Cyber Security and Risk Management Read Four (4) academically reviewed articles
ID: 330694 • Letter: C
Question
Cyber Security and Risk Management
Read Four (4) academically reviewed articles on Cyber Security and Risk Management and complete the following activities:
(Wikipedia articles will not be accepted. Professor may check originality of all posts. Avoid copy-and-paste.
1. Summarize all four (4) articles in 300 words or more. Please use your own words. No copy-and-paste
2. Base on your article review and the assigned reading, discuss the relationship between cyber security and risk management.
3. As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company
Explanation / Answer
With the advancement in technology, businesses are presented with challenges that are unprecedented in nature, every day, which requires newer and more advanced policies regarding cybersecurity at a level where risk management becomes the sole purpose of some IT departments. It is increasingly important to be able to educate, organize and secure the data and the workforce in order to be given the absolute chance for companies to effectively employ risk assessment and damage control options. Usually, companies indulge various methods which include data backup centres, cloud implementations, clearance based access, firewall, network security, virus scanner programs and other techniques in order to be safe from any sort of breach or attacks. This is not just limited to the wireless and software aspect but also increasing the physical security level of the digital data will allow the companies to keep their data secure while preventing unauthorized access and attacks of various magnitudes.
It is especially more and more concerning for the companies to invest in such solution to pro identity a level of safety for their private data which could contain sensitive information, public data regarding their customers and analytical data all at the same time. Companies need to invest in an all-purpose system which can fully operate in the given conditions of the requirements that are presented as a challenge to the companies.
Cybersecurity and risk management can be considered as the parts of the same coin. Both serve their purpose in order to safeguard the private data while the major differences being in the area of implementation. Risk management can be considered as the development of contingency plan which in some cases can be considered as a sort of a last case defence strategy while cybersecurity essentially is the first line of defence against the attacks to the information or the data.
For my company, as the IT manager, I would start by upgrading the current system to the specific standards while all the physical access point would be secured. New all in one data protection. Tools will be implemented which will contain software such as data encryption, network management and security, anti-virus and firewall and a level based access system which will allow only a certain amount t of data available to a certain person essentially safeguarding the rest of the data. I would also invest in cloud services as a data backup center and safeguard the data from any sort of corruption during any attacks or system failure.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.