Question

The increasing number of cybersecurity attacks by hackers with many different objectives requires companies of all...

The increasing number of cybersecurity attacks by hackers with many different objectives requires companies of all sizes to implement a cybersecurity defense program. Such a program may include objectives to identify, protect, detect, respond and recover from threats. Assume that you are advising an organization that is implementing a cybersecurity defense program. What processes/systems/controls would you recommend for each of the objectives noted?

Homework Answers

Answer #1

Objectives to identify cyber attacks

Cyber security is the practice of ensuring the integrity, confidentiality and availability (ICA) of information. It represents the ability to defend against and recover from accidents like hard drive failures or power outages, and from attacks by adversaries. The latter includes everyone from script kiddies to hackers and criminal groups capable of executing advanced persistent threats (APTs), and they pose serious threats to the enterprise. Business continuity and disaster recovery planning are every bit as critical to cyber security as application and network security.

Security should be top of mind across the enterprise, and come with a mandate from senior management. The fragility of the information world we now live in also demands strong cyber security controls. Management should see that all systems are built to certain security standards and that employees are properly trained. All code, for example, has bugs, and some of those bugs are security flaws. Developers are only human, after all.

Protection From Cyber Attacks

  • Encrypt the data
  • Use Strong Password
  • Use Antivirus
  • Firewall
  • Update Operating Systems
  • Intrusion Detection Installation
  • Back up your data
  • Access Restricted Information
  • Appoint Security Expert

The era of internet and technology has brought with itself numerous benefits along with some risks. Cyber attacks have become common and the majorities at threat are businesses. The above tips are well-tested and have helped the businesses to run safely. In the 21st century, the security investments are significant. So make your business immune against insidious attacks by employing these tips. By this, your business will be secure and you will be relaxed

How to detect Cyber attacks

  • Identify mysterious emails
  • Note unusual password activity
  • Identify suspicious pop-ups
  • Report a slower-than-normal network
  • Keep software up-to-date

How to Respond to Cyber Attacks

  • Get Your Incidents Response Team Ready to Act
  • Secure Your IT Systems
  • Set Your Backups in Motion
  • Notify the Authorities

How to recover from cyber attacks

To contain and remove the issue, your IT department should be ready to spring into action. To ensure that they are prepared for such a task, any business owner should hire a cybersecurity specialist or send their IT staff for cybersecurity training. They should be prepared to:

  • Separate sensitive data from the network. If banking and login information is not encrypted, do so now.
  • Reset all affected logins. All parties affected by the cyberattack should have their login details changed and the new passwords should be secure in that they have uppercase letters, lowercase letters, symbols and numbers. Also consider using two-factor authentication to tighten up security.
  • Reinstall affected files. Any programs that have been affected by the attack should be uninstalled and reinstalled so that the infection cannot spread.
  • Disconnect affected hosts. Once it has been disconnected, the host is no longer available and can no longer be subjected to the cyberattack.
  • Apply security patches if necessary. This software is designed to update any programs or operating systems, fixing vulnerabilities and other bugs that could compromise your online security.
  • Remove all files installed by the attack. After they have been isolated, your IT analysts will investigate them to gain a better understanding of the attack, potentially identify the attacker and identify any security vulnerabilities.
  • Inform your customers promptly

  • Prevent future breaches

  • Tighten up your legal defense

?

Being prepared and acting quickly are vital to helping your company recover from a cyberattack as effectively as possible. Your customers will appreciate that you’ve taken action promptly to protect them, which goes a long way to maintaining a successful and profitable business in light of a data breach.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Government is cleaning up the way companies do business after accounting and governance scandals rocked investor...
Government is cleaning up the way companies do business after accounting and governance scandals rocked investor confidence and damaged the reputation of companies large and small. The Sarbanes-Oxley Act (SOX) of 2002 was enacted in response to the high-profile Enron and World Com financial scandals to protect shareholders and the public from accounting errors and fraudulent practices by organizations. One primary component of the SOX is the definition of which records are to be stored and for how long. For...
FinTechCo Case Study Company Overview FinTechCo is a medium-sized financial services company comprising of 45 employees...
FinTechCo Case Study Company Overview FinTechCo is a medium-sized financial services company comprising of 45 employees with an annual revenue of $10 million. It has approximately 1000 customers comprising of private individuals and small companies. FinTechCo’s mission is to provide financial services and advice to its clients, to sell various products and services and offer consultation guidance regarding the information systems that support them. Problem Statement FinTechCo’s technical team were originally qualified financial planners who transitioned into technical roles and...
can you give me short summary abstract and conclusion on chapters 1 and chapters 2 in...
can you give me short summary abstract and conclusion on chapters 1 and chapters 2 in Strategic Market Management, 9th Edition, by David A. Aaker As you said yu want more info, below is the info, can you please answer my question now. Management Tasks:Strategic Analysis ,Innovation,Multiple Business—Strategies and Issues,Creating SCAs,Developing Growth Platforms Business Strategy:The Product-Market Investment Strategy –    where to compet,The Customer Value Proposition,Assets and Competencies,Functional Strategies and Programs The Product-Market Investment Strategy-Invest to grow (or enter a product...
Sign In INNOVATION Deep Change: How Operational Innovation Can Transform Your Company by Michael Hammer From...
Sign In INNOVATION Deep Change: How Operational Innovation Can Transform Your Company by Michael Hammer From the April 2004 Issue Save Share 8.95 In 1991, Progressive Insurance, an automobile insurer based in Mayfield Village, Ohio, had approximately $1.3 billion in sales. By 2002, that figure had grown to $9.5 billion. What fashionable strategies did Progressive employ to achieve sevenfold growth in just over a decade? Was it positioned in a high-growth industry? Hardly. Auto insurance is a mature, 100-year-old industry...
What tools could AA leaders have used to increase their awareness of internal and external issues?...
What tools could AA leaders have used to increase their awareness of internal and external issues? ???ALASKA AIRLINES: NAVIGATING CHANGE In the autumn of 2007, Alaska Airlines executives adjourned at the end of a long and stressful day in the midst of a multi-day strategic planning session. Most headed outside to relax, unwind and enjoy a bonfire on the shore of Semiahmoo Spit, outside the meeting venue in Blaine, a seaport town in northwest Washington state. Meanwhile, several members of...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT