{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]
  1. QUESTION

     

     

    Cybersecurity Policy Design Issues

    Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication
    What features can be added to a business cybersecurity policy to help protect it against effects from possible upstream, Multi-Sector, cascade failures due to poor cybersecurity policy management in upstream organizations?

     

 

Subject Law and governance Pages 2 Style APA

Answer

Cybersecurity Policy Design Issues

 In the recent past,  cyber threats have risen dramatically. The Defense Science   Board has documented several breached systems with the Edward Snowden/National Security Agency scandal, perhaps serving as the best example (Schooner & Berteau, 2014). This paper elaborates on policy features needed to protect against the insider threat, access control, and the policy’s features to protect against effects from possible upstream.

When it comes to cybersecurity, most attention goes to internet-based attacks; however, insiders can be of more or equal threat and can do the most damage. Insiders have a more intimate knowledge of the practices, network layouts, staff, and even loopholes in the system. To address this, plug information leaks by screening channels that can be used to flow out sensitive information such as emails, instant messaging, printed copies, or even conversations between mates. With the use of technology such as neural networks and a security policy, this can be achieved (Yuan et al., 2018). To protect against operations security, access to network devices should be restricted using AAA authentication. A “need-to-know” basis should be a rule of thumb regarding sharing and accessing information (Zhang, 2020).  Moreover, employees should only have minimum access to conduct their activities under the principle of least privileged.

Access control guarantees that the users are whom they say they are and have the required access to the company data. For an enterprise seeking to secure its access controls, access controls should not be static and should change based on the risk. Threats should be identified in real-time and access controls automated accordingly (Martin, 2019). Biometric authentication and biometric data can be kept safe by keeping the software and firmware up to date. This will reduce the vulnerabilities of your system.

Upstream and multi-sector poor cybersecurity management policies cascade down to downstream businesses. To avert this, features such as insurance and hardware maintenance plans can be employed (Ursillo & Arnold, 2021). With adequate insurance, damaged infrastructure, and investigation, rebuild and restore costs can be covered in an upstream or multi-sector attack. Periodically maintained hardware such as servers, backups, and switches can be quickly and easily rectified if a cyberattack may lead to failure.

In summary, with today’s world being computerized, new risks emerge every hour. Cyber risk is therefore becoming a focus of governments and organizations globally. New features that offer reliable protection should be included in all organizations’ cybersecurity policies to stay up to date.for generalizing the study’s findings.  

References

Martin, J. A. (2019). What is access control? A key component of data security. CSO Online. https://www.csoonline.com/article/3251714/what-is-access-control-a-key-component-of-data-security.html.

Yuan, F., Cao, Y., Shang, Y., Liu, Y., Tan, J., & Fang, B. (2018, June). Insider threat detection with deep neural network. In International Conference on Computational Science (pp. 43-54). Springer, Cham.

Zhang, E. (2020). What is operational security? The five-step process, best practices, and more. https://digitalguardian.com/blog/what-operational-security-five-step-process-best-practices-and-more.

Schooner, S. L., & Berteau, D. (2014). Emerging policy and practice issues.

Ursillo, S., & Arnold, C. (2021, February 1). Cybersecurity Is Critical for all Organizations – Large and Small. IFAC. https://www.ifac.org/knowledge-gateway/preparing-future-ready-professionals/discussion/cybersecurity-critical-all-organizations-large-and-small.

 

 

Related Samples

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?