This website uses cookies to ensure you have the best experience. Learn more

Cybersecurity Case Study

950 words - 4 pages

Technology is one of the greatest inventions we have in this life. With this invention, our life became much easier than it was. Nowadays, technology has given our society full opportunities to explore our world in many fields such as medicine, Engineering, information systems, communications and information technology. In addition, it helped countries and organizations to reduce time and effort by using online services, e-gov and e-business. Moreover, it allowed people to communicate with each other in all over the world and to share information, documents and pictures by using mobile phone and social media such as Facebook, Twitter, YouTube, and Instagram. These things made governments, organizations and information security experts in IT thinking seriously about finding right strategies to apply the cybersecurity in order to protect networks, PCs and information from hacking, steal passwords, vandalism or unauthorized access by hackers, crackers and Social engineering. These strategies include applying cybersecurity fact, issuing cybersecurity polices are only the first step however, applying cybersecurity polices is the core step to minimize of risks, so cybersecurity policies have some rules that need IT group to be aware of. These policies had been reviewed by case study and our professor Dr. Elliott Lynn in the first life classroom include:
1- “The biggest potential weakness in cyber security policy is when IT group do not have any support.
2- The staff who are responsible for cyber security policy are IT professionals, because we cannot expect that executive management to be aware of security issues.
3- IT group is responsible for making sure that cyber security policy is enforced including tools.

4- The best way of understanding effective cyber security policy is by knowing the environment of work.
5- IT group has to be aware of updating cyber security policy annually, which including comprehensive updating.

6- IT group applies cyber security policy that is difficult to be followed because of the process of that policy.

7- Having a clear vision of financial funding would create transparency and trust between IT staff and senior management.

8- lack in some area of cybersecurity policy that did not address would make policy so poor and useless

9- Informing human resources and legal affairs with planning and updates.

10- Finding human elements that have high skills and knowledge would lead security policies to be succeed and developed” (Dr. Elliott Lynn speech, 2014).
One of the important issues in cyber security is that organizations do not want to admit when they have been hacked, because if they admit that they got hacked, they would basically say that they are vulnerable. This issue has been minimized to the lowest level by social media that declares about anything in the world.
On the other hand, the most security threats that clients face these days are the threats that nobody ever hears about them.


Find Another Essay On Cybersecurity-Case Study

CyberSecurity and the Threat to National Security

1974 words - 8 pages established to ensure secure networks and systems. 3) Partnerships with the private sector and other U.S. government agencies will be established with DoD to enhance cybersecurity. 4) U.S. Allies and other international partners will collectively collaborate to deter breaches in DoD’s cybersecurity systems. 5) DoD will vigilantly employ scientific and academic resources to increase our nation’s ingenuity in dealing with unmet challenges. The

Small Business Cybersecurity and the Public Cloud

1671 words - 7 pages Google Apps to see this in action. Expanding the use of public cloud computing will drastically improve future cybersecurity postures in small business. Public cloud computing reduces infrastructure requirements for small business customers and creates a smaller technology profile which reduces maintenance requirements for the small business while simultaneously giving hackers less targets to hit. Software, Operating Systems and Infrastructure

Statement of Purposefor a Masters in Cybersecurity

1235 words - 5 pages lost passwords, Cain & Able for ARP Poisoning and IP snooping, TrueCrypt for data encryption and Acunetix for Penetration Testing and auditing. Also, complex attacks like SQL Injections, DDos Attacks and hacking WPA networks were conducted in real-time scenarios. This experience has also further confirmed my strong suspicion that continuing my study of Cybersecurity in a graduate program is the right choice. In particular, during my first

Legal Essay about cybersecurity - Research Paper

1642 words - 7 pages In the 21st Century, with the improvements in technology and science, new concepts are integrated into our lives. Cybercrime is amongst those concepts that did not previously exist 15-20 years ago. In the past, only conventional crime was discussed, which refers to those traditional, illegal behaviors that most people think of as crime. These days, one must be careful not only against conventional crime but also cybercrime as it is the latest and

Policy and Compliance (Tracey)

