Discuss about the IT Infrastructure Management for Astra Zeneca Case Study.
Cyber Security, Compliance and Business Continuity
Abstract: The main aim of this paper is to understand the entire concept of cyber security, its compliance and business continuity. Cyber security is the proper protection of various computer systems from any type of damage or theft to the hardware, information and software. It also helps to protect from disruption or misdirection of services. Compliance refers to any type of rules or regulations, or specified standards for any situation or case study. The cyber security compliance is the collection of various services for creating or adapting the security strategy properly. The final part of the paper describes about the effect of cyber security in business continuity.
Index terms: Cyber security, compliance, business continuity, cyber threats, cyber attacks.
Cyber security or computer security is responsible for protecting all types of threats like theft, damage or disruption or services to the software, hardware as well as any type of confidential information (Von Solms & Van Niekerk, 2013). This type of security is extremely important for all types of organizations. Cyber security even includes controlling any kind of physical access to the hardware and thus protecting against the harm that is coming through access of network, data injection or code injection. Moreover, for the malpractices by the operators, this type of security is highly susceptible in being tricked and thus deviation from the secured procedures occurs. The malpractices can either be intentional or accidental (Wang & Lu, 2013). The following paper will be outlining a brief description on cyber security, its compliance and business continuity. The various cyber threats and cyber attacks will be provided here. Furthermore, the compliance of cyber security and the effect of cyber security on business continuity will also be described in the paper.
Cyber threats are the most dangerous threats for any type of system or computer. All organizational systems are vulnerable to these types of threats in their business (Hahn et al., 2013). Cyber attacks are the specific kinds of offensive maneuvers that are employed by various nations, states, society, groups, individuals and organizations, which eventually target the computer information, computer networks, systems, computer devices or computer infrastructures. These types of attacks target the systems by simple means of any type of malicious activity that has originated from unknown sources for the purposes of stealing, destroying and altering the information by hacking (Amin et al., 2013). The most vulnerable types of cyber threats that are extremely popular in cyber world are given below:
Phishing: The third significant cyber threat for any type of computers or systems is phishing. It is the core attempt of hackers for obtaining confidential or sensitive information like passwords, usernames, bank account details, credit card credentials and many more (Wells et al., 2014). These types of information are obtained for malicious causes by simply disguising as one of the most important trustworthy entity within any specific electronic communication. The cyber threat of phishing is eventually carried out either by instant messaging or email spoofing, thus directing the users for entering personal information within a fake web site. The look as well as feel of the web site is completely identical to the legitimate web site and the only difference between them is for the web site URL (Sou, Sandberg & Johansson, 2013). The main victims for this type of cyber threat are the IT administrators, banks, auction sites social web sites and online payment processors.
All the above mentioned attacks could be controlled by various methods of cyber security (Hong, Liu & Govindarasu, 2014). The most important as well as significant methods of cyber security are as follows:
Firewalls: The third method is the firewall. It is the specific system for network security, which monitors as well as manages the incoming or outgoing traffic of network (Amin et al., 2013). The firewall is established by a barrier within the trusted internal network and the untrusted external networks. As the name suggests, firewall detects and prevents the entry of any type of cyber threat.
The various rules or regulations that help to maintain the cyber security are collectively known as compliance (Cherdantseva et al., 2016). The business continuity is the proper planning as well as preparation for ensuring the fact that any organization could easily continue in operating in various incidents or disasters and has the ability in recovering to the operational state within a short period. There are three elements for any business continuity. They are the resilience, recovery and contingency. These three elements are utilized for understanding the exact position of the business (Czosseck, Ottis & Talihärm, 2013). The critical functions of the business as well as the supporting infrastructure are designed in such a method that the redundancy of the data is resolved. Cyber security helps in maintaining the business continuity and hence reducing the typical disasters related to cyber world. All the above mentioned cyber security methods are useful for the business.
Regarding compliance, there are various standards for cyber security that are useful for the business (Gupta, Agrawal & Yamaguchi, 2016). These are various techniques, which attempt in protecting the cyber environment of the users or business. The main objective of these standards or compliances is to diminish the cyber risks or threats, which includes the mitigation or prevention of any cyber threat or attack. These are various published materials, consisting of the security concepts, guidelines, and approaches of risk management, policies, technologies, security safeguards, assurance, actions, trainings and many more (Hong, Liu & Govindarasu, 2014). If any of this compliance is violated by the employees or staffs, legal actions are to be taken against them. Thus, the vulnerability is restricted.
Hence, the business continuity is maintained by the implementation and application of compliance.
Conclusion
Therefore, from the discussion, it can be concluded that cyber security is one of the most important requirements in any computer or system for the purpose of securing it from all types of cyber threats or cyber attacks and also digital disruption or physical access to the hardware or any such equipment. This type of security is the collection of various technologies, processes as well as practices that are designed for protecting the networks, confidential data, information, programs and computer systems from damages, attacks or any type of unauthorized access. Security involves both physical security and cyber security. The most significant elements of this cyber security mainly include information security, network security, application security, disaster recovery, operational security, business continuity planning and end user education. The most dangerous element of the cyber security is the constant evolving nature of the security threats. Cyber security has various rules or compliance and also o the business continuity. The above paper has proper described about the various cyber threats, cyber security, effect on business continuity and cyber security compliance. Significant details are provided in the paper.
References
Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248.
Amin, S., Litrico, X., Sastry, S. S., & Bayen, A. M. (2013). Cyber security of water SCADA systems—Part II: Attack detection using enhanced hydrodynamic models. IEEE Transactions on Control Systems Technology, 21(5), 1679-1693.
Amin, S., Litrico, X., Sastry, S., & Bayen, A. M. (2013). Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 21(5), 1963-1970.
Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, 51-61.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701-715.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. Computers & security, 56, 1-27.
Czosseck, C., Ottis, R., & Talihärm, A. M. (2013). Estonia after the 2007 cyber attacks: Legal, strategic and organisational changes in cyber security. Case Studies in Information Warfare and Security: For Researchers, Teachers and Students, 72.
Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105-122.
Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-497.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global.
Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions on Smart Grid, 4(2), 847-855.
Hong, J., Liu, C. C., & Govindarasu, M. (2014). Integrated anomaly detection for cyber security of the substations. IEEE Transactions on Smart Grid, 5(4), 1643-1653.
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 9, 52-80.
McGraw, G. (2013). Cyber war is inevitable (unless we build security in). Journal of Strategic Studies, 36(1), 109-119.
Sommestad, T., Ekstedt, M., & Holm, H. (2013). The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures. IEEE Systems Journal, 7(3), 363-373.
Sou, K. C., Sandberg, H., & Johansson, K. H. (2013). On the exact solution to a smart grid cyber-security analysis problem. IEEE Transactions on Smart Grid, 4(2), 856-865.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344-1371.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), 74-77.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download