Question

In: Computer Science

Cyber Security is a major concern to legitimate businesses around the world. It is also the...

Cyber Security is a major concern to legitimate businesses around the world. It is also the largest growing illegitimate business. What are the 2 to main attack vectors on the technical side discussed in class? What is the 1 main vector for an attack on the social engineering side? Explain how IT managers can best thwart attacks. What is a good business approach to creating a solid defense strategy? Explain the elements.

Solutions

Expert Solution

SOLUTION -

CYBER : It will refer to the background of computer, information technology and artificial intelligence

SECURITY : to protect and assure on something

CYBER SECURITY : It refers to protection of virtual data from being lost. There are different different organisation engaged in this business to protect the data of their client.

Basically this is corporation that uses updated technologies and designed practices to save the data from hacking, attach or sabotage

When any content is in virtual world the chances of lost is increased as any unauthorized access can easily attack the system and gain undue advantage.

One main vector for attack on social engineering side is Phishing : it can b any sort of phishing i.e. either spear using e-mails or Vishing using phone calls or Smishing using SMS and text messages.

The technical world is also surrounded by sniffing attacks and hacking through unauthorized access.

Leaking of sensitive information either personal or business is not acceptable in any way therefore the companies and organisation should create solid defense strategy

  1. The first factor is trust and reliability. The IT managers should work with only those service providers that have proper security systems and goodwill in the market.
  2. IT managers should opt of version of software that may create a wall between the content and outside wall.
  3. Installation of pad antivirus software ; the software easily available online should not be used instead paid software from trusted company should be used.
  4. Ensure that all the system are working in order and check on the regular updates from virus and theft.
  5. Awareness among employee about the terminologies and coded language used in deriving the unauthorized data.
  6. To keep the check on the main server and hypervisors to find out any vulnerabilities.
  7. Outsource of any experts on interval basis to conduct the audit of systems and servers.
  8. Cloud Maintenance: there should be backup of every data you have worked on or derived using the software techniques.
  9. Using of Artificial Intelligence to secure the data by making every content into coded language.
  10. Installation of spam Filter.

BUSINESS APPROACH

  1. The best business approach to make a defense strategy is to monitor the transaction occurred and transparency in the transaction. Detection of fraud at early stage help to take action early thereby preventing the data from theft.
  2. Analysis the nature of service provider. In case of any suspicious transaction, reporting to the top management.
  3. Detection of fraud helps to identify the risk of above mentioned threats and any phishing of system.
  4. Taking action includes intimation to cyber police or service provide to increase the layers of security mechanism.

CONCLUSION

Today many tutorials are available online to theft the day. Therefore every organisation should follow layers of security to protect the data. This world is being virtual day by day hence one has to work in this environment only. So, for smooth functioning it is better to be aware about the security concerns and take prompt action depending upon the situation.

IF YOU HAVE ANY DOUBT PLEASE COMMENT DOWN BELOW I WILL SOLVE IT FOR YOU:)
----------------PLEASE RATE THE ANSWER-----------THANK YOU!!!!!!!!----------


Related Solutions

Cyber Security is a major concern to legitimate businesses around the world. It is also the...
Cyber Security is a major concern to legitimate businesses around the world. It is also the largest growing illegitimate business. What are the 2 to main attack vectors on the technical side discussed in class? What is the 1 main vector for attack on the social engineering side? Explain how IT managers can best thwart attacks. What is a good business approach to creating a solid defense strategy? Explain the elements. Please explain thoroughly wit at least 500 words. do...
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how...
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy. Compose an organizational security policy that protects the confidentiality , integrity , and availability of EQUIFAX DATA BREACH IN 2017 Original Question : Prompt: You will submit your creation of a cyber-security...
It is true that entrepreneurship thrives on uncertainty because small businesses around the world have handled...
It is true that entrepreneurship thrives on uncertainty because small businesses around the world have handled the COVID-19 crisis better than larger firms. Discuss
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber...
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber threat landscape. Yet the market for cyber security remains small, and organizations are making only tactical investments in cyber security measures—one of the reasons why there has been an increase in cyber-attacks. Evidence suggests that this trend will last for some time to come. However, the anticipation of an increasingly open and mobile enterprise should help refocus the spotlight on strategic investments in areas...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the differences with the help of appropriate examples. Please provide your own words. No copy from the internet. 150 to 200 words.
Recent trends in globalization have forced businesses around the world to more keenly focus on profitability....
Recent trends in globalization have forced businesses around the world to more keenly focus on profitability. This trend is also present in Japan, where historical links between banks and businesses have traditionally blurred the goals of firms. For example, the Japanese business engineering firm, Mitsui & Co. Ltd., recently launched “Challenge 21”. A plan directed at helping the company emerge as Japan’s leading business engineering group. According to a spokesperson for the company.” [ This plan permits us to] create...
Recent trends in globalization have forced businesses around the world to more keenly focus on profitability....
Recent trends in globalization have forced businesses around the world to more keenly focus on profitability. This trend is also present in Japan, where historical links between banks and businesses have traditionally blurred the goals of firms. For example, the Japanese business engineering firm, Mitsui & Co. Ltd., recently launched “Challenge 21”. A plan directed at helping the company emerge as Japan’s leading business engineering group. According to a spokesperson for the company.” [ This plan permits us to] create...
Impact of COVID-19 on Multinational Companies MNCs (such as BHP, Rio Tinto) businesses around the world.
Impact of COVID-19 on Multinational Companies MNCs (such as BHP, Rio Tinto) businesses around the world.
Many businesses around the world still fail because their capital investment decisions are based upon a...
Many businesses around the world still fail because their capital investment decisions are based upon a calculation on the back of an envelope and do not take any of the correct factors into account. Even larger businesses often get this wrong. This is a true sign of poor resource management. Do you agree or disagree? Discuss the alternative methods of investment appraisal and describe the limitations of these to help justify your arguments. How do you think that capital budgeting...
List major stock exchanges in the US and around the world. Discuss some of the important...
List major stock exchanges in the US and around the world. Discuss some of the important characteristics of each of these exchanges.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT