StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Effect of Decision Making in Cybersecurity - Essay Example

Cite this document
Summary
The paper "Effect of Decision Making in Cybersecurity" describes that decisions adopted in any organization have a huge impact. In the case of cybersecurity, the decision taken about the system and software to be used in the organization determines how secure or vulnerable it becomes. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful

Extract of sample "Effect of Decision Making in Cybersecurity"

Effect of Decision Making in Cybersecurity

Cybersecurity is a practice adopted to defend computers, mobile devices, electronic systems, data, and networks from malicious attacks. In modern times, the level of technology advancement has called for continuous security improvement to ensure significant information is protected from malicious attacks. As technology evolves, hackers continue to improve their skills as a malicious attack continues to be reported in different areas across the globe. The attackers rely on any vulnerability that exists in a network to breach the adopted security measures. It is important to highlight security measures are critical on grounds organization, and people experience huge losses when personal information is stolen or privacy breached by hackers. The decision adopted by stakeholders at any given time about cybersecurity has a significant impact in the long run because they determine the measures they might take or those leading the IT department. With the risk surrounding network and data breach by hackers, some of the vital decisions need to be taken to by those in leadership/ management. A wrong decision risks an entire organization or institute considering, with digitization storage is done electronically. In the past, several organizations have incurred losses out of lawsuits from different parties affected when personal data is lost. The significance of critical measures on cybersecurity can be evidenced by the seriousness the governments put on these issues. There exist Acts that are aimed to guide every party on their responsibilities in an attempt to protect vital information from hackers. Thus, stakeholders' decision on issues related to cybersecurity needs to put several factors into perspective to avoid creating a vulnerability that can be used by malicious attackers. With these factors put into perspective, it remains essential to explore the effect of human decision making in cybersecurity.

Some of the areas that experienced most breaches include medical services, retailers, and public entities in 2019. A report by Risk Based Security indicated about 7.9 billion files were accessed maliciously in 2019, and the figure was almost 112% increase compared to 2018. Cybercriminals are attracted to some sectors than others due to the data they are likely to get. For instance, financial and medical data appeals to them more than others, but all businesses or institutions using customer data, customer attacks, and corporate espionage. Thus, decision making determines the impacts of these business experiences in the long run by lowering the level of cyber threat or heightening vulnerabilities that can be exploited by cybercriminals. The decision-makers are expected to reflect on areas that need strengthening to ensure evolvement in cybercrime does not manage to access their network or data. These decisions involve determining the system the organization needs to use and software to protect itself from cyber threats. The right decision guarantees the organization a secure system that cannot be accessed maliciously, and it requires a competent workforce that understands the dynamics in the IT industry. The human factor influences the strategy adopted by an organization in an attempt to provide the perfect cybersecurity. Understanding the evolution of cybercrime enables the adoption of the best approach to counter malicious attacks. It is the people's role to understand their responsibility in dealing with cyber-security in a specific organization. There exist companies across the globe that has never suffered a cyber-attack, and it all rests on the decision adopted and implemented by a human.

The leadership of an organization has the mandate to make a decision that focuses on ensuring cybersecurity. The leadership goes ahead to outsource an IT department that takes care of all the issues involving data. It is about using a competent workforce that can assist the organization in delivering without cyber threats. For a company like Target, it lost a huge amount of money as the victim went to court for compensation. The human factor played a critical role in this case on the ground; some people shared vital information that heightened the system's vulnerability by giving cybercriminal an upper hand. Some of the vital information accessed to enable malicious attacks in a company like Sony included passwords, and thus, it takes smart people to make poor choices. People need to understand the risks they can expose an institution through irresponsible behaviors concerning the systems.

The non-IT personnel in an organization have become the weakest link that cybercriminals are targeting in realizing their goals. For instance, there are cases in which an employee with local administrator rights disabled security solutions on their computers, allowing the infection to spread to the entire corporate network. Currently, businesses believe they are at risk from within due to staff vulnerability to a cybercriminal, either intentionally, carelessness, or lack of knowledge on IT subjecting the organization at high risk to a cyber threat. The decision made by uninformed or irresponsible employees increases the vulnerability of an organization in cyber threats. Human factors and employee behavior are among the top three fears in business on issues of cyber threat. A human error at the moment can cost an organization millions of money and its reputation due to cybercrime. The employee can share inappropriate details or data through mobile devices, physical loss, or mobile and inappropriate use of IT resources by an employee. These actions expose an organization to cybercriminals as they focus on available opportunities to exploit the systems. Phishing is the leading strategy used by cybercriminals to exploit the human errors made by the uniformed employees to maliciously access the system of an organization. In this consideration, the decision of an employee in modern times where digitization is available everywhere can have a huge impact in the future on issues related to cybersecurity.

The effect of decision making in cybersecurity also revolve around the products or the vendor an organization might opt to use. The vender needs to continuously update its software to cope with ever-evolving cyber threats in modern times. Failure for the responsible individuals to make or ask for updates exposes the system to cybercrime by increasing vulnerability. On matters related to cybersecurity, a frequent system update is critical to ensure the cybercriminals do not move ahead and develop the capability to intrude. In most cases, human factor comes into play resulting in forgetfulness, ignoring the basics, or avoiding to incur a cost by purchasing the up-to-date software or system. Giving out passwords to outsiders can also affect the organization's security by other people having access to the system.

