Discuss About The Strategy Towards Data Breaches Cyber Security.
In this modern era we all are together linked with the internet banking services as well as other government infrastructure due to which the entire framework of network protection is getting more and more rigid since there are some issues related to the cyber security encryption and data breaching that we all are facing in day today’s life. Now this is no longer an option to keep our network as well as data secured as well as protected from the cyber-attacks that are taking place around the world.
The security issue has become the international concerned in this mode and is said to be a deliberate exploitation of the various computerized systems and the other network dependent enterprises. There are several issues which are becoming more and more frequent due to the cyber-attacks which are taking place who actually hacks the secured data and information from even the most protected systems (Quattrone,1998)
The aim is to develop an organization’s strategy towards data breaches and cyber security, taking the case study of Pune in the context of Cyber security management and development of the strategies for handling the risks and data breaching actions.
Every organisation of a firm requires the framework of a risk management in order to protect the most secure data and secure the companies specifications to not to reveal or expose to the outside world. Since every organisation needs to protect the most Secure data so there has to be some regulations is as well as bye laws in order to assess the risk management and assess the timely activities and intrusions present inside this company or organisation .( Nielsen et al, 2000)The major area which is suffering this problem is the IT sector which confronts the major security problems thereby making the most Secure data prone to get attacked by the cyber hackers and reduces the security actions of the or organization. . (Fowler, 2002)
The justification of the project lies in the building of the view as well as modernised effective cyber security strategy in order to prevent editor breathing problems and make the data more secure as well as protected.
The project was originally covers the damages that are caused by the cyber hackers and what are the cyber security questions which will in portrait the actual problems that are prevailing in context of data breaching. .( Nielsen et al, 2000.The potential outputs and outcomes of your research
The companies and the organisations are facing the risk and compliance with the financial revenue system which is losing day by day and the prevalence of the financial report questions are being addressed in the most frequent studies and researches
The computation of Tools and techniques in order to remove the risk of data bridging and cyber-attacks are followed as under-
Policy making and legal framework
Today government is trying to make the companies and organisations more secured and protected by legalisation and framework of the byelaws acting as the backbone to quantify the cyber risks.
This particular sector can basically promote the data security action. There are several methods which are computed inside it support sector in order to quantify the major vulnerable areas for the security reach and help the organizations in every facet.( Rose, 2001)
To restrict the free access
Now this has become major important action so as to restrict the free access of any user or the hacker which can strengthen the security issues and their the specifications which are related to the granting of permissions that can take several periods of time and can become the major driver of the intake of the user appropriated permissions specifications.
The management an arrangement of the data pertaining to the prophet security risk should be such a way that it should be selective in nature so as to mitigate the data medication that data types problems and the inclusion of the it support will help to monitor as well as encrypt the major hacktivism. (Quattrone, 1998)
The preparation of the data loss plan and course of action
The preparation of the data loss plan helps in enabling the organisation to consistently work for the disaster recovery Framework as well as provide a course of action which can act in the emergency as well as Limited situations where the person on the organisation would face the risk of data security problems.
The spreading of education among the employees
In order to keep the data more secured and prevent it from the database in practices that has to be the building of education among the employees who are working in an organisation keeping the network and other modes of authentic sites and service secured as well as protected from the security risk and other technical problems. .( Rose, 2001)
The simplest strategy is that the it support team is including as per the technical resources availability is to back-up the original data which is being controlled as well as access time to time and to regularly monitor as well as execute the network activity proposals for the ongoing education strategic framework programs. .( Nielsen et al, 2000)
This plan formulates the Tools and techniques pertaining to the IT sector and the modern has technological innovations that can help in the disaster recovery solutions and make the strategies independent in compliance with the professional.
No access to the unauthorised programs and transmission of the Malware and data theft codes
The network security features and the compliance of the media in the privacy program of the maintenance of the data and saving it from reaching practices.
Prevention of the ignorance of the compliance obligations
the act of prevention of the network security problems and other details strategy priorities can help in the secured data accessibility and usability. (Fowler, 2002)
Conceptual framework:
An analysis of the literature relevant to the research topic that will give you the conceptual basis for conducting this research. (Virine, 2016)
The following concept and methodology is computed below-
The high level of organisations are trying to communicate with each other data security authorities so as to make the concern for the security of the data collection methodology and Tools and techniques for the referencing of the backup of data.
Data sources and the methods/tools to analyse the data
The methods and tools which are responsible for the data collection are as follows-
The primary data can be collected by doing survey and arrange the interviews as well as personal observation questionnaires. The telephone discussions an email server can also be the sources compiled Antara the primary data collection which has certain advantages and disadvantages while serving a city or an organisation. The cybersecurity data collection pertains to the intuition of the server which is related to the cyber-crime which is prevailing inside the organisation or any external environment pertaining to the increase of the awareness level. (Virine, 2016
The collection of secondary data is made by the compilation of the information collected from the other researches which are already done. The various authentic journals and reputed magazines are consulted along with the internet websites in order to collect the secondary data from the various artist sources and libraries.
