7050 Week 6 Discussion Board_Comments_5 Students
docx
keyboard_arrow_up
School
Strathmore University *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
6
Uploaded by DukeMinkMaster907
Student 1
Hello,
Thanks for this post and for noting some very important concepts discussed in the video. The
concept of cyber risks makes lots of sense. About the same general concept of cybersecurity, I
would also like to note that, the motives for cyber-attacks are many. One is money. Cyber
attackers may take a system offline and demand payment to restore its functionality. ransomware,
an attack that requires payment to restore services, is now more sophisticated than ever.
Corporations are vulnerable to cyber-attacks, but individuals are targets too, often because they
store personal information on their mobile phones and use insecure public networks. Tracking
evolving and increasing cyber-attacks is key to better cyber security. Thanks.
Hello,
I agree with you that the modern cyberspace is no longer safe and organizations must be careful
the type of activities they are doing in the cyberspace because of safety. Something important
organizations can do is rethinking cybersecurity approach which is characterized by risk analysis
and management. A cybersecurity risk assessment is a process that helps organizations determine
key business objectives and then identify the appropriate IT assets required to realize their
objectives. It involves the identification of cyber-attacks that may negatively impact these IT
assets. The organization is required to determine the likelihood of the occurrence of these
attacks, and define the impact each attack may incur. A cybersecurity risk assessment should map
out the entire threat environment and how it can impact the organization’s business objectives.
Thanks.
Student 2
Hello,
I have read your post and something important I have noted is the importance of cybersecurity.
With the advancement in technologies, I would like to note that cyberspace is becoming a very
dangerous place to operate because of the existing cyber threats. A cyber security threat refers to
any possible malicious attack that seeks to unlawfully access data, disrupt digital operations or
damage information. Cyber threats can originate from various actors, including corporate spies,
hacktivists, terrorist groups, hostile nation-states, criminal organizations, lone hackers and
disgruntled employees. In recent years, numerous high-profile cyber-attacks have resulted in
sensitive data being exposed. For example, the 2017 Equifax breach compromised the personal
data of roughly 143 million consumers, including birth dates, addresses and Social Security
numbers.
Hello,
Thanks for this post and for sharing your analysis on the important concepts from the video. It is
true that organizations should now rethink their cybersecurity. Rethinking cybersecurity involves
several things. One of such things is having in place cyber risk management frameworks. There
are several cyber risk management frameworks, each of which provides standards organizations
can use to identify and mitigate risks. Senior management and security leaders use these
frameworks to assess and improve the security posture of the organization. A cyber risk
management framework can help organizations effectively assess, mitigate, and monitor risks;
and define security processes and procedures to address them. A common such framework is the
NIST CSF. The NIST CSF framework provides a comprehensive set of best practices that
standardize risk management. Thanks.
Student 3
Hello,
The post is concisely written. All the concepts point to the general concept of cybersecurity.
Today, there are many types of cyber risks which have continued to risk the operations of
businesses everywhere in the world. The existence of cyber risks describe reasons for the
existence of cyber risks analysis and management. About the same concept, allow me to add that
a risk analysis is one step in the overall cybersecurity risk management and risk assessment
process. The analysis entails examining each risk to the security of your organization’s
information systems, devices, and data and prioritizing the potential threats. Once the analysis is
done, you know where to allocate your resources to prevent cyberattacks and, should a data
breach occur, which systems to prioritize. Thanks.
Hello,
There is so much to learn from the post concerning cybersecurity. One of the concepts which I
also learned from the video is cybersecurity approaches. In the digital age, organizations rely
heavily on digital assets, including sensitive data, intellectual property, financial information, and
customer records. With the increasing sophistication of cyber threats, robust cybersecurity
measures are essential to protect these valuable digital assets. One of such cybersecurity
approaches is the implementation of multi-factor authentication. Multi-Factor Authentication is a
fundamental security measure that adds an extra layer of protection to digital asset management.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
By requiring users to provide multiple forms of authentication, such as passwords, biometrics, or
security tokens, organizations can significantly reduce the risk of unauthorized access. Thanks.
Student 4
Hello,
The post is written informatively. Additionally, it is understandable because the issues you have
discussed are very relevant. I would also like to add that cyber-attackers can use an individual’s
or a company’s sensitive data to steal information or gain access to their financial accounts,
among other potentially damaging actions, which is why cyber security professionals are
essential for keeping private data protected. However, organizations can engage in what is
known as risk analysis. Going by how you have put it, I would also like to add that, risk analysis
identifies and analyzes the potential impact that could adversely affect key business initiatives or
projects. This process is performed to help organizations avoid or mitigate those risks. Thanks.
Hello,
The post is well written. I agree with you that it is time that organizations everywhere rethink
their current cybersecurity approaches. Rethinking cybersecurity means having new ways of
achieving cybersecurity. One of such ways is encryption. Encryption plays a crucial role in
safeguarding sensitive digital assets. By encrypting data at rest and in transit, organizations can
ensure that even if the data is intercepted, it remains unreadable to unauthorized individuals.
Robust encryption algorithms and proper key management practices provide a strong defense
against data breaches and unauthorized data access. Additionally, they can do regular security
audits and vulnerability assessments. Regular security audits and vulnerability assessments are
essential to identify potential weaknesses in digital asset management systems. Thanks.
Student 5
Hello,
After reading your post, something important I pick from the post is that cybersecurity risks have
become widespread and, therefore, organizations must be seen to be doing something towards
ensuring they are protected. Something important organizations are doing is risk management.
Cybersecurity risk management is a strategic approach to prioritizing threats. Organizations
implement cybersecurity risk management in order to ensure the most critical threats are handled
in a timely manner. This approach helps identify, analyze, evaluate, and address threats based on
the potential impact each threat poses. A risk management strategy acknowledges that
organizations cannot entirely eliminate all system vulnerabilities or block all cyber-attacks.
Establishing a cybersecurity risk management initiative helps organizations attend first to the
most critical flaws, threat trends, and attacks. Thanks.
Hello,
This is an informatively written post with lots of things about cybersecurity to learn. Although
cyberspace is becoming increasingly threatened, there are many things that organizations can do.
This would amount to rethinking cybersecurity. Organizations can implement user access
controls and privilege management. Implementing strong user access controls and privilege
management mechanisms is critical to limit access to digital assets only to authorized personnel.
Organizations should adopt the principle of least privilege, granting users the minimum level of
access required to perform their duties. This reduces the risk of insider threats, accidental data
leakage, and unauthorized modifications. However, this is not the end. Organizations should be
careful how such approaches are implemented because they can in such a way that they
encourage more attacks. Thanks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help