In: Computer Science
Discern the likelihood of a cybersecurity breach within the compliant environment and the impact it might have on the organization (make sure to consider emerging risks, threats, and vulnerabilities).
An organization's information about any product, customer and suppliers is meant to be kept safe and secured. In a networked system an unauthorized access to any of these information and computer resources maybe an act of breach. It may cause the loss of confidentiality, integrity and availablity. To ensure organization's security it is needed to protect information from any intentional disclosure, deletion, replication or modification.
Motives of cyber crime scene
1.power assurance
2.sadistic(anger)
3. Profit oriented and more
Impacts
Threat is a potential that can cause harm to organization's data. For e.g. a system that allow weak password
Then any intruder can exploit the password weakness to break into the system. These intruder could anyone offenders, information systems criminals or vandals.these can impact result into in security threats like excessive privilege Abuse, legitimate privilege Abuse, denial of service, weak authentication web threats like hazards of digital certificates, insecure iots and more.
Risk is potential that a given threat will exploit vulnerabilitiesof an asset and thereby cause harm to the organization.security breach can result into compromising with organization's data and would be a source of loss of its data. To secure- risk management needed to be in action performing risk assessment and risk control.
Vulnerability are some weakness of the system that could allow security to be allowed. Any cyber security breach could be made through employees , through hardware, through former employees or through software/technology. Example in case of breach made through network- like unprotected network communications, ips and ports, insecure network architecture etc. It will result into loss of information and data off the organization.