Cybersecurity Profile - Essay Example

Comments (0) Cite this document
Summary
The paper "Cybersecurity Profile" describes as stated in NIST's "Special Publication No. 800-53 Rev 4" Guidelines for Assessing Security Monitoring in Federal Information Systems and Organizations, "every public organization must establish a SSP to create effective safety assessment plans…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Cybersecurity Profile
Read TextPreview

Extract of sample "Cybersecurity Profile"

Download file to see previous pages In conclusion, it is important to note that security controls and profiles will vary with information systems in different organizations. In this case, the security controls inherent in the Agency are crucial controls that are aimed at maintaining the privacy and confidentiality of the data and information. To achieve a complete and sound security profile, the management, operational and technical controls must be implemented to complement each other for effective results. Planning control lays a foundation for other management controls, this can be done through security policy and procedures and security plan. Basic operational controls such as security awareness and training are crucial in any organization. Through security awareness and training policy and procedures and user awareness, security can be achieved. Finally, the technical controls offer a final remedy for security concerns in the organization. Basically, the identification and authentication control is one of the effective technical controls. By user identification and authentication and device identification and authentication controls, the agency can address the issue of unauthorized access. The identification and authentication procedures and guidelines in the agency require that each device is identified and authenticated before a connection is established. Confidentiality and security can easily be breached through intruding devices. The agency has a device identification and authentication procedure in place that is guided by the IRM of IRS. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Profile Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Cybersecurity Profile Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1690862-cybersecurity-profile
(Cybersecurity Profile Essay Example | Topics and Well Written Essays - 1250 Words)
Cybersecurity Profile Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1690862-cybersecurity-profile.
“Cybersecurity Profile Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1690862-cybersecurity-profile.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cybersecurity Profile

Cybersecurity

...?CYBER-SECURITY Cyber-Security Affiliation Table of Contents Question No 3 Question No. 3 7 References 12 Question No Choose2 Symmetric Encryption Algorithms to compare and contrast. Discuss what they are, how they work, their advantages/disadvantages, and how/why it was created (did it have a problem or purpose it solved). For comparing two symmetric algorithms I have chosen Stream Ciphers and Block Ciphers Encryption Algorithms. Stream Ciphers is a symmetric encryption algorithm that encrypts the bits of data and information. Additionally, this type of encryption is performed on one bit at a time (or occasionally 1 byte at a time) of data at some particular time. In addition, the method of stream cipher is much quicker... Cyber-Security...
5 Pages(1250 words)Essay

Cybersecurity

...?Cybersecurity There are a number of considerations when comparing and contrasting the impact of cybercrime on businesses against traditional crime. The most obvious differentiating factor is the nature of the criminal activity, as in the case of cybercrime the criminals are able to generally evade a physical presence in the environment. Another prominent difference between traditional crime and cybercrime are the business industry’s knowledge and perspective on these issues. Bharra (2012) interviewed four major organizations and discovered that they were not even aware which branch of the Federal Bureau of Investigation (FBI) that should inform in case of a cyber-attack. There is the further consideration that while many...
3 Pages(750 words)Coursework

Cybersecurity

...from the Internet, internal networks, and/or other public systems as well as private systems (Schaeffer, Chan, Chan, & Ogulnick, 2009). Mobile computing can be defined as a notion which relates to displaying, collecting along with transferring data from a mobile based device to any information system by utilizing a particular or a combination of varied data transfer methods. Portability is regarded as a key facet of mobile computing (International Association of Medical Science Educators, n.d.). This paper intends to provide a discussion about mobile computing. The discussion comprises recognizing the significant cybersecurity vulnerabilities and related threats associated with mobile computing for the users. The other...
8 Pages(2000 words)Coursework

Cybersecurity

...? Cyber security Table of Contents Table of Contents 2 Introduction 3 Brief of the Organizations and their Mission 3 Comparison and Contrast of Privacy Policies of Apple Inc., IBM and Microsoft 5 Possible Changes To The Policies For Customer Protection 8 Possible Changes to the Policies to Give More Flexibility to Use Personal Information of Customers 9 References 12 Introduction Privacy policy is fundamentally viewed to be a legal statement or a document that manages and handles precious information of a client or a customer. The privacy policies are often used in various sectors with the intention of safeguarding different valuable information or data of the clients. This particular aspect i.e. privacy policy is much crucial... Cyber...
7 Pages(1750 words)Coursework

