CIS 500 week 3 discussion: Cybersecurity and Risk management

“Cybersecurity and Risk management”

IT industry relies on a combination of strategies, technologies, and user education to protect an enterprise against cybersecurity attacks that can compromise systems, steal data and other valuable company information, and damage an enterprise’s reputation. Cybersecurity risk management takes the idea of real-world risk management and applies it to the IT world. It involves identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization protected.

Using new technologies that can find and map data across the enterprise. Once data is mapped, organizations make better decisions on how that data is governed and reduce their risk footprint. Scanning the company for sensitive data at rest and then removing any data stored where it does not belong dramatically reduces the risk of an accidental loss of sensitive data. However, even small security vulnerabilities can lead to significant losses if network systems connected in such a way that intrusion into an unimportant area can provide an unauthorized entry into more essential systems and more sensitive data. For risk mitigation some precaution may be followed:

Limiting devices with internet access, Installing Network Access Controls, Limiting the number of people with administrator credentials and the control rights for each administrator, Automated patches for operating systems, Limits for older operating systems, Firewalls, Anti-virus programs and endpoint security, Requiring two-factor authentication to gain access to certain files and systems, Evaluating the current governance structure to ensure that there are checks and balances throughout the system, Limit administrative rights,  and Mark Logic offers the following recommendations for enhancing risk management,.

Advanced encryption: Encryption is not a new feature in databases, but today encryption must be implemented more strategically and systematically to protect data from cybercriminals and insider threats. It includes granular role-based access, standards-based cryptography, crucial advanced management, granular separation of duties, and state-of-art algorithms that drastically decrease exposure.

Redaction: Companies need to balance protection of data with the ability to share it. Redaction enables companies to share information with minimal effort by concealing sensitive information, like names and social security numbers, from queries and updates.

Element-level security: While redaction is necessary, companies need to be able to do it at the element, or property, level based on an employee’s roles. Companies also need to be able to implement custom as well as out-of-the-box rules.

Place an Order

Plagiarism Free!

Scroll to Top