SlideShare a Scribd company logo
1 of 11
Cybersecurity and Risk ManagementRESPOND TO THIS
DISCUSSION 2 IN 150 WORDS
The first article I found when I was browsing relating to risk
management to cyber security paradigms will provide a useful
backdrop for evaluating the current state of consumer protection
in the cyber security environment. The initial paradigm for
protecting ICT systems was based on a perimeter defense
model. Security focused on tightly regulating the interchange of
traffic between systems. Systems were kept closed by default
and opened only by exception and under conditions of tight
control. This approach to security matched operational norms at
the time information systems were siloed these systems were
not easily interoperable and thus did not generally exchange
traffic. Under these conditions security risks were primarily
internal rather than external.
The Second article I noticed regarding cybersecurity is the
adoption of a security by design principle and certification
frameworks may make it easier to neglect individual users of
the Internet in the ongoing efforts to improve cybersecurity. If
security concerns can be abated by focusing efforts upstream,
then there may be a perception that there is less need to worry
about what consumers are doing downstream.
The third article I found was the language used in many national
cybersecurity strategies typically is robust, though non-specific.
As the examples outlined above illustrate, there is a clear
contemplation that individual consumers have a role to play in
cybersecurity and possibly even public duties or
responsibilities.
Not but not least in the fourth article, I found that the program
provides information about how home Internet users and small
businesses can protect themselves online. It uses social media, a
Web site, email alerts, and partnerships to deliver tips and
information about cyber threats.
RELATION BETWEEN CYBER SECURITY AND RISK
MANAGEMENT
The many consumers do not fully understand cyber security
issues and do not bother to follow good cyber hygiene, there is
a question whether the current consumer base will value a
security certification. As indicated, the EC’s proposal for a
certification framework does not contemplate mandatory
compliance. The expectation is that achieving certification will
give ICT service providers a competitive advantage, that is, that
consumers will value the certification and thus be willing to pay
more for a product or service that is verified.
As an IT MANAGER, discuss how you will use the concepts
discussed in the four articles in the management of IT risks
within your company.
As an IT Manager, I have to know whether there are any
cutting-edge dangers and after that want to order the type of
risks and organize them design and execute the preparations
which assist to restrict the risks.
References:
· Miedema, T. E. (2018). ENGAGING CONSUMERS IN
CYBER SECURITY. Journal Of Internet Law, 21(8), 3-15.
· Schell, R. R. (2016). Cyber Defense Triad for Where
Security Matters. Communications Of The ACM, 59(11), 20-23.
doi:10.1145/3000606.
· Alali, M., Almogren, A., Hassan, M. M., Rassan, I. A., &
Bhuiyan, M. A. (2018). Improving risk assessment model of
cyber security using fuzzy logic inference system. Computers &
Security, 74323-339. doi:10.1016/j.cose.2017.09.011
Milestone One: Early Bird Correction Agency 1
Milestone One: Early Bird Correction Agency 7
Milestone One: Early Bird Correction Agency
Chelsea Clare
Southern New Hampshire University
CJ675
Introduction:
Early Bird Correction Agency (EBCA) is based in the region of
the Netherlands within Early Bird locality. Founded by the
federal government, EBCA aims at providing chances to
offenders by teaching them moral values. The institution
ensures that individuals convicted do not revolve back to their
previous activities. Measures are taken to train inmates to be
financially stable after their jail term. EBCA has a capacity of
100 inmates and a fluctuating number of staff depending on
their number of inmates. However, the number of staff is
maintained at the ratio of 2 inmates to 1 warden. The major
problem currently in EBCA is the overcrowding. In 2011, the
facility had excess inmates. The number has been on the rise
ever since.
Thornberry’s theory affirms that the correctional facility leads
to the breaking of social bonds (Lilly, et al., 2014). The
friendship of the individual and other members of the society
drops as they go through the delinquency. The bond with other
wayward peers becomes stronger. Also, it has a mutual feedback
on the behavior of the character. In other terms, the more the
crime is committed, the more it alters his/her conduct.
Generally, the theory elaborates the process of beginning and
persistence of the felony. Additionally, the proposition provides
the indication of how the process alters an individual's life
stages. Under the new lifeline, the victim becomes unruly. From
a study carried out, violent interactions indicate a minimum of
45 cases in 2016. Inmates encounter with staff in a disturbing
manner show a minimum of 99 in the same year.
Financial constraints lead an ex-convict to engage in crime.
Agnew argues that the more an individual is strained the more
changes of offending the law (Krohn & Lane, 2015). In EBCA,
the increasing number of inmates can be associated with fiscal
hardships hence opting for the misdeed. The facility should
develop a mechanism that will offer the convicts a commercial
resolution upon completion of the jail term. If the plan turns out
positively, then the chances of the person reappearing in prison
will be minimal. Assessing study, the community reports more
incidences that require the attention of the Agency. The
indication of the matter is that the economy of the area is
performing poorly according to the theory.
Generally, the challenge in EBCA is overpopulation. The
mechanism employed should lead to a reduction of inmates.
Mind education for the convicts will lead to the changed heart
and hence changed life desires. Internees are to receive a
motivating power that will help them overcome the desire for
crime. Their mentalities should be open o the imagination of the
greater good rather than the fulfillment of the immediate needs.
Despite the efforts, the government may implement, the
situation is not likely to change. Therefore, the institution
should initiate a program that offers the inmates lectures aiming
at changing their attitude.
The law gives the president power to release some inmates
basing on specific factors. For instance, an inmate that is
remaining with a shorter jail period may receive the absolution.
During the process, a limited number of jailbirds are
exonerated. The amnesty is provided on a special occasion like
the country’s Independence Day. President’s mercy over the
prisoners is a more direct approach to reduce the number of
internees.
The convicts are offered short course training such as tailoring
and carpentry so as to keep them engaged while in jail. This is
aimed at ensuring that upon leaving jail, an individual
comfortably set up a workshop offering a pathway for self-
dependency. Exposure to religious teaching is intended to
change their view respecting the law and order. If a convict is
exposed to playing football and realizes that he/she is talented,
chances are, they may want to pursue the talent instead of
engaging in felon (Mooney, 2017).
The community provides regulations that demand every
individual to respect the law and order. In order to achieve the
goal, youngsters are offered training that will see them grow up
with the desired morals. As a result, the chances that the
individual will engage in the vices are greatly reduced. In
addition, the respect that is directed to the individuals that
adhere to the law and order is meant to psychologically
convince the youth that it is worthwhile to observe the policies
of the land. The proposal majors on providing alternatives to
crime. The inmates are compelled to respecting law and order.
Prison education works with the same goal as the proposed
method. Support for community policy structured to prevent
recurrent of the crimes is the same way as the author's idea.
Aspects to be considered during decision-making will be based
on analysis carried out. SWOT analysis can be used to
determine the verdicts that should be taken.
Strength – the facility understudy is a government agency and
hence it will be easy to formulate the policies that will govern
the implementation. Furthermore, the government may offer the
same education to schools to enhance its productivity.
Weakness – the approach tends to cater for the future challenges
but ignore the current problems. Therefore, the method may fail
to resolve the issues being faced by the business in the present
settings.
Opportunity – the resource to implement the proposition are
less. Furthermore, similar projects are already in existence. The
main revenue required will be used to pay the lecturers.
Threat – the project enhances creativity among the inmates.
Should the individual perceive the resolution in a negative way
before completion of the lectures, the situation may worsen.
Literature review:
Graph 1: Number of inmates and reported
incidences vs. time
The graph indicates that the number of inmates is constantly
increasing. Factors of peer influence and financial constraints
seem to be getting in a worse condition. Incidences reported
increased with the increase in the number of inmates. When the
inmates’ number is at maximum, the reported incidences tend to
drop significantly. The occurrences denote that the individuals
creating chaos are the ones in jail. Graph 2: number
of police contact with victims vs. time
As more residents land in prison, the disturbances are reduced
greatly. The same individuals that are unruly in the correction
agency bring about the individuals that cause disharmony.
From the research conducted, many ex-convicts fail to secure
jobs in the process of getting back their life. As a result of
feeling stigmatized, they opt to associate with the wrongdoers.
Also, the failure to smoothly fit the society makes the character
angry and hence ends up delighting in crime. When the police
confront an individual, they fail to comply and hence cause
commotion. The research indicated humiliation that the ex-
prisoners have met could alter the feeling of the individual
(LeBel, et al., 2014). Before an inmate is allowed to leave the
facility, he/she should have gained an open mind to create jobs.
The social trait has to be tuned to accept dishonor from the
society.
The overflowing population within EBCA is mainly caused by
limited knowledge in entrepreneur strategies and the social view
of the ex-convict. After being released, the person does not
have a clear mind of what they need to work on. As a result, a
slight disappointment forms toward society, so he/she turns
back to crime. The ideal solution is to educate the inmates to
expect the worse reaction from the society. A new mindset
should help them develop ideas and goals in life. Through the
appropriate utilization of the program, few individuals will
return to crime. Furthermore, the ex-prisoners will influence
other people towards innovation and being independent.
References:
Bachman, R., & Schutt, R., (2017). The practice of research in
criminology and criminal
justice, Thousand Oaks, CA: Sage Publications Inc.
Krohn, M. D., & Lane, J. (2015). The Handbook of Juvenile
Delinquency and Juvenile Justice.
Hoboken: John Wiley & Sons.
LeBel, T. P., Richie, M., & Maruna, S. (2014). Helping Others
as a Response to Reconcile a
Criminal Past; The Role of the Wounded Healer in
Prisoner Reentry Programs. Criminal
