Tuesday, June 18, 2019
Protocols and Policy to Secure Software Essay Example | Topics and Well Written Essays - 2000 words
Protocols and Policy to Secure Software - Essay ExampleThis invasion is d unity for the express purpose of taking gain of the weaknesses that can be found in the software by the hacker and is usually done for monetary gain (Vacca, 2009). There are a soma of measures that throw off been taken as a result to try and prevent this sort of interference by hackers and a number of cyber security standards have been developed with the aim of improving the level of protection that is avail able to this market. Cyber Security Standards Cyber security standards can be defined as the various established standards of security that have been set up by a number of bodies involved in the computer industry to assist organizations in the practice of safe techniques regarding security so as to reduce the number of in(predicate) attacks on their cyber security systems and if possible negate them altogether (Kontoghiorghes, 2006). The latter aim may prove to be effortful as hackers have become adep t at countering the various measures that have been set up to keep them out and thus it considered to be a free burning process whereby weaknesses are identified, exploited and then fixed and improved by the organizations. The security standards have however have gone a long dash in improving the level of security that is practiced by organizations and can be tell to have provided guidelines on the best way to protect ones companion form cyber security attacks. These standards provide organizations with certain techniques and outlines that they can implement to enhance their cyber security. Some certain standards offer organizations that have been able to successfully implement the outlines and techniques that they have set out official cyber security certification that shows the companys achievements. The certification is done by an accredited body that looks into the company before deciding whether they have reached the required level of success in their implementation to acqu ire the certification (Sipser, 2006). This certification holds a number of advantages for organizations that are able to acquire it such as enabling the company to easily acquire insurance policies on cyber security (Wong & Yeung, 2009). This is especially important in todays technology market considering the high number of hacking incidents that take place on an almost daily basis and the sizable economic risk that comes with the potential of successful hacking attempts (Sipser, 2006). The loss of information can lead to a huge hit on an organizations financial status and thus insurance on this risk has become a necessary endeavor for many large organizations. Popular Cyber Security Standards There are various standards that are available to organizations scarcely some of the more popular cyber security standards include ISO 27002 This can be considered to be a high standards guide to achieving cyber security for organizations and can be said to be the most popular cyber security standards that is currently available in the market (Kontoghiorghes, 2006). The standard actually incorporates parts of BS 7799 good
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.