In: Computer Science
Cyber Security is a major concern to legitimate businesses around the world. It is also the largest growing illegitimate business. What are the 2 to main attack vectors on the technical side discussed in class? What is the 1 main vector for attack on the social engineering side? Explain how IT managers can best thwart attacks. What is a good business approach to creating a solid defense strategy? Explain the elements.
Please explain thoroughly wit at least 500 words. do not copy paste answers from the web too i can. do that as well. Thank you very much.
1).ANSWER:
GIVEN BELOW:
CYBER : It will refer to the background of computer, information technology and artificial intelligence
SECURITY : to protect and assure on something
CYBER SECURITY : It refers to protection of virtual data from being lost. There are different different organisation engaged in this business to protect the data of their client.
Basically this is corporation that uses updated technologies and designed practices to save the data from hacking, attach or sabotage
When any content is in virtual world the chances of lost is increased as any unauthorized access can easily attack the system and gain undue advantage.
One main vector for attack on social engineering side is Phishing : it can b any sort of phishing i.e. either spear using e-mails or Vishing using phone calls or Smishing using SMS and text messages.
The technical world is also surrounded by sniffing attacks and hacking through unauthorized access.
Leaking of sensitive information either personal or business is not acceptable in any way therefore the companies and organisation should create solid defense strategy
The first factor is trust and reliability. The IT managers
should work with only those service providers that have proper
security systems and goodwill in the market.
IT managers should opt of version of software that may create a
wall between the content and outside wall.
Installation of pad antivirus software ; the software easily
available online should not be used instead paid software from
trusted company should be used.
Ensure that all the system are working in order and check on the
regular updates from virus and theft.
Awareness among employee about the terminologies and coded language
used in deriving the unauthorized data.
To keep the check on the main server and hypervisors to find out
any vulnerabilities.
Outsource of any experts on interval basis to conduct the audit of
systems and servers.
Cloud Maintenance: there should be backup of every data you have
worked on or derived using the software techniques.
Using of Artificial Intelligence to secure the data by making every
content into coded language.
Installation of spam Filter.
BUSINESS APPROACH
The best business approach to make a defense strategy is to
monitor the transaction occurred and transparency in the
transaction. Detection of fraud at early stage help to take action
early thereby preventing the data from theft.
Analysis the nature of service provider. In case of any suspicious
transaction, reporting to the top management.
Detection of fraud helps to identify the risk of above mentioned
threats and any phishing of system.
Taking action includes intimation to cyber police or service
provide to increase the layers of security mechanism.
CONCLUSION
Today many tutorials are available online to theft the day. Therefore every organisation should follow layers of security to protect the data. This world is being virtual day by day hence one has to work in this environment only. So, for smooth functioning it is better to be aware about the security concerns and take prompt action depending upon the situation.