Monday, July 29, 2019

Cyber threat analysis Research Paper Example | Topics and Well Written Essays - 1500 words

Cyber threat analysis - Research Paper Example The paper will also mention companies that provide cyber threat analysis services. In addition, the paper will continue to by discussing future speculations about the fate and integration of cyber threat analysis. Cyber Threat Analysis Introduction Computer and internet users have been met with dire and consequences that have sought to deny them their freedom and sense of enjoyment when using various software and computer hardware that link to the internet. The World Wide Web has become a risk ground where individuals can be attacked by malicious programs that may work to ruin important information stored and retained in individual computer system. The issues of cyber threats have been very serious and grievous as the risks involved have exposed secrete information of particular organizations to unauthenticated individuals. Attackers of information systems of particular organizations have used the vantage to fell particular organizations or scuttle their normal operations. Government agencies have also faced the forsaken effects of cyber threats as witnessed with exposure of critical government information to unwarranted individuals. The graveness of cyber threats in the contemporary global world necessitated technologists and scientists to research ways of by which information systems can be secured from the detrimental attackers. ... Cyber threat analysis involves numerous steps projected to ensuring attaining of the best ways of protecting organization’s information system. Cyber threat analysis begins with determination of an organizations total expenditure on particular assets whose information is stored in the computer systems. The analysis also takes into consideration the organizational values including tangible and intangible costs required in obtaining, creating and maintaining the needed security in the information system. Cyber threat analysis will also consider individual organization’s image and reputation in the public domain. In addition, cyber threat analysts also scrutinize the historical information threats witnessed in the organization and their likelihood to occur in the future. Furthermore, the analysis of the cyber threats takes into consideration any probable threats and dangers that are likely to attack the information domain system of an organization. After determining the mo st probable threats, cyber threat analysts are required to move further and identify the possible ways and avenues by an organizations’ information system may get attacked. As depicted by Janczewski and Colarik (2005), cyber threat analysts also need to speculate possible qualitative and quantitative amount(s) of damages that an attack may cause to an organization. Janczewski and Colarik (2005) further propose that cyber threat analysts should define possible strategies that may help in minimizing information damages in case a serious and highly protracted attack. The Technologies Involved With Cyber Threat Analysis The effectiveness of cyber threat

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.