Verified Document

Benefits Of Using Cybersecurity Term Paper

Benefits of Using Cyber-attack Simulator Systems There is evidence that demonstrates that using simulations is far much better than the education that is provided by real-world experiences. Simulations have been used in numerous industries to teach and test people, and their usage in cybersecurity could be beneficial. Simulating a cyber-attack is easier than having to test the attack in the real world. Having a simulation of the potential cyber-attacks, one can easily test the system to establish how effective the security strategies implemented are and if there are any vulnerabilities in the system. Also, attacking your own system in order to test it for vulnerabilities is foolish and might result in prison time as has been the case for some individuals. Therefore, the easiest and safe way for testing the system is by using a simulation. Simulation allows for the demonstration of what might happen if an organization does not take cybersecurity seriously (Kuhl, Kistner, Costantini, & Sudit, 2007). By using simulation, one can be able to simulate an attack on the organization's systems to the top management and this would demonstrate to them how ineffective the security systems used within the organization are. Attacking the systems in a simulation and not telling the top management that it is a simulation would ensure that they would experience the defects of not having proper cybersecurity in place. This way the IT department can get the buy-in and support from the top management in regards to cybersecurity. The third benefit is that there is ease of scalability when using a simulator system. This means that the person running the simulator can expand and contract the resource pool in order to accommodate heavier or lighter loads as per user requirements without having to incur huge costs. Since this would be a simulation, it is easier to incorporate events that had not been earlier foreseen into the simulation as it is running and it would not have any adverse effects. This would also allow for the testing of the system as the simulation is going on and new inputs can be provided.

Greater Insight on The Potential of Cyber-attacks

The public sector has greater insight on the potential of cyber-attacks. This is based on the fact that the public sector has been pushing for the implementation of various security measures by the public sector especially the military. The private...

Therefore, whenever there is a cyber-attack within the private sector, it is mostly covered up in order to protect the interests of the shareholders. The public sector, on the other hand, is better placed to understand the potential of cyber-attacks and is already implementing strategies to protect against such attacks (Kundur, Feng, Liu, Zourntos, & Butler-Purry, 2010). The Pentagon has noted the effects that a cyber-attack would have on its systems and has made attempts to have its agencies not rely on Microsoft software because they have deemed it less secure and prone to attacks. A case in point is when the Windows NT system that was administering the computers used on the U.S.S. Yorktown crashed. This could have spelled doom for the military had this happened during a critical mission. Understanding the impact that a cyber-attack would have on a country, the public sector has made attempts to implement legislation the requires private sector companies to take cybersecurity seriously. However, this has been fought by most companies and they prefer to maintain the status quo. The public sector is not motivated by profits, which makes it easy for the sector to support and implement cybersecurity programs. The public sector is also looked upon to ensure that the nation is secure and this requires that they keep abreast of the latest happenings around the globe in regards to cybersecurity. In doing this they can uncover numerous attempts and insights than the private sector.
Best Practices when Developing a Cybersecurity Strategy

The four best practices that should be implemented when developing a cybersecurity strategy are the detection of insider threats, backing up of data, educating and training users, and updating software and systems. Detection of insider threats entails monitoring user activity to ensure that there is no unauthorized activity or behavior. User accounts should also be monitored in order to verify user actions are not violating the security policy (Bailey, Minto-Coy, & Thakur, 2017). In most instances, insider threats will mostly go undetected, and they are extremely costly because the user can gain access to sensitive data that can cost the organization. The IT function that would be charged with…

Sources used in this document:

References

Bailey, A., Minto-Coy, I., & Thakur, D. (2017). IT Governance in E-Government Implementations in the Caribbean: Key Characteristics and Mechanisms Information Technology Governance in Public Organizations (pp. 201-227): Springer.

Carr, M. (2016). Public–private partnerships in national cyber?security strategies. International Affairs, 92(1), 43-62.

Hogan, M., & Newton, E. (2015). Report on Strategic US Government Engagement in International Standardization to Achieve US Objectives for Cybersecurity.

Kuhl, M. E., Kistner, J., Costantini, K., & Sudit, M. (2007). Cyber attack modeling and simulation for network security analysis. Paper presented at the Proceedings of the 39th Conference on Winter Simulation: 40 years! The best is yet to come.

Kundur, D., Feng, X., Liu, S., Zourntos, T., & Butler-Purry, K. L. (2010). Towards a framework for cyber attack impact analysis of the electric smart grid. Paper presented at the Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on.

 


Cite this Document:
Copy Bibliography Citation

Related Documents

Cybersecurity As an Organizational Strategy an Ethical and Legal...
Words: 3101 Length: 10 Document Type: Research Paper

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Cyber Security Cloud Computing
Words: 1389 Length: 4 Document Type: Term Paper

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

Benefits President Obama's Cybersecurity Internet Policy
Words: 678 Length: 2 Document Type: Essay

President Obama's Cybersecurity and Internet Policy In the recent past, cyber attacks have become commonplace in the U.S. And also in other parts of the world. The said attacks are also increasingly becoming sophisticated. In that regard, there exists an urgent need to rein in this problem before it gets out of hand. In this text, I discuss the benefits of President Obama's Cybersecurity and Internet Policy. President Obama's Cybersecurity and

Cybersecurity In Healthcare
Words: 1641 Length: 6 Document Type: Essay

Safeguarding Health Information: The Importance of Cybersecurity in Healthcare Introduction In today's digital age, the healthcare industry faces unprecedented challenges in ensuring the security and confidentiality of patient information. With the increasing reliance on electronic health records (EHRs) and interconnected medical devices, the need for robust cybersecurity measures in healthcare has never been more critical. Cybersecurity in healthcare refers to the practice of protecting electronic health information from unauthorized access, use, disclosure, disruption,

Benefits of Strategic Outsourcing
Words: 367 Length: 1 Document Type: Essay

Strategic OutsourcingStrategic outsourcing is a business practice where a company contracts out some of its non-core functions to third-party service providers to improve efficiency, reduce costs, and focus on core competencies. This practice can play a significant role in a company\\\'s business model when implemented correctly, as it brings several benefits.First, strategic outsourcing can save companies money on operational expenses such as salaries, benefits, and other costs. Third-party service providers

Benefits of Artificial Intelligence Within the Business Environment...
Words: 662 Length: 2 Document Type: Term Paper

Considering the advancement in technologies, in your opinion how can we offset the negatives being established through the use of Artificial intelligence as entrepreneurs?The use of artificial intelligence to offset the negatives of technology can only help temporarily. Here artificial intelligence can be used to help proactively engage in many of the more negative elements of technology. Security is one issue that continues to plague society. For one, theft and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now