Introduction
Cybersecurity entails the practice of protection of networks, systems as well as other important programs from the digital attacks. The attacks are normally focused on changing, accessing or even destroying the sensitive information, interrupting the business processes or extorting money from the users. Cybersecurity is essential since it helps the government, corporate, military, and financial and also the medical organization in collection, processing and storage of the data on computers as well as other devices (Kapucu, 2012). A basic cybersecurity plan is an essential tool for the organizations seeking to protect their employees, customers and corporate information. Besides, the plan enables the IT in communicating effectively about how the capability of the cybersecurity is positioned within an organization.
Purpose Statement
The purpose of the plan is to ensure proper cybersecurity in protecting all internet users against possible frauds. In this case, effective risk compliance or the governance function need to help an organization in the identification of what needs to be protected as well as how best to go about it. The cybersecurity plan helps in the detection, identification and also response to the workloads within any given system. The main goal is to achieve the visibility on the servers, networks and endpoints and also ensure that all tools work to deliver their intended role. The Comprehensive Emergency Management Plan (CEMP) in this case is involved in providing the framework and guidance throughout the phases of the emergency management in cybersecurity.
Scope of Threat or Hazard
In the cybersecurity, CEMP applies primarily to all the major organization's sites. In such an instance, the unit emergency plans are required for the sites and always work with the partner agencies in providing the needed support in the emergencies that affect various important operations in all the locations (Ross, 2007). This plan addresses the management of the emergency's preparedness, recovery, response as well as mitigation operations and various emergency functions undertaken by the identified departments, divisions and the emergency and incident management teams. The basic plan describes the framework for the response, preparedness and mitigation of various activities relating to the cybersecurity urgencies. The Emergency Operations Plans (EOPs) will evaluate on the various hazards and threats particular to every organization as well as the special requirements in effecting the emergency operations in the face of the threats as well as the high priority hazards in the cybersecurity.
Situation Overview
Basing on the hazard and threat analysis and also the risk consequence assessment in the field, the emergency management has come up with the following areas to manage the cybersecurity. This includes the hazard or threat identification, risks or vulnerability assessment and finally, the assessment of the consequence of the threat. The consequences assessment involves the measurement of the threat's effects across several functional areas or the core capabilities and also across the varying severity levels. The hazards or threats in cybersecurity are measured and identified across the several sets and the intensity grades risk in the determination of the exposure to risk. This is done based on; current state, the historical probability of the occurrence which incorporates the frequency of the occurrence. Supporting and enhancing the environmental conditions is also another case which includes the human-made conditions that may enhance or support the cybersecurity occurrence probability (County, 2006). The hazards, as well as threats identified within the state and federal emergency management's agencies, will be included and also appropriately weighted as access to resources from the state, regional or federal entities may be slowed down in case the cybersecurity emergency is broad-reaching.
The assessment of the consequences have to be performed against each risk exposure for the identification of the scope repercussions in the field and whose weights are done as per the severity and scope as well as range from impact to resources, i.e. infrastructure and facilities. All the sites with no specific hazard and threat analysis as well as the assessment of the consequence will defer to the county assessment and analysis. In Florida institutions take a holistic approach in managing the emergencies through preparedness and protection, response, recovery, mitigation and prevention efforts (Agencies, 2018).
Planning Assumptions
There are planning assumptions that are considered in the development of the Comprehensive Emergency Management Plan (CEMP). They include the following:Timing and escalation: in this case, the emergency might occur with little or no warning and rapidly escalate affecting an organization's technological infrastructure, operations and core-mission areas.
The critical utilities of institutions, communications and infrastructure systems are likely to be interrupted and extended for periods.
The events' succession is not predictable as there is a variation in the disaster especially in character by magnitude severity, distribution, frequency and probability hence increasing the plan development difficulty. Hence the s CEMP in Florida together with other plans devised before the time of the case will primarily serve as a guide and hence may need modifications to meet specific emergency circumstances.
With the management of the cybersecurity emergencies, the insecurities in the regional, national or international impacts of operations, including the personnel under various organizations will need enhanced significant coordination with the external entities.
References
Agencies, L. (2018). Emergency support annexe (ESF)# 13 public safety and security annex coordinator (Doctoral dissertation, Evergreen State College).
County, S. (2006). Emergency Management Plan. The city of Eldorado. http://www.sanjuandem.net/About/PDFs/SAN%20JUAN_CEMP.pdf
Harrison, J. P., Harrison, R. A., & Piermattei, H. J. (2008). The role of emergency medical planning in disaster response. International Journal of Public Policy, 3(5-6), 354-365. https://www.fau.edu/emergency/pdfemergency/FAU%20CEMP%20-%20Basic%20Plan%20-%20signed%202018.pdf
Kapucu, N. (2012). Disaster and emergency management systems in urban areas. Cities, 29, S41-S49. https://www.sciencedirect.com/science/article/abs/pii/S0264275111001387
Ross, K. L., & Bing, C. M. (2007). Emergency management: expanding the disaster plan. Home Healthcare Now, 25(6), 370-377. https://journals.lww.com/homehealthcarenurseonline/Abstract/2007/06000/Emergency_Management__Expanding_the_Disaster_Plan.5.aspx
Cite this page
Cybersecurity: Protecting Networks, Systems & Data From Digital Attacks - Essay Sample. (2023, Mar 09). Retrieved from https://proessays.net/essays/cybersecurity-protecting-networks-systems-data-from-digital-attacks-essay-sample
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Rationale for the Accounting Software Program
- Cybercrime: Local to Global Essay Example
- Essay Example on Data Storage: A Life Saver for Hurricane Prone Areas
- Essay Example on Online Dating: Seeking Long-Term Relationships?
- Essay Example on Former Hackers Hired: Ethical Controversy or Opportunity?
- Identity in Virtual World
- Essay Sample on Microcontrollers: Specialized Computers for Specific Purposes