CNS_Discussion_3_4
docx
keyboard_arrow_up
School
California State University, Fullerton *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by marttiatoo
Individual organizations must decide how integrated security should be handled most
efficiently. Any enterprise worth its salt should require looking at things from various angles
and getting information from multiple sources. It should be a common practice for any
organization that is worth its salt and wants to be taken seriously. It is often beneficial to
obtain ideas from several sources and connect with domain experts. It can be accomplished
by acquiring information in person and on the Internet. You must always maintain this
information in the back of your mind, even though CISA is a well-known body responsible
for protecting the safety of vital infrastructure and cybersecurity. Investigate the contents to
see if they are relevant and can be applied to the situation you find yourself in. Organizations
like CISA must offer up-to-date advice and insights on new dangers, best practices, and
mitigation techniques. Because cybersecurity is a field that is rapidly transforming into a state
of perpetual flux, organizations such as CISA must offer information and perspectives that
are current (Halak et al.,2019).
Physical and digital security are equally important to the safety of modern businesses. Neither
can be ignored. It is especially true when considering the large number of threats that
contemporary companies are forced to face daily. It isn't easy to decide which of the variables
is more relevant, given that the relative significance of each component will vary depending
on the organization and its criteria. It makes it tough to determine which of the features is
most important. It is difficult to determine which of the variables is the most important, given
that the relative significance of each component will change depending on the specific
organization in question and the criteria it employs (Harindra et al.,2021).
On the other hand, a technological company tasked with preserving sensitive information and
intellectual property can place a more significant focus on cybersecurity. Businesses must
have an all-encompassing strategy for security, and it is also critical for companies to
implement physical and digital safeguards to defend themselves against a wide variety of
potential threats. In general, companies must have a complete approach to security and a path
to guarantee that it is comprehensive (Lukens et al.,2020).
References
Halak B, Hall C, Fathir S, et al. (2019). A Machine Learning Approach to Autonomous
Physical Security Defenses. IEEE, Access, and IEEE, 10,55369-55380.
doi:10.1109/ACCESS.2022.3175615
Harindra S. Mavikumbure, Victor Cobilean, Brady J. Mcbride, et al. (2021). Review of
Cyber-Physical Security Visualization Techniques in a Smart Grid Case Study.
Obtain
IEEE, 11,59788-59803. doi:10.1109/ACCESS.2023.3286304 Lukens JM, Passian A, Yoginath S, Law KJH, Dawson JA. (2020). Sensors. Bayesian
estimate of oscillator parameters for security and anomaly detection in cyber-physical
systems, (14248220), 22(16),6112. doi:10.3390/s22166112
Reply:
Convergence of cybersecurity and physical security is required to prevent compromising vital
or private information, economic damage, or loss of life. The lines between cybersecurity and
physical security are beginning to blur, and the convergence of the two is essential. This
statement is correct in every sense, including the affirmative ones and those that are negative.
Cyber security is strengthened when physical security is implemented to restrict access to
locations where data is stored. It is crucial to offer organizations guidance on the multiple
evidence sources that can influence their decisions, the design decisions they must make, and
the enablers that promote effective convergence. It is a necessary component for guaranteeing
the accessibility of resources while at the same time protecting the confidentiality and
authenticity of those resources. It is of the utmost necessity to build physical security in such
a way that it can successfully defend essential resources, infrastructure, and systems.
Reply:
The convergence of physical and cybersecurity strategies makes use of a range of processes
to restrict admittance to specific locations and a variety of cyberspace procedures to defend
the IP system and limit accessibility. These processes are used to achieve the convergence of
physical and cybersecurity strategies. One way to think about these procedures is as a
"convergence of physical and cybersecurity strategies." These methods are utilized in
conjunction with one another as well as with one another to achieve the confluence of
physical and cybersecurity strategies. For the same reason that it is done, which is because it
is done, this is done instead of the more traditional technique of classifying people and
methods. Every reliable security plan should contain an essential component that provides
adequate physical protection for the strategy's targets. When implemented correctly and
applied correctly, it generates policy, technical controls, and instructional programs that are
meant to deliver an acceptable level of risk reduction for an organization's assets and
resources. This level of risk reduction is only achieved when the system is used correctly. Reply:
Even though physical security and cybersecurity are intricately intertwined, many businesses
treat these security functions as independent systems. Cybersecurity is protecting computer
systems and networks from being breached by malicious cyberattacks. Because massive
convergence can hurt the network's performance, physical security must consider
cybersecurity. It is necessary because the network may only be able to handle an increase in
traffic if it has been planned and implemented appropriately. Because massive convergence
might have a detrimental effect on the functioning of the network, physical security must
consider cybersecurity. Most of the time, the best practices for cyber security are years ahead
of those for physical security. It is mainly attributable to the slower deployment of
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
intelligence and networking into the architecture of physical security, a significant component
of the problem. Utilizing software explicitly designed for risk management provides how this
purpose can be accomplished. The transition to integrated physical and cybersecurity includes
important milestones, potential interruptions, and issues connected to change management.