Justice and Behavoir , 108-120.
Lilly, J. R., Cullen, F. T., & Ball, R. A. (2014). Criminological
Theory: Context and
Consequences. Thousand Oaks: SAGE Publications.
Mooney, T. E. (2017). Ready or not: employment, re-entry and
the lasting effects of stigma after
incarceration. Memorial University Research Repository .
Total Inmates 2009.0 2010.0 2011.0 2012.0 2013.0
2014.0 2015.0 2016.0 94.0 94.0 101.0 111.0
125.0 125.0 130.0 130.0 Reported
Incidents 2009.0 2010.0 2011.0 2012.0 2013.0
2014.0 2015.0 2016.0 206.0 198.0 204.0
222.0 249.0 252.0 255.0 144.0
Disturbance contact 2009.0 2010.0 2011.0 2012.0
2013.0 2014.0 2015.0 2016.0 151.0 150.0
154.0 163.0 180.0 171.0 177.0 99.0
Violent contact 2009.0 2010.0 2011.0 2012.0
2013.0 2014.0 2015.0 2016.0 55.0 48.0 50.0
59.0 69.0 81.0 78.0 45.0 Use of Force Complaints 2009.0
2010.0 2011.0 2012.0 2013.0 2014.0 2015.0
2016.0 6.0 5.0 5.0 8.0 16.0 14.0 16.0 12.0
Cybersecurity Risk ManagementRESPOND TO THIS
DISCUSSION 1 IN 150 WORDS
Cybersecurity can be defined as a set of techniques and
methodologies that are used to protect the data and assure their
integrity from cyber attacks like damage, unauthorized and so
on. Risk management on other hand is techniques used to reduce
the risk which comes from taking any new steps towards the
development of an organization.
The cyber attacks occurring to data in organizations are directly
proportional to increase in cybersecurity risk management. For
enabling the risk management for data that is prone to cyber
attacks first we need to understand which data is needed to be
protected from going to hands of intruders. Even though
National Institute of standards and security sets some standards
but different organizations has its own data security risks and
different technology infrastructures.
Cybersecurity is mainly required for protecting organizational
sensitive data on which the growth of organization relies on,
there are many categories of cyber threats which are formed in a
daily basis but following are some generic terminology cyber
terrorism, cyber warfare, Cyber-espionage. In cyber terrorism
the terrorist group's spy on information which leads to national
security issues and cyber warfare can be a cyber threat where
company information is stolen by other or a nation is stealing
the information of other company and cyber espionage is storing
the information of the owners or the managers by subordinates
Following the CMM approach, the risk management can be done
in following levels. Initial, Repeatable, Defined, Managed, and
Optimizing.
These levels are followed by many risk management services
like Deloitte, HP enterprise, Coal Fire and more of these
services provide some better mechanism for protecting sensitive
data of an organization.
Cybersecurity is interrelated to risk management. Whenever
there is a threat to data security and integrity both the
cybersecurity and risk management need to work together to
provide complete security to sensitive data of an organization.
It just takes cybersecurity related issues and matches it to real-
world risk management ways so that effective solution can be
formed.
As an IT manager, initially, I would check whether there are
any threats to my data, and if running an organization, I would
definitely face data threats as mentioned so I will apply the risk
management services that are provided by HP, KMPG and many
other services depending on the severity of data threat and after
applying these services I would check to maintain cybersecurity
to prevent cyber-crimes relating to data theft.
References:
Cybersecurity Risk Management. (n.d.). Retrieved April 18,
2018, from https://galois.com/project/cybersecurity-risk-
management/
P. (2017, March 30). Cybersecurity Risk Management: Finding
and Fixing Your Security Vulnerabilities. Retrieved April 18,
2018, from https://www.esecurityplanet.com/network-
security/cybersecurity-risk-management.html
What is cyber security? (n.d.). Retrieved April 18, 2018, from
https://www.itgovernance.co.uk/what-is-cybersecurity
Write 300 words on
topic of Cyber Security and Risk Management
Read Four (4) academically reviewed articles on Cyber Security
and Risk Management and complete the following activities:
(Wikipedia articles will not be accepted. Professor may check
originality of all posts. Avoid copy-and-paste.
1. Summarize all four (4) articles in 300 words or more.
Please use your own words. No copy-and-paste
2. Base on your article review and the assigned reading,
discuss the relationship between cyber security and risk
management.
3. As an IT manager, discuss how you will use the concepts
discussed in the four articles in the management of IT risks
within your company.
Please use APA throughout.
Post your initial response no later than Friday of week 5. Please
note that initial post not completed on the due date will receive
zero grade. See class syllabus for late assignment policies.
Review posting/discussion requirements.
Read and respond to at least two (2) of your classmates’
posts. In your response to your classmates, consider comparing
your articles to those of your classmates. Below are additional
suggestions on how to respond to your classmates’ discussions:
· Ask a probing question, substantiated with additional
background information, evidence or research.
· Share an insight from having read your colleagues’ postings,
synthesizing the information to provide new perspectives.
· Offer and support an alternative perspective using readings
from the classroom or from your own research.
· Validate an idea with your own experience and additional
research.
· Make a suggestion based on additional evidence drawn from
readings or after synthesizing multiple postings.
· Expand on your colleagues’ postings by providing additional
insights or contrasting perspectives based on readings and
evidence.

