.Universities are constantly facing a variety of cyber
security threats, including disruption to
the functioning of their networks, targeted attempts to obtain
valuable and personal information,
and advanced threats that aim to exploit the sector’s place in
economic development. Digital
information is at the core of a university’s diverse network of
departments and activities. The main
challenge a university faces, in terms of cyber security, is
defending its critical data from potential corruption caused by
modern cyber threats. The current cyber landscape poses a range of
threats. Today’s cyber-attackers and hackers are constantly
developing new and advanced methods of attack. Insider threat poses
a big risk to companies with large and complex networks within
which anomalous behavior could go unnoticed. Legacy approaches to
cyber security are not sufficient in defending against these
sophisticated attacks. The university prioritized finding a cyber
security
tool, which would enable it to detect novel threats, from all
sources, and mitigate their risk before they can escalate.
(300 words)
Give your suggestion for risk mitigation to
1. Real-time threat detection
2. investigate efficiently and respond to potential cyber threats
to mitigate risk
Hi,
Please find the answer below:
-------------------------------------------
Risk mitigation
Risk mitigation is the process or steps followed to reduce the impact of potential risk or problem. Risk mitigation is needed when risk becomes a reality. Risk mitigation steps would save the enterprise/university from data loss, revenue loss, reputation loss, etc that is occurred due to cyber threats.
Real-time Cyber Threat detection
To detect cyber threats in real-time the organization has to perform a Continuous Monitoring of the network resources and assets. Patch or upgrade vulnerability scanners, plugins to detect novel and new kind of cyber threats that evolve during the course of time. Follow a layered approach to detect threats at each layer. Train and make the university staff understand that security is an on-going process and not a one-time process.
Threat Response
Build a solid IR (Incident Response) team to handle cyber threats and security breaches. There are several steps that need to be taken to respond to a threat. IR team is a body of members that act as a team when the cyber threat becomes reality in an organization.
Detect the security breach or cyber hack.
Perform a Risk assessment. Assess the severity and impact of the incident.
Activate recovery steps to mitigate the loss or void the incident.
Notify the top management about the incident. This may follow with notifying the customers, stakeholders, faculty staff, students, etc.
Retrospect and perform preventive actions so that the potential risks /incidents do not repeat in the future.
----------------------------------------------
Get Answers For Free
Most questions answered within 1 hours.