Week 5 Discussion

[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]

.QUESTION

week 5 discussion    

  1. In a short paragraph or two, "What factor(s) most complicates the process of designing, deciding, and implementing security policy decisions? How might it be overcome?"

 

  1. In 200 words answer How can social media be weaponized and what are the different pathways to influence via social media? What can be done about these threats and influence operations?
[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]

 

Subject Social Media Pages 3 Style APA
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]

Answer

 Week 5 Discussion  

Technology has played a significant role in increasing the efficiency of human life on earth. However, consistent use of this technology has resulted in several cyber security issues that may disrupt or damage a system that entirely depends on. To address such security threats in the system, several policies have been put in place to ensure technology's safe use. Despite the formation of policies to address security issues, some factors have been realized to complicate designing, deciding, and implementing these policies. This paper will high light on complications and provide a way forward to overcome this issue.

Part 1:

Complications in the process of designing, deciding, and implementing security policy decisions. 

The information system security has an objective to safeguard government and private entities' data. However, challenges have been experienced in designing, deciding, and implementing these policies. The first challenge faced is non-compliance with management policies (Zojer, 2020). Taking a review in critical organizations, employees have illustrated non-compliance by forgetfulness, effects to production, and lack of control. Another factor that is faced in cyber policies is insufficient knowledge of the impending cyber-attack. In some organizations, the employees have not been taken through the training session to detect and respond to a system's security issues. Failure to upgrading the system to the latest version is another complication to the implementation of cyber security policies. The system is thus left vulnerable to attacks from potential threats. 

Some organizations have been subjected to cyber security attacks despite having taken critical measures to address potential threats from the environment. An explanation behind this situation is that such organizations tend to rely on a false sense of security that does not address the emotional security issues. When hackers send spyware to such a system, vulnerability is realized, leading to unauthorized users' entry into the system. Another challenge faced in implementing cyber security policies is employees' distrust. If the employees are not included in decision making for a given type of security for the system, they may develop a view that it is too strong to implement it. The outcome is a security breach facilitating the entry of malicious actions.

Part 2:

  1. a) The solution to policy challenges

The first step to providing a solution to cyber policy design is to ensure compliance by all system users. In addition to the existing organizational codes of conduct, adherence to information system security should be ensured using a monitoring system to ensure compliance. The second solution is on awareness creation to all employees to understand threat types and how they can be reports before damage is done. A detailed reporting channel that is understood by all employees will help in addressing this issue.

System upgrade is essential for managing the existing risks that may have extended in the system. Organizations and government institutions should be subjected to a mandatory upgrade by an automated system that shuts down the obsolete system that has turned to be vulnerable to users (Aryee, 2020). The involvement of all stakeholders in decision making is another way of promoting compliance with cyber security policies. When all employees understand the security system, compliance will be adopted as one of the core values.

  1. b) The weaponization of social media.

Social media is gaining relevance as an essential tool for communication, connection, and trade. From such uses, several misuses likely to spark violence have also been realized. The content filter needs to be applied together with a detailed outline of the content to be posted (Suzen, 2020). The key pathways to influence through social media include political manipulation, faster product promotion, and targeted bullying directed to a given group of individuals. Addressing such issues requires the effective use of the system by ensuring that every user is liable for their actions while on such platforms.

  1. c) Remedies to threats and influences

To protect social media uses from unauthorized actions by cyber bullies, application developers need to influence the use of strong passwords that cannot be replicated. Other interventions to curb such bullies include monitoring the mailbox on spam messages, logging out, not saving passwords to several devices, and using a blocking button for suspicious actions.

 

References

 

Aryee, D. (2020). Cybersecurity Threats to the Hotel Industry and Mitigation Strategies (Doctoral dissertation, Utica College).

Süzen, A. A. (2020). A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem. International Journal of Computer Network & Information Security12(1).

Zojer, G. (2020). Moving the Human Being Into the Focus of Cybersecurity. In Digitalisation and Human Security (pp. 353-363). Palgrave Macmillan, Cham.

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]