In this discussion post, you will analyze and provide your perspective on why, in spite of verbose information and data on the likelihood and impact of a cybersecurity event, many organizations do not properly prepare for one. Begin by reading the article “Why Organizations Don’t Prepare for Information Security Incidents”. After reading the article provided above, respond to the following prompts in your post: Post at least three reasons you think organizations don’t prepare for information security incidents. Many applications that impact security and privacy are free. As a consumer, do you see more value in paying for an application that is more secure and does not use your personal information as part of the transaction? Justify your answer.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
100%
In this discussion post, you will analyze and provide your perspective on why, in spite of verbose information and data on the likelihood and impact of a cybersecurity event, many organizations do not properly prepare for one. Begin by reading the article “Why Organizations Don’t Prepare for Information Security Incidents”. After reading the article provided above, respond to the following prompts in your post: Post at least three reasons you think organizations don’t prepare for information security incidents. Many applications that impact security and privacy are free. As a consumer, do you see more value in paying for an application that is more secure and does not use your personal information as part of the transaction? Justify your answer.
Expert Solution
Step 1

Introduction :

What is Information Security :

Information security encompasses more than just protecting data from unauthorised access. The practise of preventing unauthorised access, use, disclosure, disruption, alteration, inspection, recording, or destruction of information is known as information security. Information comes in both physical and digital forms. Information can include anything, such as your biometrics, your phone's data, your social network profile details, or your details. Information security therefore encompasses a wide range of academic disciplines, including cryptography, mobile computing, cyber forensics, online social media, etc.

There are four types of information technology security you should consider or improve upon:

  • Network security 
  • cloud security
  • Application security 
  • Internet of Things security

Network Security :

Your computers and other devices are probably connected to a network, regardless matter whether you have a little office space or a big headquarters. (I mean, c'mon, it's 2022.) This facilitates internal communication within your team, but it also exposes you to dangers from outside.

Malware and targeted cyber attacks can get past your network security if you aren't keeping an eye on your infrastructure and network. Your security is greatly improved by having the necessary technologies, such as firewalls and antivirus systems, to stop these attacks.

Cloud Security :

When using cloud-based platforms and data storage applications, you ought to pick a dependable vendor. For instance, the Google Cloud platform has security capabilities. Businesses should be aware of the differences between their responsibilities and those of the provider as more and more companies employ cloud-based systems, especially as working from home becomes popularity.

Using the Google Cloud as an example, Google would have access to their physical hosts, network, and infrastructure in order to fix or configure any issues that might occur. Businesses who utilise Google Cloud, on the other hand, would need to be aware of who has access to the cloud, make sure that no one could acquire unauthorised access, and secure cloud-based data assets.

Apllication Security :

Internet dangers? For that, an app exists. And that app is... well, virtually any app you use. During the design and development phases, security measures are incorporated into apps. Therefore, whether you use apps from local network or the cloud, it's crucial to use those from reputable companies.

For instance, email poses one of the biggest security risks to enterprises. For a firm to be successful, threats within email applications must be neutralised and minimised. Your business could fall into disarray with just one click on a malicious link.

Internet of Things Security :

the laptop you bring to meetings. Your phone, which you use to call clients and utilise Slack. the printer you memoized. Every now and again, you should unplug and replug your Wi-Fi router. Among the "things" that make up the internet of things are a handful of these (IoT). A gadget that is tied to your network creates a gateway for potential security risks.

 

 

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Threats
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education