CYBER SECURITY
4
software). The malicious software includes viruses, worms, spyware, and Trojans (Cyber
Security Products and Services, 2016). Cyber risk assessment is the step used by many
organizations to find out how exposed the systems to cyber-attack are. The typical cyber security
risk assessment step is identifying the various organizations' assets that can be affected which
include systems, database, and other hardware containing essential data. After identifying the
potential risks, the next step is the selection of control systems to prevent the attack.
Concerning cyber security, there are fundamentals of becoming cyber secure. These
fundamentals include management of people, processes, and technology (Cyber Security
Products and Services, 2016). Taking into account in people management, staffing is required,
professional skills and qualifications, and component resources. Process management includes IT
audit, management of systems, governance frameworks, and best practice. The last fundamental
is technology, and it involves competence and support process. Integration of the three primary
approaches to cyber security is what makes an organization cyber secure. Technology is the
primary element in achieving the most effective cyber security. Cyber security programs include
the use of anti-virus programs, anti-spyware and data encryption. According to the cyber
essentials, the business organizations should not only recognize the cost of software to protect
their database from malware but also consider the cost of losing the most useful information
(Dorman, 2015).
Dostları ilə paylaş: