Case Study: The Critical Need for Information Security

Paper Type:  Case study
Pages:  6
Wordcount:  1434 Words
Date:  2022-09-07

Introduction

Using cyber-attack simulator systems and research have several benefits that accompany that uses the technology can enjoy. The company can enjoy these benefits if it decides and makes a persistent use of the same in carrying out its internet information services. The technology is used in offering cyber security that the companies or any organization that uses the technology will enjoy. Cyber simulation refers to the production of systems of behavior by use of the computer. It involves the simulation of the mathematical models that are associated with the system in question (Allen & Tildesley 2017). The logarithmic simulation of the statistical data can be done through the system. This technology is most appropriate in doing the data analysis in an organization. The simulation approach is a pattern that is used on the war games by both the commercial and government organizations of the world. It seeks to put to task the top managers to come up with solutions to situations in the organization which they feel cannot be changed. They are pushed to the rise to come out of the comfort zones (Allen & Tildesley 2017).

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

The technology is gaining traction in the global market. The technology was inspired by a government minister whose personal email was hacked after having failed to support the initiation of the cy8ber security. The attitude changed entirely after having the cyber-attack impacting his own life in a significant way. It is clear therefore that the application can maintain the confidentiality of the information of an organization if the organization uses the app. The documents of the organization will, therefore, be safe from being accessed by the unauthorized individuals who hack the websites for their undefined reasons (Liu et, al. 2016). The cyber-attack as well will give support to the top management since they are always the most targeted by the bloggers who aim at getting to the network of the organization through the manager's accounts. The application is very vital to the business organizations who do not know their legal and regulatory obligations.

The business organizations can be guided well on how to regulate the deals they get involved in and to keep their secrets and have their weaknesses concealed from the public. Simulation can be used to give a highlight an illustration of all the security issues and to have the managers come out to make inquiries about their organizations or to provide responses to the raised concerns about the organization which concern their cyber defense (Allen & Tildesley 2017). The simulation will help the managers to identify the potential of their organizations and the critical data assets that the organization has and how to keep it safer. Simulation is essential in defining what the top managers are expected to do in the events of the cyber-attack and how to be able to maintain control and to give the delegation to the organization. It also helps the managers to know how and when to ask the right questions.

The private sector otherwise has greater insight into the potential of cyber-attacks and are susceptible to the impacts. This is because the attacks are aimed at the individual accounts which can be used to get into the corporate accounts. The exercise as well has prevailed the opportunity to change from 100% IT security that is spent on technological advancement to about 70%on the prevention, 30% on the recovery and response and 10% on the detection. For instance, the managers' private mobile phone would be infected in a scenario of simulation, for example, having a lead to the breach of the corporate network to the techniques of the mirror attack that are used in the real world. Another vivid example is an attack in which the attackers poisoned the website of the local golfing which was aimed at infecting given golf-loving executives to prevent their mobile device from accessing the merger and acquisition data (Liu et, al. 2016). Again, the scenario where the account of the manager of the organization is highly targeted by the hacker instead of the other staff is an example to ascertain that the private have a significant insight in the cyber-attacks since the attackers are sure to use the account of the manager to manipulate his website. Simulation exercise, therefore, should be in a position to identify and to focus on the type of decision of the top manager made on to make the cyber-attack, for example, to contact the media and what to say in the media is called.

Some practices should be implemented in the process of developing a cyber-security strategy within a security enterprise. These practices should be taken into consideration since the technology is moving so fast and hence it is vital to keep to the point. The coming of the internet of things which is applied in the military is growing so fast. The following should be looked into keenly, therefore;

Building foundation- the security capabilities should be approached from the perspective of the device level, bottom up rather than the centrally-controlled top-down view. This owes to the fact that the security capabilities have not changed so drastically since the traditional controls such as the firewalls, two-factor authentication (2FA) and the intrusion prevention system (IPS) are still relevant.

The context- in the development it should be noted that background is king since it helps the company to understand what a device is and whether it can be trusted and how it would interact with the internet. Moreover, the invention gives a higher ability to interrogate and establish the context. The control also helps in developing the paths of access and has the device more trusted (Liu et, al. 2016).

The play of offence and defense-this involve challenging the organization by protective testing or the blue team exercise. There should be a creation of a continuous feedback process between the teams required to verify the assumptions and make a priority or closure of the discovered avenue of attack. There should be such practices such as the threat modeling and penetration on the test by the red light team that will help in pinpointing the unaddressed and residual attack vectors and also assist in putting efforts on the remedy (Liu et, al. 2016).

Check on the validity of the security- the cyber-security is developed for a given attack threat that should be diagnosed and have the development set to cater for all kinds of the risks that might come in the course of time. Since technology is growing so fast, there should be coverage of all possible ways of attackers.

In developing the cyber-security, it is essential to do planning before commencing the real process of development of the application. The plan will help the developer to know the set well all the procedures without forgetting any step (Martin et, al. 2016). The developer will be able also to know what is needed for the whole exercise and ensure all are availed without fail. Planning will also allow for a proper time allocation for every activity to be undertaken during the entire process. The need for planning will help in doing adequate research to grasp all the available information to ensure the areas already worked on are improved and much effort put on the other areas. Using the documentaries in the information resources will help in giving the information needed by the developer. In the same way, coming together to work as a team will also assist in ensuring the effective implementation and transition.

Public-private partnerships can strengthen cyber security efforts and effectiveness in:

  • Corporate environment- through having the public use the private who is the primary target of the attackers to have the information on how the trend is flowing in the market. It will help in the deliberation of the information required to promote the public trust on the application.
  • Regional level-this will help the dwellers of a given region who share the same impacts to come out corporately seek the solution for the same challenge (Martin et, al. 2016).
  • National level- the government will be able to get down to the local people to have the actual impact created by the development of the application and be able to evaluate if it is appropriate for implementation.

References

Allen, M. P., & Tildesley, D. J. (2017). Computer simulation of liquids. Oxford university press.

Liu, S., Wei, G., Song, Y., & Liu, Y. (2016). Extended Kalman filtering for stochastic nonlinear systems with randomly occurring cyber attacks. Neurocomputing, 207, 708-716.

Martin, A., Nuqui, R., Hong, J., Kondabathini, A., Rees, W., & Ishchenko, D. (2016, October). Collaborative Defense of Transmission and Distribution Protection and Control of Devices against Cyber Attacks (CoDef). In Western Protection Relay Conference.

Cite this page

Case Study: The Critical Need for Information Security. (2022, Sep 07). Retrieved from https://midtermguru.com/essays/case-study-the-critical-need-for-information-security

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience!

24/7 online support

NO plagiarism