More Related Content

Similar to Cybersecurity and Risk ManagementRESPOND TO THIS DISCUSSION 2 IN 150.docx

Importance Of Wellness And Engineering
Importance Of Wellness And EngineeringImportance Of Wellness And Engineering
Importance Of Wellness And EngineeringKrystal Green
 
How To Write An Introductory Paragraph For An Essay
How To Write An Introductory Paragraph For An EssayHow To Write An Introductory Paragraph For An Essay
How To Write An Introductory Paragraph For An EssayJodi Hartman
 
Essay Help Australia For Students By Profe
Essay Help Australia For Students By ProfeEssay Help Australia For Students By Profe
Essay Help Australia For Students By ProfeScott Bou
 
Running head TEXT ANALYSIS .docx
Running head TEXT ANALYSIS                                       .docxRunning head TEXT ANALYSIS                                       .docx
Running head TEXT ANALYSIS .docxtodd521
 
Essay On My Personal Computer. Online assignment writing service.
Essay On My Personal Computer. Online assignment writing service.Essay On My Personal Computer. Online assignment writing service.
Essay On My Personal Computer. Online assignment writing service.Kayleigh Fournier
 
John F Kennedy Inaugural Address Rhetorical Analysis Essay
John F Kennedy Inaugural Address Rhetorical Analysis EssayJohn F Kennedy Inaugural Address Rhetorical Analysis Essay
John F Kennedy Inaugural Address Rhetorical Analysis EssayJennifer Magee
 
Buy Stationery Paper Online PARCHMEN. Online assignment writing service.
Buy Stationery Paper Online PARCHMEN. Online assignment writing service.Buy Stationery Paper Online PARCHMEN. Online assignment writing service.
Buy Stationery Paper Online PARCHMEN. Online assignment writing service.Rikki Wright
 

Similar to Cybersecurity and Risk ManagementRESPOND TO THIS DISCUSSION 2 IN 150.docx (8)

Importance Of Wellness And Engineering
Importance Of Wellness And EngineeringImportance Of Wellness And Engineering
Importance Of Wellness And Engineering
 
How To Write An Introductory Paragraph For An Essay
How To Write An Introductory Paragraph For An EssayHow To Write An Introductory Paragraph For An Essay
How To Write An Introductory Paragraph For An Essay
 
Essay Help Australia For Students By Profe
Essay Help Australia For Students By ProfeEssay Help Australia For Students By Profe
Essay Help Australia For Students By Profe
 
Running head TEXT ANALYSIS .docx
Running head TEXT ANALYSIS                                       .docxRunning head TEXT ANALYSIS                                       .docx
Running head TEXT ANALYSIS .docx
 
Essay On My Personal Computer. Online assignment writing service.
Essay On My Personal Computer. Online assignment writing service.Essay On My Personal Computer. Online assignment writing service.
Essay On My Personal Computer. Online assignment writing service.
 
John F Kennedy Inaugural Address Rhetorical Analysis Essay
John F Kennedy Inaugural Address Rhetorical Analysis EssayJohn F Kennedy Inaugural Address Rhetorical Analysis Essay
John F Kennedy Inaugural Address Rhetorical Analysis Essay
 
Crime Prevention In Schools Essay
Crime Prevention In Schools EssayCrime Prevention In Schools Essay
Crime Prevention In Schools Essay
 
Buy Stationery Paper Online PARCHMEN. Online assignment writing service.
Buy Stationery Paper Online PARCHMEN. Online assignment writing service.Buy Stationery Paper Online PARCHMEN. Online assignment writing service.
Buy Stationery Paper Online PARCHMEN. Online assignment writing service.
 

More from alanrgibson41217

Identity and Attribution in Intercultural CommunicationPlease .docx
Identity and Attribution in Intercultural CommunicationPlease .docxIdentity and Attribution in Intercultural CommunicationPlease .docx
Identity and Attribution in Intercultural CommunicationPlease .docxalanrgibson41217
 
If a parent brought their son Ethan to your office who had a lot of .docx
If a parent brought their son Ethan to your office who had a lot of .docxIf a parent brought their son Ethan to your office who had a lot of .docx
If a parent brought their son Ethan to your office who had a lot of .docxalanrgibson41217
 
Identity ProfileThis assignment is a reflection and analysis.docx
Identity ProfileThis assignment is a reflection and analysis.docxIdentity ProfileThis assignment is a reflection and analysis.docx
Identity ProfileThis assignment is a reflection and analysis.docxalanrgibson41217
 
If a company’s CVP analyses showed it was not operating at break.docx
If a company’s CVP analyses showed it was not operating at break.docxIf a company’s CVP analyses showed it was not operating at break.docx
If a company’s CVP analyses showed it was not operating at break.docxalanrgibson41217
 
Identify an international police organization.Research at le.docx
Identify an international police organization.Research at le.docxIdentify an international police organization.Research at le.docx
Identify an international police organization.Research at le.docxalanrgibson41217
 
Identifyingand ManagingProject Risk................docx
Identifyingand ManagingProject Risk................docxIdentifyingand ManagingProject Risk................docx
Identifyingand ManagingProject Risk................docxalanrgibson41217
 
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxIDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxalanrgibson41217
 
IEP Team Members 10.0 Summary comprehensively and correctly id.docx
IEP Team Members 10.0 Summary comprehensively and correctly id.docxIEP Team Members 10.0 Summary comprehensively and correctly id.docx
IEP Team Members 10.0 Summary comprehensively and correctly id.docxalanrgibson41217
 
Identifying Your Group for AssignmentIdentify a disenfranchi.docx
Identifying Your Group for AssignmentIdentify a disenfranchi.docxIdentifying Your Group for AssignmentIdentify a disenfranchi.docx
Identifying Your Group for AssignmentIdentify a disenfranchi.docxalanrgibson41217
 
Identifying and communicating effectively is required. Choose an org.docx
Identifying and communicating effectively is required. Choose an org.docxIdentifying and communicating effectively is required. Choose an org.docx
Identifying and communicating effectively is required. Choose an org.docxalanrgibson41217
 
