Question

In: Computer Science

Clearly in an environment of the internet of things and the fog of the internet, traditional...

Clearly in an environment of the internet of things and the fog of the internet, traditional firewalls and traditional cyber security methodology is insufficient to protect critical infrastructure and industry from cyber-attacks. In a substantive post (at least 250 words or greater) Develop your model of what a successful cyber defense should be, and substantiate your argument.

Solutions

Expert Solution

Answer:-

Cyber Security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cyber security and physical security.

Ensuring cyber security requires coordinated efforts throughout an information system. Elements of cyber security include:

  • Application security
  • Information security
  • Network security
  • Disaster recovery / business continuity planning
  • Operational security
  • End-user education

One of the most problematic elements of cyber security is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected against. Such an approach is insufficient in the current environment. Adam Vincent, CTO-public sector at Layer 7 Technologies (a security services provider to federal agencies including Defence Department organisations), describes the problem:

"The threat is advancing quicker than we can keep up with it. The threat changes faster than our idea of the risk. It's no longer possible to write a large white paper about the risk to a particular system. You would be rewriting the white paper constantly..."
To deal with the current environment, advisory organisations are promoting a more proactive and adaptive approach. The National Institute of Standards and Technology (NIST), for example, recently issued updated guidelines in its risk assessment framework that recommended a shift toward continuous monitoring and real-time assessments.


Related Solutions

INTERNET OF THINGS (IOT) 22. You are lecturing in a seminar regarding the aspects of traditional...
INTERNET OF THINGS (IOT) 22. You are lecturing in a seminar regarding the aspects of traditional BigData analysis that can be directly applied to IoT. What topics would you choose in this regard?
Internet of Things: Think about the term "Internet of Things" in which things (objects, animals, and...
Internet of Things: Think about the term "Internet of Things" in which things (objects, animals, and people) are connected to the Internet and can automatically transfer data over a network. Our society is already filled with many examples of “smart nodes”—such as cars, appliances, and entertainment devices—that are connected to the Internet. What are the advantages and disadvantages of developing a more robust "Internet of Things" and continuing to add more smart nodes?
WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF INTERNET OF THINGS (IOT) IN AN ORGANIZATION
WHAT ARE THE ADVANTAGES AND DISADVANTAGES OF INTERNET OF THINGS (IOT) IN AN ORGANIZATION
From Case Project 10-5: Internet of Things in your textbook: Use the Internet to research the...
From Case Project 10-5: Internet of Things in your textbook: Use the Internet to research the Internet of Things (IoT). You can find the case project by opening up your full book by clicking on the book icon in the right navigation bar from within Mindtap. You will then need to select Chapter 10, and page forward until you get to the case project section. In your own words, what is IoT? How is it being used today? How will...
You want to test a new instrument for ammonia analysis in fog water (basic fog is...
You want to test a new instrument for ammonia analysis in fog water (basic fog is associated with uncontrolled ammonia releases from waste lagoons containing agricultural waste from confined animal feedlot operations or CAFOs). First you have to check its operation against a standard reference solution of 100.00 micromolar ammonia. It reads 98.23, 88.16, 101.30, 101.47, 99.59 and 101.66 over six replicate measurements. Using α = 0.05 and a t-test, solve for if there is any evidence that the analysis...
It is predicted that in the coming I4.0 era, even things will use the Internet. To...
It is predicted that in the coming I4.0 era, even things will use the Internet. To this end, the current IPv4 will be expanded to IPv6 to expand the Internet's address space. Q: Explain IPv6, and how it relates to 5G.
You are working on a company specialized in the “Internet of Things”. They design and redesign...
You are working on a company specialized in the “Internet of Things”. They design and redesign technological products that are going to be used at home. You are in charge of the team that works to improve the product’s Human-Computer Interaction. A new employee has been hired to join the HCI team. He is knowledgeable about the use of technology. However, this is his first time working with HCI. Since you are in charge of the team, you are especially...
Identify and assess 3 challenges associated with the implementation of IoT ( Internet of Things )...
Identify and assess 3 challenges associated with the implementation of IoT ( Internet of Things ) within the manufacturing system.
Summarise 3 benefits for manufacturers from adopting the IoT ( Internet of Things ).
Summarise 3 benefits for manufacturers from adopting the IoT ( Internet of Things ).
write a research paper of about 2000 words on the impacts of internet of things on...
write a research paper of about 2000 words on the impacts of internet of things on the way we live and work.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT