StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Major Threats in Cybersecurity - Coursework Example

Cite this document
Summary
The paper "Major Threats in Cybersecurity" focuses on the critical analysis of the major threats in cybersecurity. Companies globally continue to record increasing incidences of cyber attacks with the recent years recording remarkable increases in both the rate and sophistication…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Major Threats in Cybersecurity
Read Text Preview

Extract of sample "Major Threats in Cybersecurity"

According to Setton and Girod (2008), most organizations choose to handle their malicious insider attacks privately without seeking recourse in courts or public opinion courts. The editors give the example of the California Law of Data Breach Notification which requires that whenever someone’s personal information gets compromised, organizations have to notify individuals. Such laws limit the distinction between outsider attacks and insider threats. Therefore, organizations need to distinguish between private action employed when detecting an insider threat and public action which includes criminal prosecution. Publicizing such action creates awareness among the employees of the seriousness of these crimes. Training employees adequately on security and dividing critical functions among them limits fraud or sabotage committed solely (Cappelli, Moore, Shimeall, & Trzeciak, 2006). In this separation of duties, the principle of least privilege ensures that one would be authorized for resources needed only.

Modern organizations strive to retain the best performers to sustain their competitiveness. But even so, business administrators look at ways of motivating their workforce without necessarily using any additional money. Cohan (2012) estimates less than 2% of total payrolls, equivalent to $ 38 billion as employee incentives in the US. Companies give low-value but meaningful gifts to their employees like t-shirts and mugs. Social rewards where workers’ rewards come in terms of verbal recognition and non-monetary points have been successfully used in companies like Achievers. Fisher also cites the provision of better training as another appropriate incentive (2005).

The controversies regarding incentives make this issue complex for there to be a valid universal conclusion on what to use. Muller (2010) cites various researchers who propose money as a key incentive because it enables the satisfaction of employee needs. While this opinion could be popular, researchers concur that the resultant motivation would only be short-term (Cohan 2012). But from my experience, giving better training to top performers would be the most appropriate incentive. The findings of Fisher (2005) suggest that most staff value the acquisition of new skills and support a need that if met would boost staff motivation. In as much as all staff need new skills, top performers could be given more elaborate training which would impart greater capabilities that would enable them to take up greater responsibilities in an organization. Since responsibility comes with proportionate employee compensation, most of the other incentives fall in place simultaneously. This form of incentive propagates the sustainability of the other accompanying incentives which when solely given would not be sustainable in the long run.

Auditing entails a comparison of evidence gathered to criteria set out for conformity (Pinero, 2012). Syracuse University Audit and Management Advisory Services (2012) provides five common types of audits in organizations. The operational audit aims at understanding the businesses of the organization and then evaluating the effectiveness of its internal control environment. Organizations also undertake compliance as a type of auditing aimed at evaluating how effectively the governing rules and regulations have been followed. In case of misappropriation of assets, investigative auditing would be conducted to unearth any possible frauds. The fourth type of audit referred to as information technology audit aims at examining the availability, integrity, and confidentiality of information in the information technology infrastructure. Finally, financial audit stands out as the most common of all audit types which aims at finding an expression of opinion on the data published in the organization’s financial statements.

Of all these four types, information technology audits could be considered useful as all other audits are pegged on the accuracy and reliability of the information retrieved from the system. For example, with correct storage of information and appropriate formulae in the database, the computation of various financial statements would be accurate leading to a positive financial and investigative audit. Operational and compliance audits also largely depend on the reliability of information technology.

With modern business operations heavily relying on the availability, reliability, and integrity of information systems, integrating auditing with technology would be important in data mining and computation. Lehmann (2012) gives an example of the IDEA software that not only assists in data mining but also in detecting fraud. According to Pinero (2012), audit components could be defined commonly in all types of audits. The author gives an example of ISO 14010 which was defined for Environmental Management System audits but became generic and applicable to other audit variations. Hence, there could be audit standards, not specific to a particular industry but all-inclusive. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Coursework Example | Topics and Well Written Essays - 750 words - 1”, n.d.)
Cybersecurity Coursework Example | Topics and Well Written Essays - 750 words - 1. Retrieved from https://studentshare.org/information-technology/1458050-cybersecurity
(Cybersecurity Coursework Example | Topics and Well Written Essays - 750 Words - 1)
Cybersecurity Coursework Example | Topics and Well Written Essays - 750 Words - 1. https://studentshare.org/information-technology/1458050-cybersecurity.
“Cybersecurity Coursework Example | Topics and Well Written Essays - 750 Words - 1”, n.d. https://studentshare.org/information-technology/1458050-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Major Threats in Cybersecurity