Identify your earliest exposure to people who were racially or cul.docx
Identify your earliest exposure to people who were racially or cul.docxIdentify your earliest exposure to people who were racially or cul.docx
Identify your earliest exposure to people who were racially or cul.docxalanrgibson41217
 
Identify your earliest exposure to people who were racially or c.docx
Identify your earliest exposure to people who were racially or c.docxIdentify your earliest exposure to people who were racially or c.docx
Identify your earliest exposure to people who were racially or c.docxalanrgibson41217
 
Identify two U.S. criminal justice system policy development agencie.docx
Identify two U.S. criminal justice system policy development agencie.docxIdentify two U.S. criminal justice system policy development agencie.docx
Identify two U.S. criminal justice system policy development agencie.docxalanrgibson41217
 
Identify two types of assessments discussed in the textbook, andor .docx
Identify two types of assessments discussed in the textbook, andor .docxIdentify two types of assessments discussed in the textbook, andor .docx
Identify two types of assessments discussed in the textbook, andor .docxalanrgibson41217
 
identify two projects in which you have been involved recently.1.docx
identify two projects in which you have been involved recently.1.docxidentify two projects in which you have been involved recently.1.docx
identify two projects in which you have been involved recently.1.docxalanrgibson41217
 
identify three internet service businesses. they can be organization.docx
identify three internet service businesses. they can be organization.docxidentify three internet service businesses. they can be organization.docx
identify three internet service businesses. they can be organization.docxalanrgibson41217
 
Identify three diseases related to homeostatic instability within th.docx
Identify three diseases related to homeostatic instability within th.docxIdentify three diseases related to homeostatic instability within th.docx
Identify three diseases related to homeostatic instability within th.docxalanrgibson41217
 
Identify the three main domains of executive function and explai.docx
Identify the three main domains of executive function and explai.docxIdentify the three main domains of executive function and explai.docx
Identify the three main domains of executive function and explai.docxalanrgibson41217
 
Identify the telos of Erikson’s theory of human development. Compare.docx
Identify the telos of Erikson’s theory of human development. Compare.docxIdentify the telos of Erikson’s theory of human development. Compare.docx
Identify the telos of Erikson’s theory of human development. Compare.docxalanrgibson41217
 
Identify the scales of measurement for each variable.Ide.docx
Identify the scales of measurement for each variable.Ide.docxIdentify the scales of measurement for each variable.Ide.docx
Identify the scales of measurement for each variable.Ide.docxalanrgibson41217
 

More from alanrgibson41217 (20)

Identity and Attribution in Intercultural CommunicationPlease .docx
Identity and Attribution in Intercultural CommunicationPlease .docxIdentity and Attribution in Intercultural CommunicationPlease .docx
Identity and Attribution in Intercultural CommunicationPlease .docx
 
If a parent brought their son Ethan to your office who had a lot of .docx
If a parent brought their son Ethan to your office who had a lot of .docxIf a parent brought their son Ethan to your office who had a lot of .docx
If a parent brought their son Ethan to your office who had a lot of .docx
 
Identity ProfileThis assignment is a reflection and analysis.docx
Identity ProfileThis assignment is a reflection and analysis.docxIdentity ProfileThis assignment is a reflection and analysis.docx
Identity ProfileThis assignment is a reflection and analysis.docx
 
If a company’s CVP analyses showed it was not operating at break.docx
If a company’s CVP analyses showed it was not operating at break.docxIf a company’s CVP analyses showed it was not operating at break.docx
If a company’s CVP analyses showed it was not operating at break.docx
 
Identify an international police organization.Research at le.docx
Identify an international police organization.Research at le.docxIdentify an international police organization.Research at le.docx
Identify an international police organization.Research at le.docx
 
Identifyingand ManagingProject Risk................docx
Identifyingand ManagingProject Risk................docxIdentifyingand ManagingProject Risk................docx
Identifyingand ManagingProject Risk................docx
 
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docxIDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
IDS 400 Milestone Four Guidelines and Rubric Analyzing an .docx
 
IEP Team Members 10.0 Summary comprehensively and correctly id.docx
IEP Team Members 10.0 Summary comprehensively and correctly id.docxIEP Team Members 10.0 Summary comprehensively and correctly id.docx
IEP Team Members 10.0 Summary comprehensively and correctly id.docx
 
Identifying Your Group for AssignmentIdentify a disenfranchi.docx
Identifying Your Group for AssignmentIdentify a disenfranchi.docxIdentifying Your Group for AssignmentIdentify a disenfranchi.docx
Identifying Your Group for AssignmentIdentify a disenfranchi.docx
 
Identifying and communicating effectively is required. Choose an org.docx
Identifying and communicating effectively is required. Choose an org.docxIdentifying and communicating effectively is required. Choose an org.docx
Identifying and communicating effectively is required. Choose an org.docx
 
Identify your earliest exposure to people who were racially or cul.docx
Identify your earliest exposure to people who were racially or cul.docxIdentify your earliest exposure to people who were racially or cul.docx
Identify your earliest exposure to people who were racially or cul.docx
 
Identify your earliest exposure to people who were racially or c.docx
Identify your earliest exposure to people who were racially or c.docxIdentify your earliest exposure to people who were racially or c.docx
Identify your earliest exposure to people who were racially or c.docx
 
