7050 Week 6 Discussion Board_Comments_5 Students

docx

School

Strathmore University *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

6

Uploaded by DukeMinkMaster907

Report
Student 1 Hello, Thanks for this post and for noting some very important concepts discussed in the video. The concept of cyber risks makes lots of sense. About the same general concept of cybersecurity, I would also like to note that, the motives for cyber-attacks are many. One is money. Cyber attackers may take a system offline and demand payment to restore its functionality. ransomware, an attack that requires payment to restore services, is now more sophisticated than ever. Corporations are vulnerable to cyber-attacks, but individuals are targets too, often because they store personal information on their mobile phones and use insecure public networks. Tracking evolving and increasing cyber-attacks is key to better cyber security. Thanks. Hello, I agree with you that the modern cyberspace is no longer safe and organizations must be careful the type of activities they are doing in the cyberspace because of safety. Something important organizations can do is rethinking cybersecurity approach which is characterized by risk analysis and management. A cybersecurity risk assessment is a process that helps organizations determine key business objectives and then identify the appropriate IT assets required to realize their objectives. It involves the identification of cyber-attacks that may negatively impact these IT assets. The organization is required to determine the likelihood of the occurrence of these attacks, and define the impact each attack may incur. A cybersecurity risk assessment should map out the entire threat environment and how it can impact the organization’s business objectives. Thanks.
Student 2 Hello, I have read your post and something important I have noted is the importance of cybersecurity. With the advancement in technologies, I would like to note that cyberspace is becoming a very dangerous place to operate because of the existing cyber threats. A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations or damage information. Cyber threats can originate from various actors, including corporate spies, hacktivists, terrorist groups, hostile nation-states, criminal organizations, lone hackers and disgruntled employees. In recent years, numerous high-profile cyber-attacks have resulted in sensitive data being exposed. For example, the 2017 Equifax breach compromised the personal data of roughly 143 million consumers, including birth dates, addresses and Social Security numbers. Hello, Thanks for this post and for sharing your analysis on the important concepts from the video. It is true that organizations should now rethink their cybersecurity. Rethinking cybersecurity involves several things. One of such things is having in place cyber risk management frameworks. There are several cyber risk management frameworks, each of which provides standards organizations can use to identify and mitigate risks. Senior management and security leaders use these frameworks to assess and improve the security posture of the organization. A cyber risk management framework can help organizations effectively assess, mitigate, and monitor risks; and define security processes and procedures to address them. A common such framework is the
NIST CSF. The NIST CSF framework provides a comprehensive set of best practices that standardize risk management. Thanks. Student 3 Hello, The post is concisely written. All the concepts point to the general concept of cybersecurity. Today, there are many types of cyber risks which have continued to risk the operations of businesses everywhere in the world. The existence of cyber risks describe reasons for the existence of cyber risks analysis and management. About the same concept, allow me to add that a risk analysis is one step in the overall cybersecurity risk management and risk assessment process. The analysis entails examining each risk to the security of your organization’s information systems, devices, and data and prioritizing the potential threats. Once the analysis is done, you know where to allocate your resources to prevent cyberattacks and, should a data breach occur, which systems to prioritize. Thanks. Hello, There is so much to learn from the post concerning cybersecurity. One of the concepts which I also learned from the video is cybersecurity approaches. In the digital age, organizations rely heavily on digital assets, including sensitive data, intellectual property, financial information, and customer records. With the increasing sophistication of cyber threats, robust cybersecurity measures are essential to protect these valuable digital assets. One of such cybersecurity approaches is the implementation of multi-factor authentication. Multi-Factor Authentication is a fundamental security measure that adds an extra layer of protection to digital asset management.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
By requiring users to provide multiple forms of authentication, such as passwords, biometrics, or security tokens, organizations can significantly reduce the risk of unauthorized access. Thanks. Student 4 Hello, The post is written informatively. Additionally, it is understandable because the issues you have discussed are very relevant. I would also like to add that cyber-attackers can use an individual’s or a company’s sensitive data to steal information or gain access to their financial accounts, among other potentially damaging actions, which is why cyber security professionals are essential for keeping private data protected. However, organizations can engage in what is known as risk analysis. Going by how you have put it, I would also like to add that, risk analysis identifies and analyzes the potential impact that could adversely affect key business initiatives or projects. This process is performed to help organizations avoid or mitigate those risks. Thanks. Hello, The post is well written. I agree with you that it is time that organizations everywhere rethink their current cybersecurity approaches. Rethinking cybersecurity means having new ways of achieving cybersecurity. One of such ways is encryption. Encryption plays a crucial role in safeguarding sensitive digital assets. By encrypting data at rest and in transit, organizations can ensure that even if the data is intercepted, it remains unreadable to unauthorized individuals. Robust encryption algorithms and proper key management practices provide a strong defense against data breaches and unauthorized data access. Additionally, they can do regular security audits and vulnerability assessments. Regular security audits and vulnerability assessments are essential to identify potential weaknesses in digital asset management systems. Thanks.
Student 5 Hello, After reading your post, something important I pick from the post is that cybersecurity risks have become widespread and, therefore, organizations must be seen to be doing something towards ensuring they are protected. Something important organizations are doing is risk management. Cybersecurity risk management is a strategic approach to prioritizing threats. Organizations implement cybersecurity risk management in order to ensure the most critical threats are handled in a timely manner. This approach helps identify, analyze, evaluate, and address threats based on the potential impact each threat poses. A risk management strategy acknowledges that organizations cannot entirely eliminate all system vulnerabilities or block all cyber-attacks. Establishing a cybersecurity risk management initiative helps organizations attend first to the most critical flaws, threat trends, and attacks. Thanks. Hello, This is an informatively written post with lots of things about cybersecurity to learn. Although cyberspace is becoming increasingly threatened, there are many things that organizations can do. This would amount to rethinking cybersecurity. Organizations can implement user access controls and privilege management. Implementing strong user access controls and privilege management mechanisms is critical to limit access to digital assets only to authorized personnel. Organizations should adopt the principle of least privilege, granting users the minimum level of access required to perform their duties. This reduces the risk of insider threats, accidental data leakage, and unauthorized modifications. However, this is not the end. Organizations should be
careful how such approaches are implemented because they can in such a way that they encourage more attacks. Thanks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help