Considerations in Cybersecurity

cybersecurity 1.... The United States government has established a number of compliance measures aimed at preventing or reducing cyber-attacks ("cybersecurity assurance program," 2012).... In this way, Adagia Telecom had relatively lax cybersecurity measures in place.... Indeed, the Republican and Democratic parties have already established conflicting approaches to cybersecurity in their current Presidential platforms.... Bharra (2012) interviewed four major organizations and discovered that they were not even aware which branch of the Federal Bureau of Investigation (FBI) that should inform in case of a cyber-attack....
3 Pages (750 words) Coursework

Cyber Attacks on America

Therefore, America is increasingly vulnerable to cyber-attacks which grow by breadth and complexity, indicating the need for the country to continuously adapt and re-engineer its protection approaches that would uphold its cybersecurity.... The country faces increased risk from insider threats, terrorists, criminal groups, hackers, and virus and worm writers.... Citing the examples of recent attacks on HSBC, the New York Stock Exchange and major commercial banks such as Citi Bank and Bank of America, PricewaterhouseCoopers, PWC (2013) appreciates cyber-attacks as a serious problem in America that needs critical intervention....
10 Pages (2500 words) Literature review

The Suitability of Cybercrime Laws to Meet New Realities of the Internet

The cybersecurity Act of 2009 - S.... According to section 2 of this law, titled findings, the failure of the USA to protect its cyberspace is one of the urgent national security problems that are facing the country (cybersecurity n.... The measures are aimed at making US cyberspace more secure and protected against cyber security threats.... One such major recommendation that has been provided by the law is that the president of the USA has the mandate to declare a "cyber-emergency" (Kaplan n....
4 Pages (1000 words) Essay

Information Systems Security Survey

RS has delegated the responsibility of the development and maintenance of an information security system to cybersecurity.... The main responsibility of cybersecurity is to identify and monitor any cybersecurity threats and putting up strategies to combat any breach of security affecting IRS.... cybersecurity's main duty is to prevent any incidents of insecurity with IRS's information security system.... The Internal Revenue Service (IRS) operates under four major operating divisions in ten service centers and three computer centers around the country....
3 Pages (750 words) Essay

The US Department of Homeland Security

Apart from this, the research paper laid utmost focus on revealing the fact that the Department of Homeland Security must prioritize cybersecurity for ensuring the integrity of different nations, civilian, and government networks as per the desired level.... The research paper also deals with assessing the roles played by the Department of Homeland Security in the domain of cybersecurity.... In recent times, more usage of computers and social media has certainly gauged cyber threats, which can be reduced by the correction of the technical systems as well as improving the structure of cyber security....
9 Pages (2250 words) Research Paper

Cybersecurity Issues - the Silent Attack on Organizations and Consumers

The measures mostly focused on possible threats in areas considered high-risk targets for terrorists.... The paper "cybersecurity Issues - the Silent Attack on Organizations and Consumers" describes that cybersecurity measures will result in preventive mechanisms as well as engaging in real-time intelligence as well as threat assessments to capture pre-emerging threats.... As a result of a variety of security risks, cybersecurity tries to ensure the attainment as well as maintenance of overall security properties for both the organization and the users....
10 Pages (2500 words) Essay

How Serious Are Cyber-Security Threats

Broadhurst et al (2014), as well as Abomhara (2015) and other sources, state there is a broad range of reasons why governments engage in cybersecurity intrusion.... As brought forth in the prior segment, there are varied reasons why governments engage in cybersecurity activities.... This paper will delve into varied facets of cybersecurity and threats to bring forth the impact of this area concerning governmental and non-governmental areas, how these affect government relations internationally, varied cybersecurity breaches and analytical evaluation of breaches and their repercussions....
9 Pages (2250 words) Coursework

Maritime Cybersecurity Issue

The paper "Maritime cybersecurity Issue" highlights that professional engineering organizations collaborate with the maritime industry to come up with an awareness program.... cybersecurity awareness ought to be built into training programs for all the sailors and shore-based personnel.... Potential consequences of cybersecurity incidents include but are not limited to loss of life, economic and environmental damage, supply chain disruption, and potentially vessel destruction....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us