Identify two U.S. criminal justice system policy development agencie.docx
Identify two U.S. criminal justice system policy development agencie.docxIdentify two U.S. criminal justice system policy development agencie.docx
Identify two U.S. criminal justice system policy development agencie.docx
 
Identify two types of assessments discussed in the textbook, andor .docx
Identify two types of assessments discussed in the textbook, andor .docxIdentify two types of assessments discussed in the textbook, andor .docx
Identify two types of assessments discussed in the textbook, andor .docx
 
identify two projects in which you have been involved recently.1.docx
identify two projects in which you have been involved recently.1.docxidentify two projects in which you have been involved recently.1.docx
identify two projects in which you have been involved recently.1.docx
 
identify three internet service businesses. they can be organization.docx
identify three internet service businesses. they can be organization.docxidentify three internet service businesses. they can be organization.docx
identify three internet service businesses. they can be organization.docx
 
Identify three diseases related to homeostatic instability within th.docx
Identify three diseases related to homeostatic instability within th.docxIdentify three diseases related to homeostatic instability within th.docx
Identify three diseases related to homeostatic instability within th.docx
 
Identify the three main domains of executive function and explai.docx
Identify the three main domains of executive function and explai.docxIdentify the three main domains of executive function and explai.docx
Identify the three main domains of executive function and explai.docx
 
Identify the telos of Erikson’s theory of human development. Compare.docx
Identify the telos of Erikson’s theory of human development. Compare.docxIdentify the telos of Erikson’s theory of human development. Compare.docx
Identify the telos of Erikson’s theory of human development. Compare.docx
 
Identify the scales of measurement for each variable.Ide.docx
Identify the scales of measurement for each variable.Ide.docxIdentify the scales of measurement for each variable.Ide.docx
Identify the scales of measurement for each variable.Ide.docx
 

Recently uploaded

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Cybersecurity and Risk ManagementRESPOND TO THIS DISCUSSION 2 IN 150.docx

