Cyber Security assignment identifying exploring strategies IT vulnerabilities can be detected and solves
Question
Task: How can Cyber Security assignment research mechanism be used to detect IT system vulnerabilities?
Answer
Introduction:
This Cyber Security assignment explore IT vulnerabilities and strategies to protect business assets. Information technology is a vast field under Science and Technology in which IT and CS are interrelated. IT covers the operational part and CS covers the development part. Cyber Security is a branch of information technology. Information Technology is very vast, and probably cyber security is the most complex branch in information technology.
Main Points:
On this Cyber Security assignment we identify various roles of IT professionals under cyber security are security engineer, security analyst, security architect, security policy advisor, chief information security officer, security technical writer, security content writer, cyber security risk manager, cyber security vulnerability analyst, cyber security threat analyst, cyber security policy compliance engineer, cyber security policy compliance experts, and there can be many roles that an IT professional can play in cybersecurity section. Some more can be like cyber security penetration tester, ethical hacker, web application penetration tester, network penetration tester, and so on. There are numerous skills under cyber security and each skill results in a new role for an IT professional(Shoemaker and Conklin, 2011).
There are various personal, social, ethical, and legal impacts arising from cyber security work(Manjikian, 2017).Cybersecurity professionals often become enemies of hackers and they have to protect themselves even more as hackers do target them more as a matter of pride. They also have the liability to train and educate their neighbors and friends with all the knowledge that they have so that they never fell into the hands of hackers. Often, they have to carryout very sensitive jobs like penetration testing. And it should be their ethics that they do not use unwisely any details that have been provided by the organization to them. On this Cyber Security assignment it is observed that that they must understand that their job is the toughest and they must show maximum dedication to complete their task to their best potential otherwise it's very hard to catch the culprit as hackers are very smart these days. They must be ready to invest 24 X 7 X 52 hours a year in their job as this is a very critical requirement for the welfare of society. They must ensure confidentiality to make sure the best level of data integrity for the organization they are working for(Macnish and Van der Ham, 2020) (Christen and Loi, 2020). Their honesty is the first requirement for the organization they are working for.
On this Cyber Security assignment it is observed that not only the corporate sector for which they are working is affected by their ethics but also the government. Their corporate citizenship, as well as governance role,are not only for each individual but for the entire country and the world. They are security professionals and if their ethics are of standards as required then they will be loved by all as they are the one who ensures security for everyone in the online arena. They need to understand that they are corporate citizens as well as national citizens. They need to protect their organization, but they also need to protect their country and the world. If this coherence is not met cyber security cannot be ensured 100%. Even a single loophole can cause a cyber-attack. Various professional associations like NIST, Cobit, ISO, GDPR, and various federal agencies throughout the world work which various cybersecurity professionals to ensure the best level of cybersecurity for the whole world (Stafford et.al., 2018). NIST norms and regulations and various of their policies are applicable in the USA as well as England and any other European country. All these professional associations work incoherence to ensure 100% cyber security. Cybersecurity professionals also need to follow the information technology ethics apart from all mentioned above(Reynolds, 2014).And they should be the best citizens of the world.
Conclusion:
Cyber security professional roles are plenty but all of them have social, ethical, legal, and personal impacts arising from their work as mentioned above. Also, this Cyber Security assignmentalso highlights the importance of professional associations as keycontiobutors to their security systems.
References:
Christen, M., Gordijn, B. and Loi, M., 2020. The ethics of cybersecurity (p. 384). Springer Nature.Cyber Security assignment
Macnish, K. and van der Ham, J., 2020. Ethics in cybersecurity research and practice. Technology in society, 63, p.101382.
Manjikian, M., 2017. Cybersecurity ethics: an introduction. Routledge.
Shoemaker, D. and Conklin, W.A., 2011. Cybersecurity: The essential body of knowledge. Cengage Learning.
Stafford, T., Gal, G., Poston, R., Crossler, R.E., Jiang, R., and Lyons, R., 2018. The role of accounting and professional associations in its security auditing: An AMCIS panel report. Communications of the Association for Information Systems, Cyber Security assignment 43(1), p.27.