Benefits of Using Cybersecurity Term Paper

Total Length: 1693 words ( 6 double-spaced pages)

Total Sources: 5

Page 1 of 6

Benefits of Using Cyber-attack Simulator Systems

There is evidence that demonstrates that using simulations is far much better than the education that is provided by real-world experiences. Simulations have been used in numerous industries to teach and test people, and their usage in cybersecurity could be beneficial. Simulating a cyber-attack is easier than having to test the attack in the real world. Having a simulation of the potential cyber-attacks, one can easily test the system to establish how effective the security strategies implemented are and if there are any vulnerabilities in the system. Also, attacking your own system in order to test it for vulnerabilities is foolish and might result in prison time as has been the case for some individuals. Therefore, the easiest and safe way for testing the system is by using a simulation. Simulation allows for the demonstration of what might happen if an organization does not take cybersecurity seriously (Kuhl, Kistner, Costantini, & Sudit, 2007). By using simulation, one can be able to simulate an attack on the organization's systems to the top management and this would demonstrate to them how ineffective the security systems used within the organization are. Attacking the systems in a simulation and not telling the top management that it is a simulation would ensure that they would experience the defects of not having proper cybersecurity in place. This way the IT department can get the buy-in and support from the top management in regards to cybersecurity. The third benefit is that there is ease of scalability when using a simulator system. This means that the person running the simulator can expand and contract the resource pool in order to accommodate heavier or lighter loads as per user requirements without having to incur huge costs. Since this would be a simulation, it is easier to incorporate events that had not been earlier foreseen into the simulation as it is running and it would not have any adverse effects. This would also allow for the testing of the system as the simulation is going on and new inputs can be provided.

Greater Insight on The Potential of Cyber-attacks

The public sector has greater insight on the potential of cyber-attacks. This is based on the fact that the public sector has been pushing for the implementation of various security measures by the public sector especially the military.
The private sector has drawn less attention when it comes to cyberattacks mainly because most companies are unwilling to invest and they deem the costs as too heavy. Therefore, whenever there is a cyber-attack within the private sector, it is mostly covered up in order to protect the interests of the shareholders. The public sector, on the other hand, is better placed to understand the potential of cyber-attacks and is already implementing strategies to protect against such attacks (Kundur, Feng, Liu, Zourntos, & Butler-Purry, 2010). The Pentagon has noted the effects that a cyber-attack would have on its systems and has made attempts to have its agencies not rely on Microsoft software because they have deemed it less secure and prone to attacks. A case in point is when the Windows NT system that was administering the computers used on the U.S.S. Yorktown crashed. This could have spelled doom for the military had this happened during a critical mission. Understanding the impact that a cyber-attack would have on a country, the public sector has made attempts to implement legislation the requires private sector companies to take cybersecurity seriously. However, this has been fought by most companies and they prefer to maintain the status quo. The public sector is not motivated by profits, which makes it easy for the sector to support and implement cybersecurity programs. The public sector is also looked upon to ensure that the nation is secure and this requires that they keep abreast of the latest happenings around the globe in regards to cybersecurity. In doing this they can uncover numerous attempts and insights than the private sector.

Best Practices when Developing a Cybersecurity Strategy

The four best practices that should be implemented when developing a cybersecurity strategy are the detection of insider threats, backing up of data, educating and training users, and updating software and systems. Detection of insider threats entails monitoring user activity to ensure that there is no unauthorized activity or behavior. User accounts should also be monitored in order to verify user actions are not violating the security policy (Bailey, Minto-Coy, & Thakur, 2017). In most instances, insider threats will mostly go undetected, and they are extremely costly because the user can gain access to sensitive data that can cost the organization. The IT function….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Benefits Of Using Cybersecurity" (2017, October 13) Retrieved April 18, 2024, from
https://www.aceyourpaper.com/essays/benefits-using-cybersecurity-2166181

Latest MLA Format (8th edition)

Copy Reference
"Benefits Of Using Cybersecurity" 13 October 2017. Web.18 April. 2024. <
https://www.aceyourpaper.com/essays/benefits-using-cybersecurity-2166181>

Latest Chicago Format (16th edition)

Copy Reference
"Benefits Of Using Cybersecurity", 13 October 2017, Accessed.18 April. 2024,
https://www.aceyourpaper.com/essays/benefits-using-cybersecurity-2166181