  • 1. Cybersecurity and Risk ManagementRESPOND TO THIS DISCUSSION 2 IN 150 WORDS The first article I found when I was browsing relating to risk management to cyber security paradigms will provide a useful backdrop for evaluating the current state of consumer protection in the cyber security environment. The initial paradigm for protecting ICT systems was based on a perimeter defense model. Security focused on tightly regulating the interchange of traffic between systems. Systems were kept closed by default and opened only by exception and under conditions of tight control. This approach to security matched operational norms at the time information systems were siloed these systems were not easily interoperable and thus did not generally exchange traffic. Under these conditions security risks were primarily internal rather than external. The Second article I noticed regarding cybersecurity is the adoption of a security by design principle and certification frameworks may make it easier to neglect individual users of the Internet in the ongoing efforts to improve cybersecurity. If security concerns can be abated by focusing efforts upstream, then there may be a perception that there is less need to worry about what consumers are doing downstream. The third article I found was the language used in many national cybersecurity strategies typically is robust, though non-specific. As the examples outlined above illustrate, there is a clear contemplation that individual consumers have a role to play in cybersecurity and possibly even public duties or responsibilities. Not but not least in the fourth article, I found that the program provides information about how home Internet users and small businesses can protect themselves online. It uses social media, a Web site, email alerts, and partnerships to deliver tips and information about cyber threats.
  • 2. RELATION BETWEEN CYBER SECURITY AND RISK MANAGEMENT The many consumers do not fully understand cyber security issues and do not bother to follow good cyber hygiene, there is a question whether the current consumer base will value a security certification. As indicated, the EC’s proposal for a certification framework does not contemplate mandatory compliance. The expectation is that achieving certification will give ICT service providers a competitive advantage, that is, that consumers will value the certification and thus be willing to pay more for a product or service that is verified. As an IT MANAGER, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company. As an IT Manager, I have to know whether there are any cutting-edge dangers and after that want to order the type of risks and organize them design and execute the preparations which assist to restrict the risks. References: · Miedema, T. E. (2018). ENGAGING CONSUMERS IN CYBER SECURITY. Journal Of Internet Law, 21(8), 3-15. · Schell, R. R. (2016). Cyber Defense Triad for Where Security Matters. Communications Of The ACM, 59(11), 20-23. doi:10.1145/3000606. · Alali, M., Almogren, A., Hassan, M. M., Rassan, I. A., & Bhuiyan, M. A. (2018). Improving risk assessment model of cyber security using fuzzy logic inference system. Computers & Security, 74323-339. doi:10.1016/j.cose.2017.09.011
  • 3. Milestone One: Early Bird Correction Agency 1 Milestone One: Early Bird Correction Agency 7 Milestone One: Early Bird Correction Agency Chelsea Clare Southern New Hampshire University CJ675 Introduction: Early Bird Correction Agency (EBCA) is based in the region of the Netherlands within Early Bird locality. Founded by the federal government, EBCA aims at providing chances to offenders by teaching them moral values. The institution
  • 4. ensures that individuals convicted do not revolve back to their previous activities. Measures are taken to train inmates to be financially stable after their jail term. EBCA has a capacity of 100 inmates and a fluctuating number of staff depending on their number of inmates. However, the number of staff is maintained at the ratio of 2 inmates to 1 warden. The major problem currently in EBCA is the overcrowding. In 2011, the facility had excess inmates. The number has been on the rise ever since. Thornberry’s theory affirms that the correctional facility leads to the breaking of social bonds (Lilly, et al., 2014). The friendship of the individual and other members of the society drops as they go through the delinquency. The bond with other wayward peers becomes stronger. Also, it has a mutual feedback on the behavior of the character. In other terms, the more the crime is committed, the more it alters his/her conduct. Generally, the theory elaborates the process of beginning and persistence of the felony. Additionally, the proposition provides the indication of how the process alters an individual's life stages. Under the new lifeline, the victim becomes unruly. From a study carried out, violent interactions indicate a minimum of 45 cases in 2016. Inmates encounter with staff in a disturbing manner show a minimum of 99 in the same year. Financial constraints lead an ex-convict to engage in crime. Agnew argues that the more an individual is strained the more changes of offending the law (Krohn & Lane, 2015). In EBCA, the increasing number of inmates can be associated with fiscal hardships hence opting for the misdeed. The facility should develop a mechanism that will offer the convicts a commercial resolution upon completion of the jail term. If the plan turns out positively, then the chances of the person reappearing in prison will be minimal. Assessing study, the community reports more incidences that require the attention of the Agency. The indication of the matter is that the economy of the area is performing poorly according to the theory. Generally, the challenge in EBCA is overpopulation. The
  • 5. mechanism employed should lead to a reduction of inmates. Mind education for the convicts will lead to the changed heart and hence changed life desires. Internees are to receive a motivating power that will help them overcome the desire for crime. Their mentalities should be open o the imagination of the greater good rather than the fulfillment of the immediate needs. Despite the efforts, the government may implement, the situation is not likely to change. Therefore, the institution should initiate a program that offers the inmates lectures aiming at changing their attitude. The law gives the president power to release some inmates basing on specific factors. For instance, an inmate that is remaining with a shorter jail period may receive the absolution. During the process, a limited number of jailbirds are exonerated. The amnesty is provided on a special occasion like the country’s Independence Day. President’s mercy over the prisoners is a more direct approach to reduce the number of internees. The convicts are offered short course training such as tailoring and carpentry so as to keep them engaged while in jail. This is aimed at ensuring that upon leaving jail, an individual comfortably set up a workshop offering a pathway for self- dependency. Exposure to religious teaching is intended to change their view respecting the law and order. If a convict is exposed to playing football and realizes that he/she is talented, chances are, they may want to pursue the talent instead of engaging in felon (Mooney, 2017). The community provides regulations that demand every individual to respect the law and order. In order to achieve the goal, youngsters are offered training that will see them grow up with the desired morals. As a result, the chances that the individual will engage in the vices are greatly reduced. In addition, the respect that is directed to the individuals that adhere to the law and order is meant to psychologically convince the youth that it is worthwhile to observe the policies of the land. The proposal majors on providing alternatives to
