Topic 7 DQ 2 200-250 words max
Need in about 12 hours
Compare and contrast the differences between the concepts of cybersecurity, information assurance, and risk management. Where in the security industry would each concept apply? What are the pros and cons of each? If your school or organization were to adopt one concept, which should it be? Why?
Reply to responses 75-100 words. Need by tomorrow
Grand Canyon University’s Bachelor of Science in Risk Management software prepares graduates for a destiny profession running in chance control and insurance. Created through the Colangelo College of Business, this software turned into created to assist college students to acquire jobs in chance, insurance, company finance, and banking. Upon completing this chance control degree, graduates may be capable of identifying, examining, and controlling dangers inside an organization. Offered online, this software is constant with GCU’s venture to expand novices who are international citizens, crucial thinkers, powerful communicators, and accountable leaders (Bachelor of science in risk management program 2022). Cyber protection, records guarantee, and hazard control are comparable in that they all deal with protective facts; however, they are extraordinary when applied. Cybersecurity focuses on stopping and protecting in opposition to assaults and unauthorized use of pc structures, together with networks, programs, and facts. Information guarantee is the self-assurance that records structures will carry out as wished while wished and be reachable for legal customers only. Risk control is as capability threats are identified, analyzed, and evaluated to decide what type of movement, if any, must be taken. IN the safety enterprise, Cybersecurity belongs everywhere; there is a steady overwatch. Preventing and protecting in opposition to assaults is an ongoing battle that calls for full-time attention. Information guarantee is worried everywhere that there may be facts that wish to be accessed. This entails more excellent reliability of access. Risk control belongs as attention in all protection aspects. We determine which assaults are credible and the number of hazards we can incur with hazard control. With this, we will decide what movement to take. Not all assaults require an identical quantity of attention. The professionals and cons of Cybersecurity are that protecting our facts is extraordinarily important. I do now no longer see a con with this idea. Information guarantee has the seasoned of assuring that our facts are reliable. To me, the con appears that it is far less likely than Cybersecurity. Risk control has the season of supporting withinside the opinions of decisions and their impact. This can also be considered as a con because of being caught in over-selection loops. Instead of you deciding, corporations get caught withinside the evaluation and by no means make a selection. If my corporation had undertaken an idea, it would be Cyber Security. Cyber Security appears greater lively and evolving than the opposite two ( Floridatechonline.com 2016).
Cyber security, information assurance, and risk management are all concerned with the protection of data, but they are used in very diverse ways. Cybersecurity is concerned with preventing and fighting against assaults on computer systems, such as networks, programs, and data. Information assurance refers to the belief that information systems will work as expected when they are needed and will only be available to authorized users. Risk management is the process of identifying, analyzing, and evaluating possible dangers to determine what form of action if any, should be taken. Cybersecurity belongs anywhere there is a requirement for ongoing monitoring in the security business. Preventing and defending against assaults is a never-ending struggle that demands complete focus. Anywhere there is data that has to be accessible, information assurance is involved. This entails a higher level of access dependability. Risk management should be taken into account in all facets of security. We decide whether assaults are credible and how much risk we will take using risk management. With this information, we can decide what course of action to take. Not every attack demands the same level of concentration. The benefits and drawbacks of cybersecurity are that protecting our data is critical. I don’t see any disadvantages to this concept. The benefit of information assurance is that it ensures the accuracy of our data. To me, the disadvantage appears to be less active than cybersecurity. Risk management has the advantage of assisting in decision assessments and their consequences. Due to getting locked in excessive decision cycles, this can also be considered a disadvantage. Instead of making a choice, businesses become trapped in the evaluation process and never make one. Cyber Security would be the notion that my company would adopt if it had to choose one.
Florida Tech Online. (2020). Cybersecurity vs. Information Assurance. https://www.floridatechonline.com/blog/information-technology/cybersecurity-vs-information-assurance/
Cybersecurity, information assurance, and risk management are all concepts of data protection, but they way they protect data is different. Cybersecurity works by preventing assaults against the company by ensuring that systems are up to date and configured correctly. Additionally, this is in charge of monitoring the network for current attacks. Information assurance ensures that data is only accessed by those who need it and that the data will be accurate. Risk management looks at current vulnerabilities and compromised systems to determine if the level of risk is acceptable for operations. For example, if there is a security alert risk management looks at if the company should shut down systems or if it likely a false alarm. If my school or organization was to adopt one concept, I would recommend adopting at least a little bit of all of them. There are many pros to each, so it makes sense to adopt them all, as cybersecurity assists in looking out for attacks, information assurance looks out for data usage, and risk management can make hard decisions to the best of the companies ability.
4. Ethan (different)
There are a wide variety of computer forensics tools, some being more comprehensive and built for enterprise customers, while other tools are entirely free. The gold standard of computer forensics tools for companies is EnCase. This tool covers almost any computer forensic investigation with keyword & email searches, web scraping, etc. and is capable of analyzing mobile devices all the way up to enterprise networks. The next forensics tool is Mandiant Redline, which is free file and memory analysis software from FireEye. It can perform custom scans for IOCs (Indicators of Compromise). The next tool is ForensicToolKit by AccessData. This tool is known for its easy usability, being relatively cheap, and process automation. Finally, the last tool is Xplico. This is an open source tool used for network analysis of applications using internet protocols (Poston, 2021). For someone who is curious about the topic and wants to explore various tools, I would recommend free options like Mandiant Redline and Crowdstrike’s Heartbleed scanner. For enterprise usage, I would recommend EnCase as a well-rounded forensics tool.
Poston, H. (2021, January 8). Popular Computer Forensics Top 19 Tools [updated 2021]. Infosec Resources. Retrieved February 17, 2022, from https://resources.infosecinstitute.com/topic/computer-forensics-tools/