CNS_Discussion_3_4

docx

School

California State University, Fullerton *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

4

Uploaded by marttiatoo

Report
Individual organizations must decide how integrated security should be handled most efficiently. Any enterprise worth its salt should require looking at things from various angles and getting information from multiple sources. It should be a common practice for any organization that is worth its salt and wants to be taken seriously. It is often beneficial to obtain ideas from several sources and connect with domain experts. It can be accomplished by acquiring information in person and on the Internet. You must always maintain this information in the back of your mind, even though CISA is a well-known body responsible for protecting the safety of vital infrastructure and cybersecurity. Investigate the contents to see if they are relevant and can be applied to the situation you find yourself in. Organizations like CISA must offer up-to-date advice and insights on new dangers, best practices, and mitigation techniques. Because cybersecurity is a field that is rapidly transforming into a state of perpetual flux, organizations such as CISA must offer information and perspectives that are current (Halak et al.,2019). Physical and digital security are equally important to the safety of modern businesses. Neither can be ignored. It is especially true when considering the large number of threats that contemporary companies are forced to face daily. It isn't easy to decide which of the variables is more relevant, given that the relative significance of each component will vary depending on the organization and its criteria. It makes it tough to determine which of the features is most important. It is difficult to determine which of the variables is the most important, given that the relative significance of each component will change depending on the specific organization in question and the criteria it employs (Harindra et al.,2021). On the other hand, a technological company tasked with preserving sensitive information and intellectual property can place a more significant focus on cybersecurity. Businesses must have an all-encompassing strategy for security, and it is also critical for companies to implement physical and digital safeguards to defend themselves against a wide variety of
potential threats. In general, companies must have a complete approach to security and a path to guarantee that it is comprehensive (Lukens et al.,2020). References Halak B, Hall C, Fathir S, et al. (2019). A Machine Learning Approach to Autonomous Physical Security Defenses. IEEE, Access, and IEEE, 10,55369-55380. doi:10.1109/ACCESS.2022.3175615 Harindra S. Mavikumbure, Victor Cobilean, Brady J. Mcbride, et al. (2021). Review of Cyber-Physical Security Visualization Techniques in a Smart Grid Case Study. Obtain IEEE, 11,59788-59803. doi:10.1109/ACCESS.2023.3286304 Lukens JM, Passian A, Yoginath S, Law KJH, Dawson JA. (2020). Sensors. Bayesian estimate of oscillator parameters for security and anomaly detection in cyber-physical systems, (14248220), 22(16),6112. doi:10.3390/s22166112 Reply: Convergence of cybersecurity and physical security is required to prevent compromising vital or private information, economic damage, or loss of life. The lines between cybersecurity and physical security are beginning to blur, and the convergence of the two is essential. This statement is correct in every sense, including the affirmative ones and those that are negative. Cyber security is strengthened when physical security is implemented to restrict access to locations where data is stored. It is crucial to offer organizations guidance on the multiple evidence sources that can influence their decisions, the design decisions they must make, and the enablers that promote effective convergence. It is a necessary component for guaranteeing the accessibility of resources while at the same time protecting the confidentiality and authenticity of those resources. It is of the utmost necessity to build physical security in such a way that it can successfully defend essential resources, infrastructure, and systems.
Reply: The convergence of physical and cybersecurity strategies makes use of a range of processes to restrict admittance to specific locations and a variety of cyberspace procedures to defend the IP system and limit accessibility. These processes are used to achieve the convergence of physical and cybersecurity strategies. One way to think about these procedures is as a "convergence of physical and cybersecurity strategies." These methods are utilized in conjunction with one another as well as with one another to achieve the confluence of physical and cybersecurity strategies. For the same reason that it is done, which is because it is done, this is done instead of the more traditional technique of classifying people and methods. Every reliable security plan should contain an essential component that provides adequate physical protection for the strategy's targets. When implemented correctly and applied correctly, it generates policy, technical controls, and instructional programs that are meant to deliver an acceptable level of risk reduction for an organization's assets and resources. This level of risk reduction is only achieved when the system is used correctly. Reply: Even though physical security and cybersecurity are intricately intertwined, many businesses treat these security functions as independent systems. Cybersecurity is protecting computer systems and networks from being breached by malicious cyberattacks. Because massive convergence can hurt the network's performance, physical security must consider cybersecurity. It is necessary because the network may only be able to handle an increase in traffic if it has been planned and implemented appropriately. Because massive convergence might have a detrimental effect on the functioning of the network, physical security must consider cybersecurity. Most of the time, the best practices for cyber security are years ahead of those for physical security. It is mainly attributable to the slower deployment of
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
intelligence and networking into the architecture of physical security, a significant component of the problem. Utilizing software explicitly designed for risk management provides how this purpose can be accomplished. The transition to integrated physical and cybersecurity includes important milestones, potential interruptions, and issues connected to change management.