The statistical tools for the analysis of the data collected and data analysis for cyber security management
The various tools which are compiled under the primary data collection as well as compilation of the secondary data includes the analysis made by the use of SPSS software accord and also the Microsoft Excel. For the time budgeting the cyber security management system is consulted so as to make the research more concentrated towards the time period educated for the period of few weeks. The Gantt chart is also made in order to schedule the programs and the sequencing of the activities. .( Nielsen et al, 2000)
The project budget is prepared according to the timely completion of the activities which are-
The separate phasing of the budget is prepared in order to have the proper scheduling of the programs and the incremental funding and phasing of the actions predetermined in the cyber security management. (Quattrone, 1998)
The foolwing activities order is compiled so as to draw the outcomes from the data collected.
Source – Dr. Kumbhar Manisha, 2014.
The project scheduling is given as under-
Gantt chart showing the monitoring of the completion of the activities(Quattrone, 1998).
Month wise distribution of the activities
Source – Dr. Kumbhar Manisha, 2014.
The order of the processes and actions undertaken-
Conclusion
Most of the people who are using internet and other modernize technologies are ignorant of the fact that these websites and internet of things are laying a very harmful impact and tend to hack the personal accounts and reach to the most secured systems thereby hacking all protected data. We can see that there is a greater need for the cyber security in the today’s world due to increased dependence on the IT sector. We need to inform the people about the preventive measures as well as the risk that are rising from the cyber security hacktivism and the other data breaching malpractices. The spread of awareness make the systems more secured by making every individual aware and alert after installation of the perfect infrastructure related to the internet of things.
References
Dr. Kumbhar Manish published (2014), her thesis on A Critical Study of Implication Of e-governance Services for Effective Communication with Special Reference to Citizens in Pune City.
Arlow, J., and I. Neustadt.( 2003). Enterprise Patterns and MDA: Building Better Software
with Archetype Patterns and UML. New York: Addison-Wesley Professional.
Booch, G., J. Rumbaugh, and I. Jacobson.( 2005). The Unified Modeling Language User
Guide. 2nd edition. New York: Addison-Wesley Professional.
Cho, J. G., and B. J. Yum. 1(964). An Uncertainty Importance Measure of Activities in PERT
Networks. International Journal of Production Research 12: 460–470.
Clemen, R. T. 1(996). Making Hard Decisions. 2nd edition. Pacific Grove, CA: Brooks/Cole
Publishing.
Flyvbjerg, B., (2006). From Nobel Prize to Project Management: Getting Risks Right. Project
Management Journal .
Fowler, M. (2002). Patterns of Enterprise Application Architecture. New York: Addison-
Wesley Professional.
Goldratt, E. (1997). Critical Chain. Great Barrington, MA: North River Press.
Goodpasture, J. (2004). Quantitative Methods in Project Management. Boca Raton, FL: J.
Ross Publishing.
Hill, G. W. (1982). Group versus Individual Performance: Are N + 1 Heads Better than One?
Psychological BulletIN.
Hillson, D. 2(002). Use a Risk Breakdown Structure (RBS) to Understand Your Risks. In
Proceedings of the Project Management Institute Annual Seminars & Symposium,
October 3–10,(2002), San Antonio, TX.
Hulett, D. T.( 1996). Schedule Risk Analysis Simplified. PM Network .
Hulett, D. T. (2000) Project Schedule Risk Analysis: Monte Carlo Simulation or PERT?”PM
Network (February).
Hulett, D.T., and D. Hillson. (2006). Branching Out: Decision Trees Offer a Realistic
Approach to Risk Analysis. PM Network (May): 36–40.
Kendrick, T. (2003). Identifying and Managing Project Risk: Essential Tools for Failure-
Proofing Your Project. New York: AMACOM.
MacCrimmon, K. R., and C. A. Ryavec. (1962). An Analytical Study of the PERT
Assumptions. Research Memorandum RM-3408-PR. RAND Corporation, Santa
Monica, CA.
Manoukian, E. B. (2006). Quantum Theory: A Wide Spectrum. New York: Springer.
Martin, R. C. 2002. Agile Software Development: Principles, Patterns, and Practices. New
York: Prentice Hall.
Nielsen, M. A., and I. L. Chuang. (2000). Quantum Computation and Quantum Information.
Cambridge: Cambridge University PressProject Management Institute. 2013. A Guide
to the Project Management Body of Knowledge (PMBOK® Guide). 5th edition.
Newtown Square, PA: Project Management Institute.
Quattrone, G. A., C. P. Lawrence, D. L. Warren, K. Souze-Silva, S. E. Finkel, and D. E.
Andrus. (1984). Explorations in Anchoring: The Effects of Prior Range, Anchor
Extremity, and Suggestive Hints. Unpublished manuscript. Stanford University,
Stanford, CA.
Rose, P. (2001). Risk Analysis and Management of Petroleum Exploration Ventures. AAPG
Methods in Exploration Series 12. Tulsa, OK: American Association of Petroleum
Geologists.
Scheinin, W., and R. Hefner. 2(005). A Comprehensive Survey of Risk Sources and
Categories. In Proceedings of Space Systems Engineering and Risk Management
Symposiums, Los Angeles
Schuyler, J. (2001). Risk and Decision Analysis in Projects. 2nd edition. Newton Square, PA:
Project Management Institute.
Shankar, R. (1994.) Principles of Quantum Mechanics. 2nd edition. New York: Springer.
Srinivasan, M., W. Best, and S. Chandrasekaran. 2007. Warner Robins Air Logistics Center
Streamlines Aircraft Repair and Overhaul. Interfaces.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download