Week 6_Synopsis
docx
keyboard_arrow_up
School
California State University, Fullerton *
*We aren’t endorsed by this school
Course
5218
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
2
Uploaded by marttiatoo
Reading: The Cybersecurity Risk:
Cyber security refers to safeguarding information in terms of its integrity, the confidentiality
of information, and the accessibility of data. Cyber security encompasses all three of these
aspects. Cybersecurity also ensures that a business can recover from disasters, whether
humans cause them. Downloading malicious software or failing to meet the latest security
requirements are examples of artificial disasters. Cyber-terrorists and hackers are considered
risks in the field of cybersecurity since they try to get unauthorized access to an
organization's server to steal confidential information (Sandra König et al., 2019). The current
level of cybersecurity is deteriorating for no other reason than that our entire civilization is
becoming increasingly dependent upon computers. Cybersecurity experts are concerned
about the implications of this trend. The variety of cyberattacks is rising, and attacks can
target anything at any time (Sandra König et al., 2019).
The necessity of a cybersecurity incident response plan is pressing. The action plan needs to
incorporate the particulars of the action plan that the company will undertake with the federal
laws and regulations that apply to the organization in question—putting into action a plan
that, in the event of a cyberattack, will stop a corporation from disintegrating into chaos and
losing everything they have (Alok Mishra et al., 2022). Many people who work in
cybersecurity rely on the promise of network security as a kind of silver bullet solution
because operating systems have gotten too complex to provide any assurance on the correct
or intended operation of the system. Security professionals are keen to point out, and with
good reason, that a single vulnerability in practically any application can result in a
catastrophic security breach (Alok Mishra et al., 2022).
It is something that they are quick to point out. A cybersecurity architecture focuses on
confining the attack before it causes irreparable or unrecoverable damage to the firm's
resources to prevent further damage from being done by the attack. An organization's ability
to formulate a response strategy that is all-encompassing, applicable, and pertinent is
essential to the organization's chances of recovering successfully from a cyberattack (Sandra
König et al., 2019). An action plan, also known as an incident response plan, addresses the
roles, responsibilities, actions, decisions, operations, and duties needed to recover from a
cyber incident. These things need to be done to recover from a cyber incident. These are the
steps that need to be taken to begin the process of recovering from a cyber-attack. If these
steps are taken in the correct order, the organization will be able to recover from the breaches
safely and soundly (Sandra König et al., 2019).
References
Sandra König, Andrew Fielder, Emmanouil Panaousis, Stefan Schauer, and Stefan Rass.
(2019). Uncertainties in the cybersecurity investment risk evaluation. 9(2), 34–34.
doi:10.3390/g9020034.
Alok Mishra, Memoona Javeria Anwar, Yehia Ibrahim Alzoubi, and Asif Qumer Gill. (2022).
comparative evaluation of organizational cybersecurity policies, 22(538), 538-538.
doi:10.3390/s22020538.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help