Cybersecurity

...? CrypTool Labs 2 (School) This particular report will include the responses to the questions regarding the first two labs that utilize the CrypTool software. Keywords: CrypTool, analysis, software, cryptography, labs Lab Part 1: Introduction to Cryptography Using CrypTool Q1. Which tool or technique from the above list would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why? The text used for the purpose of this lab is the first few paragraphs of Douglas Adam’s Hitchhiker’s Guide to the Galaxy, along with additional text stating this is where the sample text was pulled from. The N-gram list of Caesar encryption of the document itself would be the most effective... CrypTool Labs 2...
4 Pages(1000 words)Coursework

Cybersecurity

... Question 3 Vulnerability is a fault in a system that an attacker/hacker uses to reduce the security of the information inthe system. Microsoft XP is known to be vulnerable to several threats; some of them include the following: Microsoft windows XP do not allot adequate memory for SMTP control replies hence allowing hackers to be able to read parts of e-mail messages through the use STARTTL commands. This is known as SMTP memory allowance vulnerability. (Vetterling, 2002) Windows XP is vulnerable in HTTP services where an attacker who notices this flaw can win an absolute control of computer system and be able to manipulate the already installed programs and do any other thing to the system with full user rights. Argument... Question 3...
1 Pages(250 words)Coursework

CyberSecurity Profile on the CIA

...CIA Cybersecurity Profile Table of Contents AC SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES 3 RA-2. SECURITY CATEGORIZATION 3 PM-2. SENIOR INFORMATION SECURITY OFFICER 3 PL-2 (2). SYSTEM SECURITY PLAN 4 PS-3. PERSONNEL SCREENING 4 References 4 AC-1. SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES The CIA develops and documents security awareness and training policy and procedures, evident from its intensive focus on security issues tied to emerging IT and communication platforms, including the Internet (Clift, 2007). There is not enough data to assess whether such procedures address roles and responsibilities, scope and purpose, but the assumption from the wealth of evidence suggests...
2 Pages(500 words)Essay

Cybersecurity

...the virus to be emailed to 50 recipients in the user’s address book which created an exponential increase in the virus-infected messages. Erdbrink (2012) reports how countries such as Iran have spent massive resources in controlling and preventing viruses. Anti-virus programs combat these viruses and keep the system and network safe from virus attacks. References Aksoy, P. & DeNardis, L. (2008). Information Technology in Theory. Canada, UK: Thomas Learning Inc. Erdbrink, T. (2012, May 29). Iran confirms attack by virus that collects information. The New York Times. Retrieved 2 October 2012 from www.nytimes.com Ivanova, P. (2006). Cybercrime and cybersecurity. International Journal of Information and Security, 18, 5 –...
1 Pages(250 words)Coursework

Cybersecurity

...Cybersecurity Your Topic 3 - Some mental health and criminal justice professionals contend that hacking is an"addiction," and causes obsessive, risk taking behavior in a manner similar to illegal narcotics - hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policymakers look towards treatment, rather than incarceration, as the disposition of hacker cases? Why or why not? The study conducted by Solmaz, Bell and Saygili (2011) is interesting. At first, after reading the article, there seems to be a dilemma between hacking as a form of addiction, which requires treatment to just simply being a criminal case. But going through further to their findings, it became clearer...
2 Pages(500 words)Coursework

Cybersecurity

...Cyber Security   Cyber Security Question There are three encryption techniques: asymmetric, symmetric, and hashing techniques. Asymmetric cryptography utilizes two keys, a public key and a private key to achieve encryption and decryption. In a symmetric cryptograph, the key employed to decrypt and encrypt information should be secured as anyone who can access it can interpret the coded message. Hashing produces a rare, fixed-length signature for a data set or message (Sinkov, 1966). Hashing encryption may be the most suitable for securing encrypted session in an online credit card shopping (Kahn, 1996). This is because it is distinctive to a message, small changes to a message causes a different has, therefore, warning... Security   Cyber...
2 Pages(500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cybersecurity Profile for FREE!

Contact Us