Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Task1:words:300I took : CYBER SECURITY AND RISK MANAGEMENT(please write on this) Pick a topic related to this course that interests you

Task1:words:300I took : CYBER SECURITY AND RISK MANAGEMENT(please write on this) Pick a topic related to this course that interests you

Computer Science

Task1:words:300I took : CYBER SECURITY AND RISK MANAGEMENT(please write on this)

Pick a topic related to this course that interests you. As a starting point you might review the weekly headings of the 15 previous weeks in Moodle. You can also find additional topics in the book, or even online, but remember your topic must be closely related to Management Information Systems. While Hilary Clinton's infamous server is MIS related, bashing her about it is not a relevant topic!

Write at least 3 paragraphs on the topic you choose, explaining why you chose it and the importance of it in MIS.

Task2:words:500

Please list and describe four types of Cyber crime.

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Ki-sush CL Discussions

Task 1: Words: 300

Topic: Cyber Security and Risk Management

I chose this topic since it is an exciting topic, and it is analogous with Management Information Systems (MIS). Instead of vaults, doors, and locks, Information Technology (IT) depend on a blend of strategies, user tutelage and technology to safeguard a firm against cybersecurity threats that can aggravate systems, pinch data and other valued company details, and destroy a firm’s stature (Kure et al., 2019). As the severity and volume of cyber threats grow, the necessity for cybersecurity risk management develops with it. Cybersecurity risk management assumes the concept of actual world risk management and employs it in the virtual world. It pertains to identifying your vulnerabilities and risks and employing administrative deeds and complete solutions to ensure your enterprise is sufficiently safeguarded.

Several organizations do not keep a continuing review procedure of their cybersecurity risk following undertaking an initial Cybersecurity Risk Assessment. This action can prompt a false feeling of security as a result of the initial assessment and any phases undertaken to fortify security. However, as indicated above, the attack landscape and the threat surface got progressively transforming. According to Ganin (2020), Cybersecurity Risk Management need to be progressive to keep protections. Additional aspects beyond the transforming danger landscape also impact prevailing cybersecurity risk planning. Laws get frequently transformed, or new ones instituted. The dangers connected with the transformations should get assessed, and cybersecurity procedures and policies transformed to guarantee acquiescence.

The importance or significance of Cyber Security and Risk Management in Management Information Systems got connected with Information Security Risk Management (ISRM). ISRM is the procedure of managing, assessing and evaluating risks around the company’s valuable details. It tackles unreliability around those benefits to guarantee the coveted business results get attained. They are got diverse approaches to control risk. One size does not suit all, and not all risk is substandard. Risks do generate chances too. Nevertheless, the most frequent is attack-focused.

Task 2: Words: 500

Cybercrime is nix but crimes that can be done using the computer web, computers or other kinds of Information Communication Technology (ICT). Four kinds of cybercrimes are spam and phishing, malware, Denial of services attacks, and identity theft.

Spams and Phishing

Most of the individuals have their inboxes bestrewed with spam emails. While having an efficient anti-virus safeguard fixed in their computer will frequently check the viruses that these often carry, these do not frequently permanently destroy their computer. On the other hand, Phishing is an approach where cyber culprits will bait you into revealing the information they desire (Lallie et al., 2021). For example, an individual could obtain a mail from Tata Motors saying that you have won something immense and to pick your gift, they should fill in your particulars. Once you undertake, the cyber culprits will then acquire access to all your confidential details and can proceed to utilize them. To avert this from occurring, do not react to emails from persons or company’s which offer weird rewards by challenging detailed particulars.

Identity-theft

You might have received messages and emails from your registered bank, requesting you to never share details concerning your bank information through public or text email because in all probability, appeals for the same are spam. Besides the fact that, high-handed hackers who invade these networks will eventually manage to acquire all your private details. These include basic details like you age and identification, and as the number of your account number, PAN card, and more. Afterwards, these hackers can utilize these details and dissimulate to be you to acquire into several branches. There got two approaches to avert this (Lallie et al., 2021). First, do not reveal your private bank and other safeguarded particulars on public sites. Second, while logging into your bank, guarantee the communication is safe by substantiating the address starts with “https” instead of “http”-this implies your link to the site is tight.

Cyberstalking

Good books and movies have got grounded on the risks of cyberstalking, particularly in India. In this period of public sharing and social media, individuals tend to verbalize more than they ought on available platforms, which is dangerous to their security. As a result of this extensive nature of the internet, incidences of persons utilizing the platform for online harassment-be it for carnal nature or else-have, arose fourfold around the globe. Lallie et al. (2021) assert that to safeguard yourself from this, guarantee that the most effective interactional platforms you utilize daily have exceptional security settings and attempt to maintain your lists to the familiar as much as possible. Nevertheless, this is not sufficient to eliminate all opportunities of cyberstalking, given emanating from somebody in your instant social circles.

Malware

Malware cites diverse types of viruses, Worms, Trojans, and additional harmful operating system that clamp to your computer without you appreciating their existence. Probably one of the most usually implemented cybercrimes in India, malvertising occurs when cyber culprits place baleful promotions on the websites without the appreciation of the latter (Lallie et al., 2021). To circumvent suspicion, they even exhibit clean adverts for a specific period, after which these get restored with malverts. Once ticked, baleful code gets downloaded onto the gadget. Frequently, the intruded websites do not even acknowledge that they got hindered by cybercriminals, in the light of the latter is to guarantee to axe these malverts from the site once they have attained their targets. The aforementioned is one the speedy growing forms of cyber-crimes around the globe, and particularly in India. To eschew it, you ought to download ad-blocker on your personal computer and create a conscious attempt to not click on skeptical-looking ad-links.

Ki-sush CL Discussions Outline

Task 1: Words: 300

Topic: Cyber Security and Risk Management

  • I chose this topic since it is an exciting topic, and it is analogous with Management Information Systems (MIS).
  • Several organizations do not keep a continuing review procedure of their cybersecurity risk following undertaking an initial Cybersecurity Risk Assessment.
  • The importance or significance of Cyber Security and Risk Management in Management Information Systems got connected with Information Security Risk Management (ISRM).

Task 2: Words: 500

  • Cybercrime is nix but crimes that can be done using the computer web, computers or other kinds of Information Communication Technology (ICT).
  • Four kinds of cybercrimes are spam and phishing, malware, Denial of services attacks, and identity theft.

Spams and Phishing

  • Most of the individuals have their inboxes bestrewed with spam emails.
  • While having an efficient anti-virus safeguard fixed in their computer will frequently check the viruses that these often carry, these do not frequently permanently destroy their computer.

Identity-theft

  • You might have received messages and emails from your registered bank, requesting you to never share details concerning your bank information through public or text email because in all probability, appeals for the same are spam.
  • Besides the fact that, high-handed hackers who invade these networks will eventually manage to acquire all your private details.

Cyberstalking

  • Good books and movies have got grounded on the risks of cyberstalking, particularly in India.
  • In this period of public sharing and social media, individuals tend to verbalize more than they ought on available platforms, which is dangerous to their security.
  •  As a result of this extensive nature of the internet, incidences of persons utilizing the platform for online harassment-be it for carnal nature or else-have, arose fourfold around the globe.

Malware

  • Malware cites diverse types of viruses, Worms, Trojans, and additional harmful operating system that clamp to your computer without you appreciating their existence.
  • Probably one of the most usually implemented cybercrimes in India, malvertising occurs when cyber culprits place baleful promotions on the websites without the appreciation of the latter.