CP5603 Advanced E-Security
Sep 23,21CP5603 Advanced E-Security
Question:
Write A Report on the Feasibility Behind the Need of Mitigating the Cyber-Attacks
Answer:
Introduction
A cyber-attack is a calculated attempt by internal or external threats or attackers to undermine the availability, integrity, and confidentiality of a target organization’s or individual’s information systems. Cyber-attackers employ unlawful techniques, approaches, and tools to cause disruptions and damage to devices, computers, networks, apps, and databases, as well as gain unauthorized access to them (Kali, 2020). In this regard, this paper will describe the feasibility behind the need of mitigating cyber-attacks with the help of some examples. This paper also describes the strategies to prevent cyber-attack.
Analysis of Current Situation in Market
Businesses are increasingly dealing with cyber security concerns on a daily basis. Recent trends, the impacts of a worldwide pandemic, and statistics related to cyber security show a significant increase in data hacked and compromised data from sources that are suitable and more ubiquitous in the workplace, such as IoT and mobile devices. COVID-19 has also increased the number of remote workers, increasing the risk of cyber assaults (Inside Out Security, 2021).
Furthermore, according to recent security studies, most businesses have unsecured data and weak cybersecurity procedures, leaving them vulnerable to data loss. Due to this reason, companies must make cybersecurity knowledge, security, and prevention-based practices a part of the existing culture of the organization for effectively combating bad intent. From a report, it can be stated that this will demonstrate the importance of cybersecurity in all aspects of the company (Inside Out Security, 2021). It includes hacking statistics, Data breaches, different forms of cybercrime, statistics related to different industries, expenditures, and costs.
Need for Mitigating Cyber Attack
Cyber-attacks are growing nowadays because of only the bad intension of others who wants to get mileage from the theft of the stored information, data. In this context, there is a need to prevent the organization from cyber-attack to ensure the release of important information related to the customer, business performance, or banking information to third parties in the market (Geers, 2011). Otherwise, the cyber-attack can not only affect the wealth of the company but also the entire system of the IT technology which will breach the trust of the stakeholders on the business operations (Johnson, 2015).
Process for Mitigating Cyber Threats
For mitigating the threats from the cyber-attack, it can be stated that prevention is an important and effective approach to stop the possibilities of the cyber-attack. The organization can remove a wide range of possible attack routes by continually monitoring vulnerabilities, unauthorized access, and suspicious behavior (Shakarian, Shakarian, and Ruef, 2013). End-user education can also help the organization to mitigate the cyber threat as it helps in making awareness among the related people about malware propagation and phishing scams. More awareness about the cyber-attack may reduce the possibilities of a frequent attack on the cyber system. Companies can use penetration testing to find flaws in their networks, systems and online applications.
Professionals of internal security may explore their IT systems for unpatched software, authentication failures, configuration problems, and more by putting themselves in the shoes of hostile actors (Taylor, 2021). Companies may improve their IT posture by combining automated threat detection technologies alongside manual procedures. Platforms for asset management can assist businesses in tracking of the performance of the IT device and activity (Shakarian, Shakarian, and Ruef, 2013). Network security technologies may monitor web traffic in real time at the same time. These technologies will give quick notifications for the cybersecurity team when anomalies are identified, decreasing response times for an incident.
Feasibility of Need for Mitigating Cyber Threats
The need for preventing the cyber-attack is feasible for the companies in the order business era due to few reasons that are explained below:
No Need for Availability of IT Team: The threat of Cyber-attack is faced by only such organizations that are dependent on the use of IT systems to run their business process. In this context, it can be stated that the strategy related to the prevention of the cyber-attack can be easily implemented in the organization as it will no need to hire a new IT team or make a new investment on the technology purchases to prevent the organization from the breach of IT systems’ security (Lynn and Thorbecke, 2021). On the other hand, the prevention from cyber-attack does not need the new investment for hiring the new It team or software to put new security system. As a result of this discussion, it can be stated that the feasibility of the need from the prevention of cyber-attacks.
Awareness of System Users: The prevention from the cyber-attack will need the secured IT system accessed. This can be easily done by the organization by providing training to employees related to the handling of the IT system. Under this process, the use of passwords would be the best option for preventing cyber-attacks. This is an easy task for every organization which uses an IT system for strong data and securing the information from illegal unauthorized attack (Synopsys, Inc., 2021). Further, the organization can easily restrict the unauthorized access of the IT system by allowing only a few people for accessing the system. This system would not need the extra cost. From this discussion, it can be stated that the feasibility of the awareness of the users of the system towards the prevention from the cyber threat.
Benefits in form of Success: The failure to secure the IT system from the cyber-attack results in the form of financial loss, reduction in customer trust, possibilities of litigations against the company, etc. On the other hand, the prevention strategy against the cyber-attack may help the company to replace the possibilities of any result of the IT system’s failure on the organization. Hence, the prevention method would be feasible for IT companies because of its benefits to them to earn more than the expectations (Synopsys, Inc., 2021). With the help prevention strategy from Cyberattack, the organization would secure their important information from the misuse that would not allow the competitors to get competitive advantages against a company.
Conclusion
As per the above discussion, it can be stated that the need for preventing the cyber-attack is feasible for each IT organization because of its no-cost feature that would give more return in the comparison of the investment. Further, this paper described the need for the prevention from cyber-attack to ensure the long-term growth of the organization.
References
Day, P. (2014). Cyber Attack. Carlton Books.
Geers, K. (2011). Strategic Cyber Security. Kenneth Geers.
Inside Out Security. (2021). 134 Cybersecurity Statistics and Trends for 2021. Retrieved from https://www.varonis.com/blog/cybersecurity-statistics/
Johnson, T. (2015). Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare. CRC Press.
Kali, K. (2020). Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk Management, Social Engineering, and Information Security. Growise Limited.
Lynn, S. and Thorbecke, C. (2021). Why ransomware cyberattacks are on the rise. Retrieved from https://abcnews.go.com/Technology/ransomware-cyberattacks-rise/story?id=77832650
Shakarian, P., Shakarian, J. and Ruef, A. (2013). Introduction to Cyber-Warfare: A Multidisciplinary Approach. Newnes.
Sood, A. and Enbody, R. (2014). Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware. Syngress.
Synopsys, Inc. (2021). Cyber Security. Retrieved from https://www.synopsys.com/glossary/what-is-cyber-security.html
Taylor, H. (2021). What Are Cyber Threats and What to Do About Them. Retrieved from https://preyproject.com/blog/en/what-are-cyber-threats-how-they-affect-you-what-to-do-about-them/