Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Reply to Cybersecurity and Risk Management Discussion 1

Description

Reply to Cybersecurity and Risk Management
Discussion 1
Q – Please read the discussion below and prepare a Reply to this discussion post with
comments that further and advance the discussion topic.
Please provide the references you used.
Ensure zero plagiarism.
Word limit: 200 words
Discussion
Cybersecurity and Risk Management
Cybersecurity refers to the discipline dedicated to protecting information and systems that are used
to store it from unauthorized access, attacks, or damage by cybercriminals. Today, cyberspace is
witnessing increased cybercrimes from malicious individuals. These cybercrimes pose a significant
risk to businesses because they can lead to data breaches and losses (Turban, Pollard & Wood,
2018). Therefore, managers are taking caution by establishing strong cybersecurity programs for
their businesses.
The current state of cybercrime
Currently, cybercrime has been on the rise. According to Monteith et al. (2021), cybercrime has
increased since the covid-19 pandemic. It is estimated that about 800,000 cybercrime incidents are
reported every year because there is increased use of technology in the world (Monteith et al.,
2021). As a result, criminals take advantage of the current situation to hack, steal information, and
compromise the systems of internet users. Some companies like Yahoo experienced serious security
breaches to the point of being given the medal of the worst cyber hacks in history (Turban, Pollard &
Wood, 2018). In the US alone, 1093 data breach incidences were reported in 2016, which was a 40%
increase from the previous year (Turban, Pollard & Wood, 2018). Even big technology companies like
Microsoft and Google have experienced cyber attacks in the past, implying that no one is immune to
cybercrime.
How this cybercrime current state concerns me as a business manager
As a business leader, one ought to be concerned with the current cybercrime state. The manager is
responsible for the cybersecurity of the business (Turban, Pollard & Wood, 2018). Therefore, with
the increase in cybercrimes, the managers have a reason to be worried because the blame is on
them for not establishing a strong cybersecurity system to keep attackers at bay. Although managers
may not be tech-savvy, they make decisions regarding the organization’s security. As a result, it is
upon the manager to assemble a team of experts and provide the resources that will protect the
organization’s digital assets and systems.
Importance of frameworks, standards, and models to a manager’s cybersecurity program
Standards, frameworks, and models are crucial for cybersecurity defense. For instance, frameworks
like the enterprise risk management and the COBIT 2019 frameworks help the organization manage
cyber risks and govern the IT infrastructure. On the other hand, industry standards are established to
provide security to customers by preventing cybercrimes. A good example is the Payment Card
Industry Data Security Standard (PCI DSS) used by credit card companies to ensure the security of
users’ data. There are also models like the defense-in-depth model that managers use to provide
multi-layered security for their IT systems and prevent the likelihood of breaches when attacked.
Can frameworks, standards, and models keep an organization safe?
Yes, the frameworks, standards, and models can help in keeping the organization safe from cyberattacks and threats. They help control access to the IT systems, keeping unauthorized users at bay.
Additionally, they increase the level of security in the systems, minimizing data loss and damage to
the IT assets in the event of cyber attacks. Therefore, any organization that wants to keep itself safe
should consider implementing the frameworks, industry standards, and models in their
cybersecurity programs.
In conclusion, cybercrime is on the rise and this is a concern for business managers because they are
responsible for the cybersecurity of their businesses. Businesses are expected to have frameworks,
standards, and models that can help keep their information systems secure. Therefore, managers
who want to improve their cybersecurity systems should adopt the right frameworks, establish the
appropriate standards, and design models that will provide multi-layered security.
References
Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing
cybercrime since the pandemic: Concerns for psychiatry. Current Psychiatry Reports, 23, 1-9.
Turban, E., Pollard, C., & Wood, G. (2018). Information technology for management: On-demand
strategies for performance, growth and sustainability. John Wiley & Sons.

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Research & Summaries Question

Description (( PLEASE USE YOUR OWN WORDS AND WRITE THE REFERENCE)) (( PLEASE CHECK THE ATTACHED FILE AND FOLLOW THE INSTRUCTIONS CAREFULLY )) (( PLEASE NO PLAGIARISM )) (( Please use APA 7th edition )) ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education

Research & Summaries Question

Description (( PLEASE USE YOUR OWN WORDS AND WRITE THE REFERENCE)) (( PLEASE CHECK THE ATTACHED FILE AND FOLLOW THE INSTRUCTIONS CAREFULLY )) (( PLEASE NO PLAGIARISM )) (( Please use APA 7th edition )) ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 1 Public Management (MGT 324) Due Date: 4th October 2025 @ 23:59 Course Name:

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 1 Public Management (MGT 324) Due Date: 4th October 2025 @ 23:59 Course Name:

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Public Management (MGT324) Due Date: 01/11/2025 @ 23:59 Course Name: Public Management Course

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Public Management (MGT324) Due Date: 01/11/2025 @ 23:59 Course Name: Public Management Course

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment-3 MGT324-Public Management Due Date: End of week 13, 6th of December@, 23:59) Course Name:

Management Question

Description I don’t want a solution copied from another student’s paper. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment-3 MGT324-Public Management Due Date: End of week 13, 6th of December@, 23:59) Course Name:

9 SOLVE new

Description Students’ assignmentWrite a review on one of the following Saudi Public Health policies including analysis of the policy, challenges and achievementsFormat:– word file named by student’s name8-12 pages including cover page (with title and name of student)Font size: 12 Times New Roman– 1.5-line spaceNormal margins– Similarity index: total :

Writing Question

Description The assignment example is attached, so please read it carefully, if you can’t help me in this assignment research in this different course, it’s ok. but the most important point is that you can deliver it on time and understand it very well to give me perfect answer as

Electrical Engineering Question

Description I have two files containing course syllabi, and I want you to match the courses that are equivalent to courses in the other file because I want to transfer (equate) the courses at the university.Since I studied Biomedical Engineering and would like to transfer to the Electrical Engineering department,

King Faisal 3

Description See Innovative Nursing Care Delivery Model Paper For this assignment, you must look up INNOVATIVE (new or recent) nursing care delivery models and use them as a guide to answer the following questions, each question serving as a subtitle: 1. Identify innovative care delivery models 2. Enumerate on the

i want ppt husain

Description 12 slides without plagiarism, covering the topic shown in the image and marked in green. The solution must be correct and include some images and scientific references. Group distribution & topics Group’s members 1-FAISAL AL HUTAYLAH 2-ABEER AL JABIR 3-AMAL AL SHALWAN Group’s topic 1. the steps before a

i want ppt husain

Description 12 slides without plagiarism, covering the topic shown in the image and marked in green. The solution must be correct and include some images and scientific references. Group distribution & topics Group’s members 1-FAISAL AL HUTAYLAH 2-ABEER AL JABIR 3-AMAL AL SHALWAN Group’s topic 1. the steps before a

i want ppt husain

Description 12 slides without plagiarism, covering the topic shown in the image and marked in green. The solution must be correct and include some images and scientific references. Group distribution & topics Group’s members 1-FAISAL AL HUTAYLAH 2-ABEER AL JABIR 3-AMAL AL SHALWAN Group’s topic 1. the steps before a

MGT430 – FINAL REPORT AND PRESENTATION

Description I HAVE FINAL REPORT AND PRESENTAION TO BE SUBMIT IT. I WILL UPLOAD FIRST, SECOND AND THIRD REPORT I HAVE BEEN DONE. FROM THOSE REPORT DO THE FINAL REPORT ”WORD” AND PRESENTATION ”POWERPOINT” AS INSTURCTED. PLEASE FOLLOW THE INSTRUCTION. IF YOU NEED ANY QUESTION ABOUT THE FACILTY OR MY

Decision Making and Problem Solving (MGT 312)

Description I want the answer for Q 1 and 8 For Q1 the answer from EBSCO file 100 word for Q 8 the answer you can take the idea from the file i sent and write less than 100 word please use simple words HBR’s fictionalized case studies present problems