Cybersecurity Policy Design Issues
Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication
What features can be added to a business cybersecurity policy to help protect it against effects from possible upstream, Multi-Sector, cascade failures due to poor cybersecurity policy management in upstream organizations?
Answer
In the recent past, cyber threats have risen dramatically. The Defense Science Board has documented several breached systems with the Edward Snowden/National Security Agency scandal, perhaps serving as the best example (Schooner & Berteau, 2014). This paper elaborates on policy features needed to protect against the insider threat, access control, and the policy’s features to protect against effects from possible upstream.
When it comes to cybersecurity, most attention goes to internet-based attacks; however, insiders can be of more or equal threat and can do the most damage. Insiders have a more intimate knowledge of the practices, network layouts, staff, and even loopholes in the system. To address this, plug information leaks by screening channels that can be used to flow out sensitive information such as emails, instant messaging, printed copies, or even conversations between mates. With the use of technology such as neural networks and a security policy, this can be achieved (Yuan et al., 2018). To protect against operations security, access to network devices should be restricted using AAA authentication. A “need-to-know” basis should be a rule of thumb regarding sharing and accessing information (Zhang, 2020). Moreover, employees should only have minimum access to conduct their activities under the principle of least privileged.
Access control guarantees that the users are whom they say they are and have the required access to the company data. For an enterprise seeking to secure its access controls, access controls should not be static and should change based on the risk. Threats should be identified in real-time and access controls automated accordingly (Martin, 2019). Biometric authentication and biometric data can be kept safe by keeping the software and firmware up to date. This will reduce the vulnerabilities of your system.
Upstream and multi-sector poor cybersecurity management policies cascade down to downstream businesses. To avert this, features such as insurance and hardware maintenance plans can be employed (Ursillo & Arnold, 2021). With adequate insurance, damaged infrastructure, and investigation, rebuild and restore costs can be covered in an upstream or multi-sector attack. Periodically maintained hardware such as servers, backups, and switches can be quickly and easily rectified if a cyberattack may lead to failure.
In summary, with today’s world being computerized, new risks emerge every hour. Cyber risk is therefore becoming a focus of governments and organizations globally. New features that offer reliable protection should be included in all organizations’ cybersecurity policies to stay up to date.
References
Martin, J. A. (2019). What is access control? A key component of data security. CSO Online. https://www.csoonline.com/article/3251714/what-is-access-control-a-key-component-of-data-security.html. Yuan, F., Cao, Y., Shang, Y., Liu, Y., Tan, J., & Fang, B. (2018, June). Insider threat detection with deep neural network. In International Conference on Computational Science (pp. 43-54). Springer, Cham. Zhang, E. (2020). What is operational security? The five-step process, best practices, and more. https://digitalguardian.com/blog/what-operational-security-five-step-process-best-practices-and-more. Schooner, S. L., & Berteau, D. (2014). Emerging policy and practice issues. Ursillo, S., & Arnold, C. (2021, February 1). Cybersecurity Is Critical for all Organizations – |
Related Samples
The Role of Essay Writing Services in Online Education: A Comprehensive Analysis
Introduction The...
Write Like a Pro: Effective Strategies for Top-Notch Explication Essays
Introduction "A poem...
How to Conquer Your Exams: Effective Study Strategies for All Learners
Introduction Imagine...
Overcoming Writer’s Block: Strategies to Get Your Essays Flowing
Introduction The...
Optimizing Your Online Learning Experience: Tips and Tricks for Success
The world of education...