Thursday, November 21, 2019

Protocols and Policy to Secure Software Essay Example | Topics and Well Written Essays - 2000 words

Protocols and Policy to Secure Software - Essay Example This invasion is done for the express purpose of taking advantage of the weaknesses that can be found in the software by the hacker and is usually done for monetary gain (Vacca, 2009). There are a number of measures that have been taken as a result to try and prevent this sort of interference by hackers and a number of cyber security standards have been developed with the aim of improving the level of protection that is available to this market. Cyber Security Standards Cyber security standards can be defined as the various established standards of security that have been set up by a number of bodies involved in the computer industry to assist organizations in the practice of safe techniques regarding security so as to reduce the number of successful attacks on their cyber security systems and if possible negate them altogether (Kontoghiorghes, 2006). The latter aim may prove to be difficult as hackers have become adept at countering the various measures that have been set up to keep them out and thus it considered to be a continuous process whereby weaknesses are identified, exploited and then fixed and improved by the organizations. The security standards have however have gone a long way in improving the level of security that is practiced by organizations and can be said to have provided guidelines on the best way to protect one’s company form cyber security attacks. These standards provide organizations with certain techniques and outlines that they can implement to enhance their cyber security. Some certain standards offer organizations that have been able to successfully implement the outlines and techniques that they have set out official cyber security certification that shows the company’s achievements. The certification is done by an accredited body that looks into the company before deciding whether they have reached the required level of success in their implementation to acquire the certification (Sipser, 2006). This certification ho lds a number of advantages for organizations that are able to acquire it such as enabling the company to easily acquire insurance policies on cyber security (Wong & Yeung, 2009). This is especially important in today’s technology market considering the high number of hacking incidents that take place on an almost daily basis and the sizable economic risk that comes with the potential of successful hacking attempts (Sipser, 2006). The loss of information can lead to a huge hit on an organization’s financial status and thus insurance on this risk has become a necessary endeavor for many large organizations. Popular Cyber Security Standards There are various standards that are available to organizations but some of the more popular cyber security standards include; ISO 27002 This can be considered to be a high standards guide to achieving cyber security for organizations and can be said to be the most popular cyber security standards that is currently available in the mar ket (Kontoghiorghes, 2006). The standard actually incorporates parts of BS 7799 good

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.