2173 words - 9 pages also adhere to SOX regulations. Observations (Tracey) Jacket-X has grown, and in an effort to keep up with growing demands and the need for increased security they are now implementing an identity management system, however this has raised concern over privacy for their employees. (Cyberspace and Cybersecurity: Interactive Case study II). Jacket-X recently recently became a publicly traded company, therefore must adopt policies and

Security Management at The Tower

735 words - 3 pages in storing backup would create lack in cybersecurity. Many IT administrators save the backups nearby server in the server room in order to use it when needed. According to the case study, IT tried to back up the scan-Exec system on the network server, but unfortunately IT technician backed up the wrong files. All of these happened after IT decided to remove floppy disks. Which resulted lacking in availability CIA triad “CIA triad stands for

Critical Success Factors for Small Business Enterprises in Saudi Arabia

1478 words - 6 pages :// 25. Koota, J. (2003). Market review and study of success characteristics in construction companies - Case: United States. VTT Research Notes 2195. 26. Linton, I. (2011). Distribution Channel Selection Factors. Retrieved August 7, 2011, from Chron: 27. Longenecker, J. G., Moore, C. W., Palich, L. E., & Petty

Research Conclusion

1770 words - 8 pages process. During the preparation stage of the investigation, an investigator trained in the conventional methods of digital forensics will usually obtain a comprehensive history and overview of the crime scene, and have a idea of what will be required from the organization in order to proceed with the investigation. However, in the case of network forensic investigations, there is a no comprehensive history and overview of the suspected crime scene

my best

8761 words - 35 pages absolutely pivotal as advisers.' DAVID SMART, CROSS SELL MANAGER, SAGE PAGE Table ES2: Analysis framework for the 2012-13 ACCA-IMA study of technology trends Technologies Key impacts and implications Action imperatives Important technologies shaping the next decade - and beyond Critical issues for business and the profession Key response strategies Mobile Big data Artificial intelligence and robotics Cybersecurity Educational technologies Cloud

When the Bubble Burst

1539 words - 6 pages By the time I arrived state side from my second tour in the Middle East the housing bubble had already burst. I noticed a drastic change in the way that many of my friends and family were living. Several of my friends that worked in real estate had sold their boats and seconds houses. My own stock portfolio had lost a third of its value. My sister and her husband had defaulted on their home mortgage leaving them scrambling for a place to live. I

phase diagram

4456 words - 18 pages the degree of the freedom of the system in this case is F = 1 + C - P = 3 - P. Therefore, there is a maximum of 3 phases present in the binary system. At the eutectic point, all 3 distinct phases are in equilibrium consequently the degree of the freedom of the system is now F = 3-3 = 0. In sum, the eutectic point is fixed. Works Cited Introduction: Chemical equilibrium is a crucial topic in Chemistry. To represent and model equilibrium

Similar Essays

Cybersecurity Essay

1243 words - 5 pages stalking is when some just uses chat rooms, and emails to engage in conversations that are not welcomed or to follow someone on the internet With all these threats out there a person needs to understand how they can protect themselves and how fragile their computer really is. You can protect yourself and your computer with cybersecurity through the use of firewalls and virus protection programs. One must also regularly update their computer’s

Cyber Crime: Cybersecurity For Cyberspace Essay

2123 words - 9 pages wealth of potentially destructive information would have profound implications, thus, Cybersecurity policies must be implemented. Cybersecurity policies create levels and barriers of networking security as their standards, guidelines, and response to potential threats, vulnerabilities, and consequential risk are greatly reduced. Encompassing the security of “Cyberspace” is an extensive range of threat prevention and reduction techniques

Cybersecurity Gets Dumber Each Day Essay

600 words - 2 pages officials don't seem to care whether or not their data is compromised. If they did care, they would be using common sense at this point. There would be mandates from officials to stop using insecure means of communications. That is after all, if the US were truly concerned with matters of cybersecurity. Works Cited [1]

Cybersecurity And National Policy Essay

4955 words - 20 pages COUNCIL, TECHNOLOGY, POLICY, LAW, AND ETHICS REGARDING U.S. ACQUISITION AND USE OF CYBERATTACK CAPABILITIES (William A. Owens et al. eds., 2009), available at These two collectively make the case that non-governmental actors can play a major role in cyberwarfare and that cyberwarfare is freighted with unanticipatable collateral damage. 2010 / Cybersecurity and National Policy 216