Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Report on Improving Cyber Security & Device Usage

Category: Computer Sciences Paper Type: Report Writing Reference: APA Words: 2400

            The technology around the world is changing rapidly with the passage of time. In order to gain competitive advantage on the organizations, continuously upgrading the technologies so that they can grab a significant amount of market share and can sustain for a longer time period. However, the risk regarding security and fair usage in the organization is creating many problems for the organization. In the past, many organizations have faced serious consequences due to cyber-attacks. That is why the policy has been made for improving the cybersecurity & utilization of devices in the organization.

Scope & Urgency of the problem

        In recent years the technology around the world has experienced rapid growth. Due to the rapid growth of technology, cyber thrusts has also increased up to a lot of extents. Due to the increase in cyber-crimes, many organizations have suffered financial loss due to which not only the performance but also the overall efficiency of the organization has experience decline. Therefore for the organization, it is highly important to create such a policy which increases the cybersecurity of the corporations that not only the employee’s personal information remain secure but also the organization remain safe from any cyber threat. A deep analysis has been performed for identifying the flaws in the policies and how cybersecurity can be enhanced in the organization. The analysis has indicated three areas which lack a [roper cybersecurity policy. Those areas are explained as follows:

Bring Your Own Device (BYOD)

            In recent years many organizations have given permission to their employees to bring their own laptop & smartphones in the offices so that employees can work more conveniently. The BYOD approach has increased the confidence level of the employees along with the motivation level; however, there are a lot of inheriting risk which the corporations unable to realize completely. The first major risk is the security risk because through the devices of employees contain the information of the organization which any unauthorized individual can use for its own advantage. Therefore a policy is needed regarding how employees can utilize their devices for conducting there routine organizational activities (Genge, Haller, & Kiss, 2015).

IOT (Internet of Things)

        The internet of things means that all the devices are connected with each other with the help of a smartphone or any remote controller; various devices can be controlled. In the office, if different devices are going to be controlled according to individual preferences, then various issues can occur. For instance, if an individual set the room temperature of the office too low according to its own desire than other employees n the office might experience inconvenience. It means that a proper policy id needed so that the devices can be controlled in such a manner that everyone should be happy (Jayakumar, et al., 2014).

Cloud Storage of Improving Cyber Security & Device Usage

        The cloud is considered a convenient way of storing the data; however, there are many risks which are associated with cloud storage. Although the cloud service providers state that they secure the data of their clients and implement the latest practices for reducing the cyber-attacks. However, cloud services are not as safer as cloud service providers tell their clients. There are many policies which organizations made when they select the cloud storage for storing the data. However, such policy is needed, which will help the organizations to control the risks regarding cybersecurity.

Evidence that indicates the importance of Problem

        The recent data breaches and the economic loss which the corporations face are big evidence which indicates that cybersecurity is necessary. One of the biggest examples is regarding the customers of the target, whose debit & credit card numbers were stolen. After this incident, the target organization experience a great revenue loss because customer satisfaction & loyalty declines. Therefore if an effective cybersecurity policy is not made than many organizations can experience financial loss along with other serious consequences like the decline in customer loyalty. A cybersecurity & device usage policy will help the organization to control various risks through which an organization can achieve higher performance & efficiency (Corbet & Gurdgiev, 2017).

Available alternatives for the Issues

Creating a policy regarding the usage of organizational Resources

        The first and most important alternative which the organizations or authorities have is to set such policies through which the cybersecurity can be enhanced, and all the issues which come up with cybersecurity can be mitigated. The new policy which has been decided for implementation is improving the cybersecurity & usage of devices within the organization. It is expected that through this policy, the organization can achieve various goals such as improving security, increasing employee satisfaction and improving the overall performance of the organization. If the resources of the organization are going to be utilized according to set guidelines than chances of fraud & cyber-attacks will be reduced up to a lot of extents.

Effective internal control of Organizations

        The effective internal control can help the organization to reduce the risks which are associated with security and management of IOT devices. When the internal control is going to be strict, then no one will able to use the devices of the organization for its own advantage. It means that the employees will be afraid of the management that if they are going to use the devices according to their own will, then the management can take strict action against them. So effective internal control is also among the option which the corporation can implement (Baggili & Breitinger, 2015).

Recruitment of IT experts and Improving Cyber Security & Device Usage

        The corporation has the option to recruit IT experts as well for improving cybersecurity and managing the IoT devices in the organization. The IT experts have the necessary skills & knowledge from which the organization can better handle its devices and data. Usually, the IT experts have more knowledge regarding how the organization should use the devices how the security can be enhanced (Nagy, Oláh, Erdei, Máté, & Popp, 2018).

The possible outcomes of the alternatives

        The first alternative that is a policy about the usage of organizational resources will help the corporation to use the data of the organization according to the set rules. When the employees are allowed to use their devices in companies, they must be bound to use the resources of the companies according to set guidelines. If not, then employees will have to pay the penalty. Through this, employees will use the resources of the company effectively, and the risk of cyber security will be mitigated up to a lot of extents (Leukfeldt, Lavorgna, & Kleemans, 2017).

        Through strong internal control, the actions of the employees will be monitored, which will allow the organization to increase the security. Through strong internal control, the usage of IoT devices can also efficiently controlled. When the employees know that they are being monitored than they do not perform any activity which they think will harm their reputation in the organization. So through strong internal control, the organization can achieve the goal of improving the cybersecurity and usage of the IoT devices in the corporation.

