Contents
Effectiveness of the strategies. 3
Alignment ofcritical points in regards to the argument with supporting resources. 4
Introduction
Many organizations require the application of various information technology design to safeguard all the organization’s assets irrespective of the size of the institution. This design refers to the encryption of specific security programs, and members of the Information Security Department do this. This department designs a blueprint through the regulation of perils that various individuals’ experiences. These blueprints play a vital role in establishing safety precautions. Therefore, enabling the security department to coordinate and inspect security operations ensures that every program is upgraded. These activities are so much crucial to Information Security as well as the overall victory within the organization.
Key points
Three main points affirm that every business requires the application of various Information Technology designs. These key points reveal themselves from the cyber-attacks that an organization experiences due to a lack of efficient Information Technology security designs.
Phishing is one of the most common forms of cyber-attack, whereby hackers tend to trap people, making them operate ineffectively. This includes using unknown personal details such as bank account, email addresses, password, and user names on fake websites. The internet site resembles a potential platform where users can regularly revisit. “Man, in the middle” is also another attack that changes the message transmission between two parties. An attacker could change the destination account number giving the money and other assets to the attacker’s position without the attackers’ consents.
Malware attacks are embraced of spitefulplans that can steal encodedinformation, hijacking primary computing duties and coordinating and supervising the user’s operations. Lastly, informative assurance entails the application of guaranteeing and managing perils. Lack of such aspects results in enhancing probable hacks.
Target audience
The target audience is the business entities that use various technological programs. It is expected of all companies and people to have adapted to the recent security designs majorly to reduce probable hacks and safeguard the assets of private institutions(Li,et al., 75). The three questions that endorse a challenge to the requirement of information technology designs include; Do individuals and companies see the significance of securing their computers? To what extent do various institution value their data irrespective of the maintenance price? What companies or individual value as significant data.
Goal
The main objective is to determine the significance ad awareness of having information technology security, irrespective of both the price and level of usage. More importantly, it is required to understand the current risks and better handling methods. Focusing on the returns of having an information technology security design and how advantages overweigh the disadvantages and comprehending the expenditures related to recovering data.
Potential resources
https://rusecure.rutgers.edu/content/step-5-it-security-plan
https://outpost24.com/blog/top-10-of-the-world-biggest-cyberattacks
https://www.appliedtrust.com/resources/security/every-company-needs-to-have-a-security-program
Examples of IT plan
Below are some of the guidelines as appropriate in the IT plan.
- Preserving analytical software onsite that is well studied and acquired at the program manager’s choice, therefore, suggests that software is viewed as a locked storeroom.
- Enacting and suggesting a strong password.
- All members within the information technology department are required to recommend a non-disclosure contract, particularly for secrecy purposes.
- Members of the information technology department are provided with a plant on security alertness and societal engineering to ensure that every staff is aware of their respective activities and duties.
- Network certification for PCs and other network devices.
Effectiveness of the strategies
Target and Equifax resulted in the following variations to their respective information technology security systems immediately after becoming the recent cyber-attack victims. In 2014, the objective shifted to a safer debit and credit technology known as “Chip and PIN.” The technology’s extensive application is regarded to be far safer than numerous card technologies applicable in the United States(Thames, Lane, and Dirk, 94). This majorly depended on magnetic strips. At Equifax, the information security managerbelieves that he has all that it takes to build a stellar security system.
Alignment ofcritical points in regards to the argument with supporting resources
The practice of hacking is inevitable to both individuals and organizations. Below are the two big institutions that failed due to the impact of cyber-attacks.
Target – The individual data of over 110 million clients were stolen between 27th November and 15th December in 2015. The hacking activity was done by installing malware relating to cash registers to scan data from the credit card deports. Such a method is referred to as RAM scraping. This means that once the information has been removed, the attackers sell it again on the black market.
Equifax – exposed its experiences with regards to cyber-attacks over a period. In July 2017, the hack revealed individuals’information, driver’s license numbers and social compensation coverage(Sun, et al, 158). Grievances against the organization just like uncertainties if insider marketing were taxed because of the vulnerability of various companies; therefore, hackers continue to sell the stock. This was immediately after taking the breach to the public.
Works Cited
Li, Ling, et al. “Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior.” International Journal of Information Management 45 (2019): 13-24.
Sun, Nan, et al. “Data-driven cybersecurity incident prediction: A survey.” IEEE Communications Surveys & Tutorials 21.2 (2018): 1744-1772.
Thames, Lane, and Dirk Schaefer. Cybersecurity for industry 4.0. Heidelberg: Springer, 2017.