Preview

Cyber Security In Business Organizations SU200173813

Better Essays
Open Document
Open Document
1226 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Security In Business Organizations SU200173813
Cyber Security in Business Organizations Dattatreya Shodhan SU200173813 Strayer University CIS500 Dr. Darcel Ford 05/16/15

Abstract
Cyber Security is a need for all the business organizations these days, it is an important business continuity planning issue which should be taken seriously by all the organizations. As not focusing on cyber security can lead an organization’s confidential data at risk and also get misused by the hackers. Therefore, an organization should focus on its infrastructure and management equally, to protect from facing more challenges and cyber-attacks.
Fundamental Challenges that organization face in general in regard to protecting organizational assets and information

Protecting Organizational assets and information has become a top priority for almost all organizations these days, the reason being the confidential data getting stolen and misused which leads to an organization’s great loss.
As cyber security is a global challenge today, the one of the most current challenges to protect organizational assets and information is the management network, this is a serious issue in all the organizations where they face this challenge. Managing a network has many theoretical and practical challenges which should be considered and focused on, as it can be more complex to manage a network, which leads to poor infrastructure leaving loopholes for hackers to get inside the network of an organization and steal confidential information.
The other challenge which the organization’s face in protecting its information is the lack of management, which is the lack of taking liable actions on time. Even if the organization has a good infrastructure which protects them from intruders, but if they fail to take actions



References: Brown, T. (2013). The Importance Of Cyber Security Within Your Organization. Retrieved from Disaster Resource: http://www.disaster-resource.com/index.php?option=com_content&view=article&id=1717:the-importance-of-cyber-security-within-your-organization Riley, M., Elgin, B., Lawrence, D., & Matlack, C. (2014, March 13). Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It. Retrieved from Bloomberg Business: http://www.bloomberg.com/bw/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data#p1 Spalević, Ž. (2014). CYBER SECURITY AS A GLOBAL CHALLENGE TODAY. Singidunum Journal of Applied Sciences, 687-692. Turban, E. (2013). Information Technology for Management: Advancing Sustainable, Profitable Business Growth, 9th Edition. John Wiley & Sons, Inc.

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    This company needs to look at for the future, for data loss prevention to be effective, the company must decide on the right strategy, employ the right people, target the right data and purchase the right technology. With these accommodations this should reduce the likelihood and cost of future data, breaches and or violating compliance, rules and laws and or regulations. This will also allow the company to have control over how and what data is being exported and what employees or students are online and how this data is used throughout this company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Security is a business issue because companies have very valuable information assets to protect. Business must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so may open the firm to costly litigation for data exposure or theft. Systems often hold confidential information about customers information( social security, date of birth, credit card information, taxes), corporate operations, new product development plans, marketing strategies. These information assets have tremendous value for the companies and can be devastating if they are lost, destroyed, disturbed or placed in wrong hands.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In this assignment I will be explaining the issues and constraints in relation to the use of business information in Asda. I will be outlining the operational issues within the company.…

    • 1048 Words
    • 5 Pages
    Good Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Organizations must ensure the security and control of systems and transactions with clients and vendors. What security breaches may cause harm to an organization or its clients? Why is it important to ensure a proper level of security? What tools are available to prevent breaches?…

    • 369 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Incident Response Plan

    • 930 Words
    • 4 Pages

    In the age of rapidly evolving technology, it is important for all businesses, large or small, to have an incident response plan (IRP) set in place in the event of a cyber-attack. The idea of an IRP is based on preparing for and responding to unforeseen, negative events that may affect a business or organization. Today, it is more of a question of when these cyber-attacks will occur rather than if they will occur. The IRP incorporates many fundamentals to help in these instances, such as, prevention, preparation, planning, incident management, recovery, mitigation, remediation, post incident analysis, and lessons learned. It is recommended that XYZ Retail Company implement the following guidelines to best prepare for a cyber-attack.…

    • 930 Words
    • 4 Pages
    Better Essays
  • Better Essays

    For any business, the need to protect its assets is just as important as the need to maintain or increase its bottom line. If a business does not, will not, or can not enact a sufficient security plan that is the equal to or greater than its needs, it may find itself rapidly losing its assets, its monies, or completely out of business. In addition to a robust security policy, there must also be robust standards put into place to clearly define the roles the employees, as well as the management, must play in order to properly enact those roles.…

    • 1124 Words
    • 5 Pages
    Better Essays