Question

In: Computer Science

What recommendations can cyber security practitioners adopt in order to introduce a few immediate steps to...

What recommendations can cyber security practitioners adopt in order to introduce a few immediate steps to bring about meaningful change?

Solutions

Expert Solution

Before answering the steps that cybersecurity practitioners should take in order to bring a meaningful change we should aware of who the persons are cybersecurity practitioners.

Who are Cyber Security Practitioners:

Cyber Security Practitioners are the professionals who deal with business risk and what design and operations can be taken in order to avoid any malicious activity such as cyber-attack or hack in an IT industry. Cyber Security Practitioner Certification is a program in which such professionals are taught to deal with such cases.

Steps that can be taken by Cyber Security Practitioner in order to bring about meaningful change :

1. They should train employees from before about various cybersecurity threats and principles and how to cope up with them in the immediate situation.

2. They should install good antiviruses, antispyware, and software from before in order to protect the network from any cyber attack.

3. They should advise firms to use firewalls so that inappropriate data that can cause breach or attack can be stopped from entering inside the company network.

4. All software and hardware used in companies should be updated on a regular basis in order to avoid any cyber attack on the company.

5. Backup of data should be created by companies in order to save their data in case of any breach or corruption. Clouds such as AWS and Azure can be the best option for this.

6. They should train employees of the company for not using any external physical devices in the company systems. This system should also be banned in companies.

7.Wifi and WiMax used in the company should be monitored continuously in order to avoid any cyber-attack because wifi is the first place where attackers keep their eyes.

8. All employees should be given individual accounts so that if any unfamiliar action is taken by any employee in the company it can easily be tracked because company employees can also help attackers.

9. Limited access should be given to employees based on their position in the company. All employees should not be authorized to access data and install software on their machines.

10. Practitioners should guide employees in password policy and should them to keep changing their passwords on a continuous basis

11. Cyber Security Practioner should design a Network Monitoring Tool which will keep monitoring the entire flow of data in the company and will send a notification in case of any unfamiliar action.

12. Practitioners should take continuous sessions in order to let the employees and owners know about the latest malware which can affect the company.


Related Solutions

(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the differences with the help of appropriate examples. Please provide your own words. No copy from the internet. 150 to 200 words.
Learn all you can about the Cyber Security Enhancement Act. What is it? Provide some examples...
Learn all you can about the Cyber Security Enhancement Act. What is it? Provide some examples of court cases that involved violations of this act. What are some of the punishment(s) if someone is found guilty?
How can increased cyber security have a negative impact on data privacy?
How can increased cyber security have a negative impact on data privacy?
What is an operon and what are the steps necessary to introduce it to human genome...
What is an operon and what are the steps necessary to introduce it to human genome .how would you go about it where would you place it and what vector would you use ? What are transpoons ? Where is it okay to find them ? And what are advantage and disadvantage to them
Tell of a cyber-security breach: What company, what happened, and what was the outcome? What are...
Tell of a cyber-security breach: What company, what happened, and what was the outcome? What are your thoughts about this security breach?
What would be a good Topic for a Dissertation in Cyber Security in 2020 Create a...
What would be a good Topic for a Dissertation in Cyber Security in 2020 Create a 750-word document that includes the following: An opening paragraph introducing the topic and the reasons why you chose the topic. A summary of each of the articles you used that provide support for further research on the topic you chose. Include in the summary information on why the article supports further research. Each summary should be approximately 100 words in length. A concluding paragraph...
Finally, as a net importer of oil, provide a few recommendations on how SA can benefit...
Finally, as a net importer of oil, provide a few recommendations on how SA can benefit most from the current oil crash, specifically focusing on the post-pandemic period. Should we continue with our current oil-based production practices or should economic activity be structured more toward alternative energy sources.
Order winning and qualifiers is criteria organizations can adopt to be competitive in the market space....
Order winning and qualifiers is criteria organizations can adopt to be competitive in the market space. With reference to higher education, local or international, show how the concept has been utilized
Cyber Security. Dark Web.................................. What is the supposed origin of the Dark Web? What does your...
Cyber Security. Dark Web.................................. What is the supposed origin of the Dark Web? What does your team think about whether it is needed/not needed? Important/not important? A security risk/not a risk? Any security implications? Please, need reference or citation!
Question 3 (20 marks) (a) What are the differences in nature between cyber security and crime...
Question 3 (a) What are the differences in nature between cyber security and crime versus other kinds of crimes or other kind of police. (b) What are the possible difficulties for imposing regulation to cyber crime?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT