management information systems 45

Reviewed articles on Cyber Security and Risk Management and complete the following activities:—–

1. Summarize all four (4) internet articles in 300 words or more. Please use your own words. No copy-and-paste

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

2. Base on your article review and the assigned reading, discuss the relationship between cyber security and risk management.

3. As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company.

Note:

Read and respond to at least two (2) of your classmates’ posts. In your response to your classmates, consider comparing your articles to those of your classmates. Below are additional suggestions on how to respond to your classmates’ discussions:

· Ask a probing question, substantiated with additional background information, evidence or research.

· Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives.

· Offer and support an alternative perspective using readings from the classroom or from your own research.

· Validate an idea with your own experience and additional research.

· Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.

· Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.

Reply to 1st topic:-

Cyber attacks are on the rise with cybercriminals using various means to facilitate their malicious attacks. In this case, it is important for computer users to safeguards their computers from cybercriminals. Cybersecurity is a concept that that incorporates various processes, controls, and technologies to protect computer systems and its components from cybercriminal (Mallinder & Drabwell, 2013). To Henrie (2013), it is important to safeguards computer systems from unauthorized individuals such as hackers who may steal personal data to commit fraud. To Baybutt, (2003) cybercriminals possess various threats and risks to computer systems. Therefore, it is important to adopt various security measures to ensure that computer files are intact and free from cyber attacks.

Cyber attacks are the risks that manifest in various ways especially through malware that are malicious programs designed to harm other computer files. According to Mallinder & Drabwell (2013), to computer users, it is essential to mitigate such risks by adopting cybersecurity risk management strategies that aim at mitigating the risks associated with cyber attacks. Cyber attacks lead to compromised data, stolen, and even manipulated data. In overcoming such risks, Henrie (2013) recommends various cybersecurity measure such as installing malware programs, updating operating systems, practicing hygienic browsing, and avoiding cracked software. To Menoher (2018), malware comes in different forms such as Trojan horses, computer viruses, worms, ransomware, and spyware. Computer users should avoid these risks by upholding better practices in mitigating cyber attacks.

There is a connection between cybersecurity and risk management. Cybersecurity offers the solution of cyber attacks by recommending the installation of safeguarding computer systems through various processes and technologies. On the other hand, risk management ensures that the risks associated with cyber attacks are managed by applying the principals of cybersecurity.

The information provided by these articles is essential to understanding why it is important to computer systems. More importantly, these articles provide the knowledge of understanding the various security measures that can be in mitigating the risks associated with cyber attacks through risk management.

Reply to topic 2:-

Cyber Security is the process of making sure the confidentiality, availability and integrity of the data or information. It is following certain methods to fight against and to get backup from accidents like power outages and attacks by adversaries. Cyber security is very important to protect from hackers, criminals who can make very serious threats for the organization. Disaster recovery is a very crucial thing for an organization. Security is the top priority for an organization, it is the responsibility to see that all the systems are built to certain security standards and the organization employees are trained properly how to be careful from hackers and unsafe links. A cyber security framework will provide a logical structure for strategy creation and give a sequence of steps that are required to implement the plan and provide target measures in a understandable way against what strategy and key efforts to be assessed

Many companies fail to develop their security strategy. security leaders are initiated to develop utilizing the frameworks to assess and manage their cyber security risks and using these kinds of frameworks are increasing. There is no one easy cybersecurity strategy for all organization companies should shift from reactive efforts to proactive approach to risk management. The frame works may provide cybersecurity process but the services are still requiring minimizing risk the better thing is to employ solutions which specially address needs within your stated framework.

Cyber security and risk management are more likely treated as peers, reporting to the operational risks.IT Risk Management is mainly about decisions, planning and trade-offs which are to be done to mitigate the risks that an IT department may face. These can be in any section like spending money, risks vs. hit to productivity if virtual network to employees to connect to work resources remotely?, ways to reduce data breach, all these kind of questions come under risk management process.

Coming to cyber-security, it mainly concentrates on securing, assessing, and testing computing or work environment against hackers and malicious users. So, I can say that decision making part of cyber-security is part of IT Risk Management, but not implementation of the decisions. Not all IT Risk Management are cyber-security related, there are many risks which are not done by attackers.

As a project Manager, I will follow basic steps very carefully because these are very crucial to come up with the best risk management strategies. Steps like identifying the risk and prepare risk register carefully, analyze risk and understand the nature of risk and how it effects, Prioritize the risks according to their potential effect, how to avoid the risk or what steps to be taken to see the risk not to occur. And monitor the reviews and risks.