preview

Essay On How To Reduce Cyberch In National Security

Better Essays

SYSTEMS AND CONTROLS TO REDUCE CYBERCRIMINALITY AND A BREACH IN DATA SECURITY
a) Systems and controls to reduce a risk of cyber attacks
There are a number of actions recommended to prevent or reduce cyber attack risk.
1. Determine the Company’s Security Chain
The company’s entire security chain needs to be determined and evaluated. If even a single link is weak, the company could be vulnerable to attack.
2. Develop a Compliance Work Plan
A company should create a written compliance plan to monitor the highest risks for a potential cyber attack. The compliance plan must address cyber attack procedures in addition to other compliance matters. This should include: „
• Policies
• Codes of conduct
• Training
• Specific incident response …show more content…

6. Invest in Computer Security and Protection Measures
The company should invest in security equipment and procedures to deter or prevent cyber attacks. These include the most up to date IT protection measures, for example: „
• Having the company’s database on a different web server than the application server
• Applying the latest security patches„
• Protecting all passwords„
• Using read-only views of documents and materials when possible „
• Maintaining strict input validation „
• Developing network security architecture „
• Monitoring activities and procedures of third-party contractors with access to the computer system (whether direct or remote) „
• Performing network scans to assess activity on the network „
• Comparing outbound network traffic to baseline operations „
• Choosing names for tables and fields that are difficult to guess

7. Adopt a Cyber Incident Response Plan and Employee Reporting Mechanisms
The company must adopt reporting mechanisms so that all cyber attack attempts can be promptly responded. All employees should be aware of the possibility of cyber attacks and where such attacks are most likely to be directed within the company.
8. Adopt Procedures to Preserve Evidence
A company should have procedures in place to secure and preserve computer-related evidence if a

Get Access