2 Deliverables APA style:
1- Add three pages to the attached document to put together a 5 pages word document APA sytle. Make sure the paper covers the below points (It is important to show cost analysis with an example or two).
2- 6 slides PPT presentation summary of term project
Points to cover in the 5 pages paper and the 6 slides ppt presentation:
• Cyber security threats and challenges corporations face protecting their assets. • Tools and measures available detect vulnerabilities, threats, and protect IoT devices. • Cost benefits analysis of protecting assets against cyber threats versus assets with cyber vulnerabilities. (give numbers and examples) • Put together a prevention strategy based of complex applications and software to face cyber security threats. • Summarize cyber security threats, challenges, and protections tools available.
CYBER SECURITY
Cyber Security
The security of online files, applications, documents, consumer information, and organization information are just some of the valued items that need to be secure from cyber threats. Companies and organization that utilize the internet to conduct business know all too well the importance of securing the information and any and all information of those that they do business with. Having some general knowledge of what cyber security is and the importance of it is our purpose in this brief.
Cyber security is the “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack”, as defined by Merriam-Webster.com (Online, 2013). In general practice cyber security is simply securing online information and service systems. If you ever entered your name, address or any personal information online or into some database to win a prize this information is online or somehow accessible via the Internet. It is this type of information that so many millions of people are concerned about if it is secure or not, since it is out on the Internet.
“The nation’s critical infrastructure relies heavily on the Internet for everything from submitting taxes, to applying for student loans, to following traffic signals, to even powering our homes” (Government, 2013). This is why cyber security is one of this country’s most important national security priorities and everyone’s responsibility. Security experts promote the importance and awareness of protecting information by providing simple steps that both citizens and organizations can take. Experts recommend that companies provide education for employees and citizens take advantage of security educational events when available – whether at work or at home. Educational events provide resources to help users prevent security issues and identify theft.
As technology continues to advance, the techniques of computer hackers continue to advance as well. This driving force and the continued cyber threats are cause for developers to come up with more strategic prevention applications and software. According to energy.gov, “supervisory control and data acquisition (SCADA) networks are a part of the nation’s critical infrastructure that contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity natural gas, gasoline, water waste treatment, and transportation) to all Americans” (Energy, 2013).
With these networks playing such a critical part in the nation’s infrastructure it is vital for these networks to stay updated. This is why the administrators of these networks proactively maintain these systems. SCADA networks follow several steps to focus on specific actions to be taken to increase the security of SCADA networks due to the great risks of what these networks are responsible. Here are some of the steps that SCADA networks take according energy.gov, to improve the security of their networks,(identify all connections to SCADA networks, disconnect unnecessary connections to the SCADA networks, evaluate and strengthen the security of any remaining connections to the SCADA networks) (Energy, 2013).
Cyber security is simply taking steps to protect computers and computer systems. This can be done by keeping antivirus software updated, installing OS updates, using difficult passwords or passwords phrases that you would only know, limiting the personal information you put on the Internet. Cyber security is the responsibility of all Internet users and simple steps can be used by all level of users.
References:
Energy, U. D. (2013, April Saturday). 21 STEPS TO IMPROVE CYBER SECURITY OF
SCADA NETWORKS. Retrieved from Energy.gov: http://energy.gov/oe/downloads/21-
steps-improve-cyber-security-scada-networks
Government, U. (2013, April Saturday). National Cyber Security Awareness Month. Retrieved
from Department of Homeland Security: http://www.dhs.gov/national-cyber-security-
awareness-month
Online, C. s. (2013, April Saturday). Merriam-Webster Online. (Encyclopedia Britannica
Company) Retrieved April Sat, 2013, from Merriam-Webster Online:
http://www.merriam-webster.com/dictionary/cyber%20security