Week 6_Synopsis

docx

School

California State University, Fullerton *

*We aren’t endorsed by this school

Course

5218

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

2

Uploaded by marttiatoo

Report
Reading: The Cybersecurity Risk: Cyber security refers to safeguarding information in terms of its integrity, the confidentiality of information, and the accessibility of data. Cyber security encompasses all three of these aspects. Cybersecurity also ensures that a business can recover from disasters, whether humans cause them. Downloading malicious software or failing to meet the latest security requirements are examples of artificial disasters. Cyber-terrorists and hackers are considered risks in the field of cybersecurity since they try to get unauthorized access to an organization's server to steal confidential information (Sandra König et al., 2019). The current level of cybersecurity is deteriorating for no other reason than that our entire civilization is becoming increasingly dependent upon computers. Cybersecurity experts are concerned about the implications of this trend. The variety of cyberattacks is rising, and attacks can target anything at any time (Sandra König et al., 2019). The necessity of a cybersecurity incident response plan is pressing. The action plan needs to incorporate the particulars of the action plan that the company will undertake with the federal laws and regulations that apply to the organization in question—putting into action a plan that, in the event of a cyberattack, will stop a corporation from disintegrating into chaos and losing everything they have (Alok Mishra et al., 2022). Many people who work in cybersecurity rely on the promise of network security as a kind of silver bullet solution because operating systems have gotten too complex to provide any assurance on the correct or intended operation of the system. Security professionals are keen to point out, and with good reason, that a single vulnerability in practically any application can result in a catastrophic security breach (Alok Mishra et al., 2022). It is something that they are quick to point out. A cybersecurity architecture focuses on confining the attack before it causes irreparable or unrecoverable damage to the firm's resources to prevent further damage from being done by the attack. An organization's ability
to formulate a response strategy that is all-encompassing, applicable, and pertinent is essential to the organization's chances of recovering successfully from a cyberattack (Sandra König et al., 2019). An action plan, also known as an incident response plan, addresses the roles, responsibilities, actions, decisions, operations, and duties needed to recover from a cyber incident. These things need to be done to recover from a cyber incident. These are the steps that need to be taken to begin the process of recovering from a cyber-attack. If these steps are taken in the correct order, the organization will be able to recover from the breaches safely and soundly (Sandra König et al., 2019). References Sandra König, Andrew Fielder, Emmanouil Panaousis, Stefan Schauer, and Stefan Rass. (2019). Uncertainties in the cybersecurity investment risk evaluation. 9(2), 34–34. doi:10.3390/g9020034. Alok Mishra, Memoona Javeria Anwar, Yehia Ibrahim Alzoubi, and Asif Qumer Gill. (2022). comparative evaluation of organizational cybersecurity policies, 22(538), 538-538. doi:10.3390/s22020538.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help