The issue of errors triggered by cybercriminals' ploys has subjected the employees and other stakeholders to make the wrong decision that exposes an organization's security. Cybercriminals look at the access of a weak link such as those with low levels of IT knowledge. Psychological manipulation is heavily relied upon by cybercriminals to persuade the users of the targeted system to make an error that would give access. For instance, phishing techniques use emails where clicking a link allows an intruder to access vital information such as passwords, downloading of malware such as ransomware or financial authorization. Thus, human factors have subjected organizations to continuously lose critical information and, to some extent, finances. In some instances, an organization has to pay a substantial amount of money to hackers to regain control.

On a positive aspect, when an organization has set clear boundaries for information sharing, the people are in a position to detect any threat coming from an outsider or attacker. Decision made by leadership to invest in the workforce on issues related to cybersecurity ensures the organization is secure and can overcome any attack. Investments directed on training assist the workforce in becoming responsible and understanding what is at stake when it comes to system and data loss. When a workforce is cognizant about the risks some decision poses to the organization, they are likely to cross-examine their activities, specifically those that involve systems. Human factors in an organization top the vulnerability risks attacker might use to access the system. With the organization understanding employees are the weak link used by hackers, some of the decision taken reduces the risks. For instance, training employees to improve their knowledge of IT and the precautions that need to be adopted makes it hard for an intruder to exploit employees.

Decisions of having the best systems and software strengthen the cybersecurity and lower the chances of intruders. This factor has led to the adoption of the best systems that are hard to hack or access. It is about having software that can detect an intruder and notify the user for appropriate decisions or actions without compromising the organization's security. The decision to recruit a competent workforce in the IT department influence the organization milestone on the ground; the security is rarely compromised. In some instances, management decisions about an organization focus on reaching the set goals in line with the vision. Putting these factors into perspective, an organization gauges the best strategies that guarantee the cybersecurity and cost-effectiveness. In some instances, setting up a team within the organization tends to be costly compared to outsourcing a third party. These decisions might affect the organization if the contracted third party fails to take the critical measures needed to guarantee the system's safety. The third-party has subjected some organization to losses by failing to use the top software, enabling hackers to access the systems. In this consideration, a decision that is taken by the management needs to reflect and cross-examine all the alternatives and end up with the best for the organization.

Conclusion

Decisions adopted in any organization have a huge impact, either positive or negative. In the case of cybersecurity, the decision taken about the system and software to be used in the organization determines how secure or vulnerable it becomes. The human factor plays a critical role in the cybersecurity of an organization with errors exposing or increasing the vulnerability. These human factors that expose the organization can be reduced by enlightening the employees about the importance of examining their decisions before acting on cybersecurity issues. The employee needs to understand the risk they may pose to the organization by involving a third party on cybersecurity issues.

Read More
The decision-makers are expected to reflect on areas that need strengthening to ensure evolvement in cybercrime does not manage to access their network or data. These decisions involve determining the system the organization needs to use and software to protect itself from cyber threats. The right decision guarantees the organization a secure system that cannot be accessed maliciously, and it requires a competent workforce that understands the dynamics in the IT industry. The human factor influences the strategy adopted by an organization in an attempt to provide the perfect cybersecurity. Understanding the evolution of cybercrime enables the adoption of the best approach to counter malicious attacks. It is the people's role to understand their responsibility in dealing with cyber-security in a specific organization. There exist companies across the globe that has never suffered a cyber-attack, and it all rests on the decision adopted and implemented by a human.

The leadership of an organization has the mandate to make a decision that focuses on ensuring cybersecurity. The leadership goes ahead to outsource an IT department that takes care of all the issues involving data. It is about using a competent workforce that can assist the organization in delivering without cyber threats. For a company like Target, it lost a huge amount of money as the victim went to court for compensation. The human factor played a critical role in this case on the ground; some people shared vital information that heightened the system's vulnerability by giving cybercriminal an upper hand. Some of the vital information accessed to enable malicious attacks in a company like Sony included passwords, and thus, it takes smart people to make poor choices. People need to understand the risks they can expose an institution through irresponsible behaviors concerning the systems.

The non-IT personnel in an organization have become the weakest link that cybercriminals are targeting in realizing their goals. For instance, there are cases in which an employee with local administrator rights disabled security solutions on their computers, allowing the infection to spread to the entire corporate network. Currently, businesses believe they are at risk from within due to staff vulnerability to a cybercriminal, either intentionally, carelessness, or lack of knowledge on IT subjecting the organization at high risk to a cyber threat. The decision made by uninformed or irresponsible employees increases the vulnerability of an organization in cyber threats. Human factors and employee behavior are among the top three fears in business on issues of cyber threat. A human error at the moment can cost an organization millions of money and its reputation due to cybercrime. The employee can share inappropriate details or data through mobile devices, physical loss, or mobile and inappropriate use of IT resources by an employee. These actions expose an organization to cybercriminals as they focus on available opportunities to exploit the systems. Phishing is the leading strategy used by cybercriminals to exploit the human errors made by the uniformed employees to maliciously access the system of an organization. In this consideration, the decision of an employee in modern times where digitization is available everywhere can have a huge impact in the future on issues related to cybersecurity.