  • 6. crime. The inmates are compelled to respecting law and order. Prison education works with the same goal as the proposed method. Support for community policy structured to prevent recurrent of the crimes is the same way as the author's idea. Aspects to be considered during decision-making will be based on analysis carried out. SWOT analysis can be used to determine the verdicts that should be taken. Strength – the facility understudy is a government agency and hence it will be easy to formulate the policies that will govern the implementation. Furthermore, the government may offer the same education to schools to enhance its productivity. Weakness – the approach tends to cater for the future challenges but ignore the current problems. Therefore, the method may fail to resolve the issues being faced by the business in the present settings. Opportunity – the resource to implement the proposition are less. Furthermore, similar projects are already in existence. The main revenue required will be used to pay the lecturers. Threat – the project enhances creativity among the inmates. Should the individual perceive the resolution in a negative way before completion of the lectures, the situation may worsen. Literature review: Graph 1: Number of inmates and reported incidences vs. time The graph indicates that the number of inmates is constantly increasing. Factors of peer influence and financial constraints seem to be getting in a worse condition. Incidences reported increased with the increase in the number of inmates. When the inmates’ number is at maximum, the reported incidences tend to drop significantly. The occurrences denote that the individuals creating chaos are the ones in jail. Graph 2: number of police contact with victims vs. time As more residents land in prison, the disturbances are reduced greatly. The same individuals that are unruly in the correction
  • 7. agency bring about the individuals that cause disharmony. From the research conducted, many ex-convicts fail to secure jobs in the process of getting back their life. As a result of feeling stigmatized, they opt to associate with the wrongdoers. Also, the failure to smoothly fit the society makes the character angry and hence ends up delighting in crime. When the police confront an individual, they fail to comply and hence cause commotion. The research indicated humiliation that the ex- prisoners have met could alter the feeling of the individual (LeBel, et al., 2014). Before an inmate is allowed to leave the facility, he/she should have gained an open mind to create jobs. The social trait has to be tuned to accept dishonor from the society. The overflowing population within EBCA is mainly caused by limited knowledge in entrepreneur strategies and the social view of the ex-convict. After being released, the person does not have a clear mind of what they need to work on. As a result, a slight disappointment forms toward society, so he/she turns back to crime. The ideal solution is to educate the inmates to expect the worse reaction from the society. A new mindset should help them develop ideas and goals in life. Through the appropriate utilization of the program, few individuals will return to crime. Furthermore, the ex-prisoners will influence other people towards innovation and being independent. References: Bachman, R., & Schutt, R., (2017). The practice of research in criminology and criminal justice, Thousand Oaks, CA: Sage Publications Inc.
  • 8. Krohn, M. D., & Lane, J. (2015). The Handbook of Juvenile Delinquency and Juvenile Justice. Hoboken: John Wiley & Sons. LeBel, T. P., Richie, M., & Maruna, S. (2014). Helping Others as a Response to Reconcile a Criminal Past; The Role of the Wounded Healer in Prisoner Reentry Programs. Criminal Justice and Behavoir , 108-120. Lilly, J. R., Cullen, F. T., & Ball, R. A. (2014). Criminological Theory: Context and Consequences. Thousand Oaks: SAGE Publications. Mooney, T. E. (2017). Ready or not: employment, re-entry and the lasting effects of stigma after incarceration. Memorial University Research Repository . Total Inmates 2009.0 2010.0 2011.0 2012.0 2013.0 2014.0 2015.0 2016.0 94.0 94.0 101.0 111.0 125.0 125.0 130.0 130.0 Reported Incidents 2009.0 2010.0 2011.0 2012.0 2013.0 2014.0 2015.0 2016.0 206.0 198.0 204.0 222.0 249.0 252.0 255.0 144.0 Disturbance contact 2009.0 2010.0 2011.0 2012.0 2013.0 2014.0 2015.0 2016.0 151.0 150.0 154.0 163.0 180.0 171.0 177.0 99.0 Violent contact 2009.0 2010.0 2011.0 2012.0 2013.0 2014.0 2015.0 2016.0 55.0 48.0 50.0 59.0 69.0 81.0 78.0 45.0 Use of Force Complaints 2009.0 2010.0 2011.0 2012.0 2013.0 2014.0 2015.0 2016.0 6.0 5.0 5.0 8.0 16.0 14.0 16.0 12.0 Cybersecurity Risk ManagementRESPOND TO THIS DISCUSSION 1 IN 150 WORDS
  • 9. Cybersecurity can be defined as a set of techniques and methodologies that are used to protect the data and assure their integrity from cyber attacks like damage, unauthorized and so on. Risk management on other hand is techniques used to reduce the risk which comes from taking any new steps towards the development of an organization. The cyber attacks occurring to data in organizations are directly proportional to increase in cybersecurity risk management. For enabling the risk management for data that is prone to cyber attacks first we need to understand which data is needed to be protected from going to hands of intruders. Even though National Institute of standards and security sets some standards but different organizations has its own data security risks and different technology infrastructures. Cybersecurity is mainly required for protecting organizational sensitive data on which the growth of organization relies on, there are many categories of cyber threats which are formed in a daily basis but following are some generic terminology cyber terrorism, cyber warfare, Cyber-espionage. In cyber terrorism the terrorist group's spy on information which leads to national security issues and cyber warfare can be a cyber threat where company information is stolen by other or a nation is stealing the information of other company and cyber espionage is storing the information of the owners or the managers by subordinates Following the CMM approach, the risk management can be done in following levels. Initial, Repeatable, Defined, Managed, and Optimizing. These levels are followed by many risk management services like Deloitte, HP enterprise, Coal Fire and more of these services provide some better mechanism for protecting sensitive data of an organization. Cybersecurity is interrelated to risk management. Whenever there is a threat to data security and integrity both the cybersecurity and risk management need to work together to provide complete security to sensitive data of an organization.
  • 10. It just takes cybersecurity related issues and matches it to real- world risk management ways so that effective solution can be formed. As an IT manager, initially, I would check whether there are any threats to my data, and if running an organization, I would definitely face data threats as mentioned so I will apply the risk management services that are provided by HP, KMPG and many other services depending on the severity of data threat and after applying these services I would check to maintain cybersecurity to prevent cyber-crimes relating to data theft. References: Cybersecurity Risk Management. (n.d.). Retrieved April 18, 2018, from https://galois.com/project/cybersecurity-risk- management/ P. (2017, March 30). Cybersecurity Risk Management: Finding and Fixing Your Security Vulnerabilities. Retrieved April 18, 2018, from https://www.esecurityplanet.com/network- security/cybersecurity-risk-management.html What is cyber security? (n.d.). Retrieved April 18, 2018, from https://www.itgovernance.co.uk/what-is-cybersecurity Write 300 words on topic of Cyber Security and Risk Management Read Four (4) academically reviewed articles on Cyber Security and Risk Management and complete the following activities: (Wikipedia articles will not be accepted. Professor may check originality of all posts. Avoid copy-and-paste. 1. Summarize all four (4) articles in 300 words or more. Please use your own words. No copy-and-paste 2. Base on your article review and the assigned reading, discuss the relationship between cyber security and risk management. 3. As an IT manager, discuss how you will use the concepts
  • 11. discussed in the four articles in the management of IT risks within your company. Please use APA throughout. Post your initial response no later than Friday of week 5. Please note that initial post not completed on the due date will receive zero grade. See class syllabus for late assignment policies. Review posting/discussion requirements. Read and respond to at least two (2) of your classmates’ posts. In your response to your classmates, consider comparing your articles to those of your classmates. Below are additional suggestions on how to respond to your classmates’ discussions: · Ask a probing question, substantiated with additional background information, evidence or research. · Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives. · Offer and support an alternative perspective using readings from the classroom or from your own research. · Validate an idea with your own experience and additional research. · Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings. · Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.