CNS_Discussion_3_11
docx
keyboard_arrow_up
School
California State University, Fullerton *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
4
Uploaded by marttiatoo
Cybersecurity and physical protection are mutually necessary in today's interconnected
society. The Cybersecurity and Infrastructure Security Agency (CISA) made concerted
efforts in 2022 to acknowledge convergence. CISA understood the significance of the
intersection and acted accordingly. The group took into account its recent successes.
Integrating cyber-security measures like intrusion detection systems and sophisticated
analytics with traditional physical security measures like CCTV cameras and access control
provides firms with a comprehensive view of their security. This strengthens the safety of the
company. Because of this, they can better safeguard their possessions. In this way, businesses
can protect their possessions. If someone tries to break into a restricted location, a physical or
digital security system can notify the proper authorities immediately. Experts in cyber-
security can act quickly and prevent invasions (Czarnowski et al.,2019).
As a result of this convergence, the danger of erroneous event identification and false alarms
has been significantly reduced. It is because digital and physical systems may independently
verify each other's conclusions. A technology manager can reduce security risks by utilizing
physical and digital safeguards. To fulfill this goal, it is necessary to protect all networked
devices. Businesses can detect and respond to threats more effectively by integrating physical
and digital security. A cyberattack on a physical security system is seen, and cyber-security
measures can minimize the effects of the attack. Many companies have implemented physical
and digital security precautions to comply with government demands. This convergence has
made it possible for businesses to ensure that they continue to meet the criteria that have been
set (Paul et al.,2020).
References
Czarnowski I. (2019). A method for categorizing and arranging CISA reports. Procedia
Computer Science, 207,4369–4377. dio:10.1016/j.procs.2022.09.500 DAWSON, M., BACIUS, R., GOUVEIA, LB, and VASSILAKOS. (2020). Understanding
the Cybersecurity Challenges Facing Critical Infrastructure Sectors. in Revista
Academiei Fortelor Terestre, 26(1),69–75. dio:10.2478/raft–2021–0011 \
Paul LC, Bashar GMH, and Kashem MA. (2021). Finding Intruders in Cyber-Physical
Security Systems Using a Long Short-Term Memory Model. science and computer
science, 1-11. doi:10.1155/2022/6172362
Reply:
Traditionally, isolated areas have been used to manage several aspects of security, such as
how networks are protected from unauthorized access, and buildings are secured from
intruders. Nevertheless, there is still a lot of space for duplication across the various
departments that contribute to enterprise security. When people work together, they can reap
the total rewards of their labor. To ensure the entire protection of all information, assets, and
workers within your firm, all security measures within your organization must work together.
Protection of information, people, and activities are only some of the many facets of security
that benefit from shared intelligence. Every one of an organization's operational units is not
immune to risk. A more accurate image of the threats may be constructed, and an acceptable
response can be made if the two groups of operators talk to one another. Operators in both
cyber and physical security have the responsibility of risk management.
Reply: A thorough understanding of how cyber-risks endanger a company's IT infrastructure and, by
extension, its physical assets is essential for companies investing in digital technology to
improve their physical security. It is crucial because companies spend increasingly large
sums of money on digital technologies to enhance their physical security. The company is
making these purchases to improve its physical safety. Cybercriminals can breach previously
secure networks through newly created entry points made possible by the Internet of Things
devices like cameras, sensors, and digital door locks. Every device on a company's network is
vulnerable to a cyberattack if even one of these resources is hacked. The loss of even one of
these assets poses a threat. This danger persists even if only a single asset is lost or stolen.
The most effective course of action can only be determined by a joint effort between private
security and public safety decision-makers and cyber and physical security specialists. Reply:
Convergence is more than just merging your company's IT and physical security teams into
one. When using the approach of combining functions, intersection is optional and assured.
This is necessary if we are to advance. Today's institutions rely on digital and physical assets,
and it takes a team effort from security professionals to keep them safe. Businesses in the
private security industry and government agencies must comply with this regulation. Experts
in the field of security must collaborate, but the specifics of such cooperation will vary from
firm to company. Cyber and physical security professionals in business and government must
work together to determine the best action. This is necessary if we are to advance. Today's
institutions rely on digital and physical assets, and it takes a team effort from security
professionals to keep them safe. Companies in the private security industry and government
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
agencies must comply with this regulation. Experts in the field of security must collaborate,
but the specifics of such cooperation will vary from firm to company.