The effect of decision making in cybersecurity also revolve around the products or the vendor an organization might opt to use. The vender needs to continuously update its software to cope with ever-evolving cyber threats in modern times. Failure for the responsible individuals to make or ask for updates exposes the system to cybercrime by increasing vulnerability. On matters related to cybersecurity, a frequent system update is critical to ensure the cybercriminals do not move ahead and develop the capability to intrude. In most cases, human factor comes into play resulting in forgetfulness, ignoring the basics, or avoiding to incur a cost by purchasing the up-to-date software or system. Read More

Cite this document
  • APA
  • MLA
  • CHICAGO
(Effect of Decision Making in Cybersecurity Essay Example | Topics and Well Written Essays - 1500 words, n.d.)
Effect of Decision Making in Cybersecurity Essay Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/2096109-effect-of-decision-making-in-cybersecurity
(Effect of Decision Making in Cybersecurity Essay Example | Topics and Well Written Essays - 1500 Words)
Effect of Decision Making in Cybersecurity Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/2096109-effect-of-decision-making-in-cybersecurity.
“Effect of Decision Making in Cybersecurity Essay Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/2096109-effect-of-decision-making-in-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Effect of Decision Making in Cybersecurity

Cybercrime: Law Enforcement and E-Government Transnational Issues

Government intervention in cybersecurity Sociopolitical based arguments for or against government involvement Given the increased global reliance on communication and information technologies along with the associated threats accruing from the reliance, the internet creates new opportunities for e-government's public sector to better serve the public and improve efficiency.... This research paper discusses cybersecurity laws, regulations, and legal concepts applicable to managerial decision making concerning industry, transnational crime, and government....
7 Pages (1750 words) Research Paper

Information Systems Security Survey

RS has delegated the responsibility of the development and maintenance of an information security system to cybersecurity.... The main responsibility of cybersecurity is to identify and monitor any cybersecurity threats and putting up strategies to combat any breach of security affecting IRS.... cybersecurity's main duty is to prevent any incidents of insecurity with IRS's information security system.... This shows technological advancement in making the whole system online and also gives a platform for the IRS to provide new services for some of the customer needs that emerge....
3 Pages (750 words) Essay

Geographic Information System

GIS technologies permit a user to proficiently analyze, produce and manage geospatial, to pool GEOINT with other methods of intelligence gathering and to achieve extremely… Consequently, GIS produces contemporary and more dependable GEOINT to minimize doubt for a decision maker (Buxbaum, p.... Because GIS programs are Web-based, an end-user can regularly work with a decision maker to unravel There are numerous brands of GIS software employed in GEOINT and cyber security, namely; Google Earth, ERDAS IMAGINE, GeoNetwork open source and Esri ArcGIS....
5 Pages (1250 words) Essay

Hacking in the US

This paper, Hacking in the US, stresses that the advancement in the technology and its widespread use has caused certain serious problems to many countries of the world, especially to technically advanced countries such as the United States.... nbsp;… This discussion outlines this cyber attacks through electronic devices have threatened the many political parties and have emerged as a headache for them....
14 Pages (3500 words) Research Paper

Improvement of Cybersecurity

This coursework "Improvement of cybersecurity" describes how can government justify telling the private industry how to set up or improve cybersecurity.... Indeed, it is also being believed that cybersecurity is difficult to accomplish as cyber-attacks regularly overthrow the cyber defense system.... The study aims to discuss the intervention of the government for improving the cybersecurity.... The objective of the study is to recognize the methods through which the government intervenes to enhance cybersecurity....
8 Pages (2000 words) Coursework

Law Enforcement and E-Government Transnational Issues

The author of the "Cybercrime: Law Enforcement and E-Government Transnational Issues" paper discuss cybersecurity laws, regulations, and legal concepts applicable to managerial decision making concerning the industry, transnational crime, and government.... nbsp;… Sensitive government information leaked from the WikiLeaks cables, an illustration of cybersecurity issues.... Issues that continue to challenge and thus calling for the United States' government cybersecurity intervention include the growing integration of mobile devices technology into perilous information infrastructure....
7 Pages (1750 words) Coursework

Public Sector Cybersecurity Issues

The coursework "Public Sector cybersecurity Issues" describes the main aspects of cybersecurity.... This paper analyzes the effects of cybersecurity regulations on the American food industry and the public sector, goals of lawmakers in the public sector.... Established cybersecurity regulations have, however, affected the delivery of services in both sectors.... This paper will discuss private sector-public sector cybersecurity issues with a focus on the American food industry....
6 Pages (1500 words) Coursework

Role of Security Automation Systems in Oil and Gas Industry

At the highest level of maturity in cybersecurity, oil and gas organizations implement more optimized and strategic security programs as described by the table below.... This review ''Role of Security Automation Systems in Oil and Gas Industry'' discusses the key role of such security automation systems in securing data in the oil and gas industry....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us