applied Business Research

Download : 0 | Pages : 17

Answer: Introduction  The foremost determination of the paper is to investigate the role of the automatic learning ability of the AI based systems. Most of the business organizations all over the world uses the automated learning ability of the AI based systems and this paper will be very much effective for the organizations who are planning to implement this technology in their working environment. Along with this accounting organizatio...

Read More arrow

ITSU1001 Introduction To Computer Systems And Networking

Download : 0 | Pages : 12
  • Course Code: ITSU 1001
  • University: Victorian Institute Of Technology
  • Country: Australia

Answer: Introduction: Flight management System or the FMS is the fundamental component that is included in the modern airliners avionics. This is one of the specialized computer systems which is associated with the automation of the various in-flight tasks along with helping in the reduction of the workload upon the flight crew up to a point where the modern civilian aircrafts no longer need to carry the flight engineers or the navigators (Zh...

Read More arrow

BSBLDR511-Security Challenge Of Cyber Physical Systems

Download : 0 | Pages : 4
  • Course Code: BSBLDR511
  • University: Victoria University
  • Country: Australia

Answer: Introduction A CPS or cyber physical system is a significant mechanism, which is being controlled and monitored by certain computer based algorithms. This type of system is majorly integrated with the Internet connection as well as its users (He et al. 2016). Within such cyber physical systems, the physical and even the software elements are being intertwined, where every element is operating on various temporal and spatial scales and...

Read More arrow

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1692 Order Completed

98% Response Time

Alfred Dodd

PhD in Computer and Information Science with specialization in Database

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

647 Order Completed

98% Response Time

Adlina Han

Masters in Marketing with Specialization in Branding

Singapore, Singapore

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

nice very well written, thanks for the help. little expensive but it was very well written..


User Id: 257973 - 29 Mar 2020


student rating student rating student rating student rating student rating

good work thank you so much, as i expected and more . i recommend all student to use MY Assignment


User Id: 267771 - 29 Mar 2020


student rating student rating student rating student rating student rating

Ultra fast turnaround which is very appreciated! The level of content and quality of response is second to none! Cannot thank you enough! Your survice is very good Your all staff members are very humble and supportive. But plz note all the reqriesme...


User Id: 239037 - 29 Mar 2020


student rating student rating student rating student rating student rating

Affordable genuine services for CDR writing Australia. However they took time beyond the deadline time but they informed over call and email well in advance that it will take more time in a profession.. Very thing was written perfectly. Got an HD fo...


User Id: 239037 - 29 Mar 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?