Saturday, December 7, 2019

Communications Surveys and Tutorials †Free Samples to Samples

Question: Discuss about the Communications Surveys and Tutorials. Answer: Introduction The Information Technology have been growing rapidly in the modern market by providing benefits to the business organization. The use of different technologies in the business operation have provided growth in the revenue of the business organization. This report deals with the risks and threats in the business organization after using the different technologies over the internet. This report outlines the different factors that are causing problems in the cyber world. There are some initiatives taken to minimize the identified problems. The security of the data and information over the internet s termed as the cyber security. It has become a serious issue for the business organization all over the world. There is an increase in the number of cyber-attacks all over the world (Von Solms and Van Niekerk, 2013). The installation of the anonymous software has been a big problem for the business organization. The installation of the unwanted software has been stopped that has reduced the hardware crash and other problems (Wang and Lu, 2013). The above figure depicts about the comparison between the data breach and cyber-attack all over the world. It can be analyzed that the ratio of cyber-attacks has been more than the data breach in the companies. The major problem for the cyber security is the threat of viruses and malwares. These viruses and malwares re responsible for the cyber-attacks in the server over the internet (Hahn et al., 2013). The hackers used to hack the websites and online databases of the company by sending phishing mails, viruses and malwares. These types of hackings are used by the hackers to cause data loss of the data and asks for ransom against the data and information (Amin et al., 2013). The multi-disciplinary affairs of the business organization have led to the threats of cybercrime and cyber-attacks in the business organization (Gordon et al., 2015). The cyber security has been continuously evolving in the internet technology sector. The use of the old version of software does not helps in detecting the virus and malwares in the database server of the company (Ayres et al., 2016). This causes the cyber-attacks in the database server and cases huge loss to the data and information of the company. 4 levels of Thinking The four levels of thinking model helps in analyzing the problems and different issues in different fields of operations. The four levels of thinking deals with identifying the factors of the problems. In this case, cyber security has been a prioritized theme for the business organization. The level 1 discusses about the positive feeling regarding the sector. The cyber security has been an important sector for the business organization and has provided many benefits to the organization. The level 2 of thinking deals with the negative feeling for related topics. The cyber-attacks has been causing a huge loss in the data and information of the companies in the market (Herrera, Ron and Rabado, 2017). The level 3 deals with the positive thinking but not well for the business organization. The use of old firewalls and anti-viruses is causing threat for the company related to the cybercrime. The level 4 of thinking deals with the thinking that does not feel good and not good for others. The use of the unsecure gateway has been a cause for the cyber-attacks in the business origination. Initiatives for mitigating problems There are various strategies and initiatives are made to mitigate the cyber security problems in the organization. The security methods of the company have to be enhanced to restrict the viruses and malwares in the server of the company. The critical resources of the company have to be maintained by the security strategies of the company in the market. The security protocols of the companies have to be upgraded. The strategies of the company in order to provide security to the data and information includes the encryption technique the data transfer in the company is done with the help of data encryption method that helps in securing the data packets from hacking (Buczak and Guven, 2016). The encryption o data is done with the help of a pattern and a key that is only known by the receiver and sender. The data and information of the company have to be secured or the success of the company in the market. The Data Protection Act 1998 has been properly implemented in the companies. This act helps in securing the personal information of the employees and other staffs of the organization (Inan et al., 2016). No personal data and information is shared with anyone without the permission. Therefore, this has helped in maintaining the security of the data and information. The installation of the anonymous software has been a big problem for the business organization. The installation of the unwanted software has been stopped that has reduced the hardware crash and other problems (Von Solms and Van Niekerk, 2013). Only the licensed software is installed in the server of the companies. Recommendations The IT solutions to the cyber-attacks in the world have become ab important agenda for the business organization in the market. The companies needs to use updated firewalls and anti-virus software that helps in restricting the dangerous viruses and malwares from entering into the database server of the company. The unauthorized users are not allowed to use the portal of the company. There is prior need of monitoring the security needs of the company. A regular checkup of the security solutions are done for analyzing the security levels of the company in the market. Conclusion It can be concluded that the cyber security has been an important part or the business organization in the market. The cyber-attacks has been the main problems to the cyber security. Various viruses and malwares are used for the attacks in the server of the company for causing data breach of the company. The use of the updated firewalls and anti-viruses software help in maintaining the security of the server from the cyber-attacks over the internet. References Amin, S., Litrico, X., Sastry, S. and Bayen, A.M., 2013. Cyber security of water SCADA systemsPart I: Analysis and experimentation of stealthy deception attacks.IEEE Transactions on Control Systems Technology,21(5), pp.1963-1970. Ayres, N., Maglaras, L., Janicke, H., Smith, R. and He, Y., 2016. The mimetic virus: A vector for cyber security. Buczak, A.L. and Guven, E., 2016. A survey of data mining and machine learning methods for cyber security intrusion detection.IEEE Communications Surveys Tutorials,18(2), pp.1153-1176. Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Zhou, L., 2015. Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model.Journal of Information Security,6(1), p.24. Hahn, A., Ashok, A., Sridhar, S. and Govindarasu, M., 2013. Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid.IEEE Transactions on Smart Grid,4(2), pp.847-855. Herrera, A.V., Ron, M. and Rabado, C., 2017, June. National cyber-security policies oriented to BYOD (bring your own device): Systematic review. InInformation Systems and Technologies (CISTI), 2017 12th Iberian Conference on(pp. 1-4). IEEE. Inan, F.A., Namin, A.S., Pogrund, R.L. and Jones, K.S., 2016. Internet use and cybersecurity concerns of individuals with visual impairments.Journal of Educational Technology Society,19(1), p.28. Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security.computers security,38, pp.97-102. Wang, W. and Lu, Z., 2013. Cyber security in the Smart Grid: Survey and challenges.Computer Networks,57(5), pp.1344-1371.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.