Question

.Universities are constantly facing a variety of cyber security threats, including disruption to the functioning of...

.Universities are constantly facing a variety of cyber security threats, including disruption to
the functioning of their networks, targeted attempts to obtain valuable and personal information,
and advanced threats that aim to exploit the sector’s place in economic development. Digital
information is at the core of a university’s diverse network of departments and activities. The main
challenge a university faces, in terms of cyber security, is defending its critical data from potential corruption caused by modern cyber threats. The current cyber landscape poses a range of threats. Today’s cyber-attackers and hackers are constantly developing new and advanced methods of attack. Insider threat poses a big risk to companies with large and complex networks within which anomalous behavior could go unnoticed. Legacy approaches to cyber security are not sufficient in defending against these sophisticated attacks. The university prioritized finding a cyber security
tool, which would enable it to detect novel threats, from all sources, and mitigate their risk before they can escalate.
(300 words)
Give your suggestion for risk mitigation to
1. Real-time threat detection
2. investigate efficiently and respond to potential cyber threats to mitigate risk

Homework Answers

Answer #1

Hi,

Please find the answer below:

-------------------------------------------

Risk mitigation

Risk mitigation is the process or steps followed to reduce the impact of potential risk or problem. Risk mitigation is needed when risk becomes a reality. Risk mitigation steps would save the enterprise/university from data loss, revenue loss, reputation loss, etc that is occurred due to cyber threats.

Real-time Cyber Threat detection

To detect cyber threats in real-time the organization has to perform a Continuous Monitoring of the network resources and assets. Patch or upgrade vulnerability scanners, plugins to detect novel and new kind of cyber threats that evolve during the course of time. Follow a layered approach to detect threats at each layer. Train and make the university staff understand that security is an on-going process and not a one-time process.

Threat Response

Build a solid IR (Incident Response) team to handle cyber threats and security breaches. There are several steps that need to be taken to respond to a threat. IR team is a body of members that act as a team when the cyber threat becomes reality in an organization.

Detect the security breach or cyber hack.

Perform a Risk assessment. Assess the severity and impact of the incident.

Activate recovery steps to mitigate the loss or void the incident.

Notify the top management about the incident. This may follow with notifying the customers, stakeholders, faculty staff, students, etc.

Retrospect and perform preventive actions so that the potential risks /incidents do not repeat in the future.

----------------------------------------------

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions