Cyber security or computer security can be defined as the proper protection of various computer systems from being damaged or theft to the respective software, hardware or any form of electronic data (Von Solms & Van Niekerk, 2013). Moreover, this type of security is also effective to disruption as well as misdirection of services, they are providing. This cyber security even involves perfect control of physical access to the system hardware and also securing from harm that could be done through access of network, injection of code and malicious data. Due to the malpractices by various operators, irrespective of the fact that it is accidental or intentional, the personnel of IT security could be tricked from deviation of the secure processes (Wang & Lu, 2013). The wireless networks like Wireless Fidelity and Bluetooth are utilized for the means of cyber security.
The following report outlines a brief discussion on the cyber security and being the analyst of cyber security in the new organization or Skyward Company. This is mainly because to prepare a proper briefing for the executive management. The CIO or chief information officer contains of the understanding of IT or information technology. Relevant details will be provided in this report.
Cyber security is the perfect security of the Internet connected systems that comprise of the software, hardware or data from any type of cyber attack (Hahn et al., 2013). The security consists of physical security and cyber security for protecting against the unauthorized access to the data centres or the other computerized systems. This type of security is for maintaining the integrity, availability and confidentiality of data. The cyber security analyst comprises of various important and significant responsibilities. The first and the foremost responsibility of a security analyst is to plan, implement as well as upgrade the security measures or controls (Amin et al., 2013). Moreover, various plans or protocols are also established for the protection of information systems and digital files from the destruction, unauthorized access and modification of data. The data is maintained and monitored from the security access. The vulnerability testing is performed properly. The other important responsibilities of a cyber security analyst mainly include conducting internal and external security audits, analysis of security breaches, managing network, prevention systems and intrusion detection. The major cause of security breach is detected by analysis. The corporate security policies are properly defined maintained and implemented by the cyber security analyst (Elmaghraby & Losavio, 2014). Appropriate tools or counter measures are installed and recommended by cyber security analyst.
Vision
To build a secure and resilient cyberspace for Skyward Co.
Mission
To protect information as well as information infrastructure in the cyber space, to respond or prevent from cyber threats or attacks and to reduce or diminish vulnerabilities or minimize damage from the cyber incidents in Skyward Co.
Objectives
iii) To create an assurance framework for design of security policies and for promotion and enabling actions for compliance to global security standards and best practices by way of conformity assessment in Skyward Co (Buczak & Guven, 2016).
Strategies
iii) Encouraging Open Standards: The next important and significant strategy for the organization of Skyward Co is the encouragement of the open standards. The interoperability is well facilitated and the exchange of data within several products and services (McGraw, 2013). The enhancement of the certified information technology services or products on the basis of the open standards should be done properly.
Skyward Co has an extremely strong impact of cyber security policy. This type of policy would be extremely effective for them. The various recommendations for the organization of Skyward Co are given below:
iii) The network should be completely wireless for saving money or time.
Conclusion
Therefore, from the above discussion, it can be concluded that cyber security can be easily defined to the set of tools or techniques that are utilized for the protection of integrity of networks, data or programs from unauthorized access, damage or attack. The fast growth of market is significantly fuelled by the array of various trends of technology that includes several security requirements. The major requirements of cyber security are IoT or internet of things and BYOD or bring your own device. The fast adoption of the cloud based applications or workloads that extend security needs or requirements beyond data centre and mandates of data protection like NIST or National Institute of Security Technology Cyber Security Framework and General Data Protection Regulation. The most significant functionality of the cyber security majorly includes protection of systems or information from the several cyber threats and cyber risks. All of these cyber risks could be taking various forms like malware ransom ware, application attacks, phishing and many more. The cyber adversaries comprise of the role for launching automated as well as sophisticated attacks by utilizing all the tactics at extremely lower costs. Some of the most common forms of cyber threats are cyber terrorism, cyber warfare and cyber espionage. The above report has clearly outlined a cyber security policy for the organization of Skyward Company. Significant details are provided within the report.
References
Amin, S., Litrico, X., Sastry, S., & Bayen, A. M. (2013). Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 21(5), 1963-1970.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701-715.
Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105-122.
Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-497.
Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions on Smart Grid, 4(2), 847-855.
McGraw, G. (2013). Cyber war is inevitable (unless we build security in). Journal of Strategic Studies, 36(1), 109-119.
Sommestad, T., Ekstedt, M., & Holm, H. (2013). The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures. IEEE Systems Journal, 7(3), 363-373.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344-1371.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), 74-77.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download