        Through recruiting, IT expects the organization not only able to set such rules which will enhance the security but will also improve the usage of the devices in the organization. The IT experts have the skills to influence the employees to use the devices in the right ways. It means that ultimately, the goal of the organization to improve the usage of devices will be efficiently fulfilled (Genge, Haller, & Kiss, 2015).

Recommended Course of Action and Improving Cyber Security & Device Usage

    It is recommended to the organization to implement the improvement of cybersecurity & device usage policy so that the organization can mitigate the risks which are associated with the cybersecurity. Through this policy, not only the devices in the organizations are going to be used in an effective manner but also the performance & efficiency of the organization will increase up to a lot of extents.

The impact of the latest policies on the organization’s Stakeholders

        Considering the fact that the very first policy is about enhancing cloud security, each and every member of the organization would be impacted. The security of an organization is very important because the company seems to handle years of data that it gains over time. In addition, there is a lot of sensitive information that the company cannot afford to lose. Information about the management system and supply chain are considered critical for the company. It would suffice to say that anything about the internal working of an organization is believed to be critical and confidential. Furthermore, the company cannot lose even a little bit of it to its competitors because there is a chance that the company might lose its competitive edge in the market (Genge, Haller, & Kiss, 2015).

        In order to ensure that such information is safe in the database of the organization, the new policy will require the manager of the workplace to back the data used in the cloud on a daily basis. Each employee will be required to sign out of the accounts which are being used in the systems of the company before sending the data used to the manager. At the end of the day, the manager will store all the data in the cloud. The password of the cloud account will only be known to the higher authorities and not the employees. If the worker requires something related to it, the manager will be responsible for opening the cloud account and retrieving the data.

        The second policy is concerned with the Internet of Things, and it has several benefits for the organization while it will limit the freedom of employees. In the smart organization, an employee will have to consent with all other present workers in order to use the air conditioner. It means that a worker cannot just come and turn it on without the consent of others. It would ensure that others are not harmed or disturbed by the actions of that employee. The employee will first have to ask others and gauge whether they agree with him or not. If they are, he can turn the air conditioner on. Meanwhile, if they are not permitting it, a worker alone cannot turn it on (Conti, Dehghantanha, Franke, & Watson, 2018).

        From the perspective of a manager, this policy would be quite beneficial in promoting employee communication and engagement. They would have to care for the opinions of others before their own. This would also teach them how they should value the ideas of others before they start acting on what they believe is right. In addition, one of the most important benefits of this policy is that the workforce will be structured in such a way that no one is disoriented. It will teach employees that they have to take the consent of either the manager or the whole workforce before acting towards something that belongs to the company. The same can be said about projectors as well. In order to use it, the employee should first ask the manager (Nagy, Oláh, Erdei, Máté, & Popp, 2018).

Conclusion Action on Improving Cyber Security & Device Usage

        It is concluded that the new policy which has been decided for implementation is improving the cybersecurity & usage of devices within the organization. It is expected that through this policy, the organization can achieve various goals such as improving security, increasing employee satisfaction and improving the overall performance of the organization. If the resources of the organization are going to be utilized according to set guidelines than chances of fraud & cyber-attacks will be reduced up to a lot of extents. Through strong internal control, the actions of the employees will be monitored, which will allow the organization to increase the security. Through strong internal control, the usage of IoT devices can also efficiently controlled. When the employees know that they are being monitored than they do not perform any activity which they think will harm their reputation in the organization. One of the biggest examples is regarding the customers of the target whose debit & credit card numbers were stolen. After this incident, the target organization experience a great revenue loss because customer satisfaction & loyalty declines. A cybersecurity & device usage policy will help the organization to control various risks through which an organization can achieve higher performance & efficiency.

References Action of Improving Cyber Security & Device Usage 

Baggili, I., & Breitinger, F. (2015). Data sources for advancing cyber forensics: what the social world has to offer. In 2015 AAAI Spring Symposium Series., 6-9.

Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Elsevier, 544-546.

Corbet, S., & Gurdgiev, C., (2017). Financial Digital Disruptors and Cyber-Security Risks: Paired and Systemic . 1(2), 1-20.

Genge, B., Haller, P., & Kiss, I. (2015). Cyber-security-aware network design of industrial control systems. IEEE Systems Journal, 11(3), 1373-1384.

Jayakumar, H., Lee, K., Lee, W. S., Raha, A., Kim, Y., & Raghunathan, V. (2014). Powering the Internet of Things. 375-380.

Leukfeldt, E. R., Lavorgna, A., & Kleemans, E. R. (2017). Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime. 23, 287–300.

Nagy, J., Oláh, J., Erdei, E., Máté, D., & Popp, J. (2018). The Role and Impact of Industry 4.0 and the Internet of Things on the Business Strategy of the Value Chain—The Case of Hungary. Sustainability, 10(10), 3491.

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Class Engineers

ONLINE

Top Class Engineers

1218 Orders Completed

Quality Assignments

ONLINE

Quality Assignments

0 Orders Completed

Coursework Assignment Help

ONLINE

Coursework Assignment Help

63 Orders Completed