Cybersecurity: Protecting Networks, Systems & Data From Digital Attacks - Essay Sample

Paper Type:  Essay
Pages:  4
Wordcount:  975 Words
Date:  2023-03-09
Categories: 

Introduction

Cybersecurity entails the practice of protection of networks, systems as well as other important programs from the digital attacks. The attacks are normally focused on changing, accessing or even destroying the sensitive information, interrupting the business processes or extorting money from the users. Cybersecurity is essential since it helps the government, corporate, military, and financial and also the medical organization in collection, processing and storage of the data on computers as well as other devices (Kapucu, 2012). A basic cybersecurity plan is an essential tool for the organizations seeking to protect their employees, customers and corporate information. Besides, the plan enables the IT in communicating effectively about how the capability of the cybersecurity is positioned within an organization.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Purpose Statement

The purpose of the plan is to ensure proper cybersecurity in protecting all internet users against possible frauds. In this case, effective risk compliance or the governance function need to help an organization in the identification of what needs to be protected as well as how best to go about it. The cybersecurity plan helps in the detection, identification and also response to the workloads within any given system. The main goal is to achieve the visibility on the servers, networks and endpoints and also ensure that all tools work to deliver their intended role. The Comprehensive Emergency Management Plan (CEMP) in this case is involved in providing the framework and guidance throughout the phases of the emergency management in cybersecurity.

Scope of Threat or Hazard

In the cybersecurity, CEMP applies primarily to all the major organization's sites. In such an instance, the unit emergency plans are required for the sites and always work with the partner agencies in providing the needed support in the emergencies that affect various important operations in all the locations (Ross, 2007). This plan addresses the management of the emergency's preparedness, recovery, response as well as mitigation operations and various emergency functions undertaken by the identified departments, divisions and the emergency and incident management teams. The basic plan describes the framework for the response, preparedness and mitigation of various activities relating to the cybersecurity urgencies. The Emergency Operations Plans (EOPs) will evaluate on the various hazards and threats particular to every organization as well as the special requirements in effecting the emergency operations in the face of the threats as well as the high priority hazards in the cybersecurity.

Situation Overview

Basing on the hazard and threat analysis and also the risk consequence assessment in the field, the emergency management has come up with the following areas to manage the cybersecurity. This includes the hazard or threat identification, risks or vulnerability assessment and finally, the assessment of the consequence of the threat. The consequences assessment involves the measurement of the threat's effects across several functional areas or the core capabilities and also across the varying severity levels. The hazards or threats in cybersecurity are measured and identified across the several sets and the intensity grades risk in the determination of the exposure to risk. This is done based on; current state, the historical probability of the occurrence which incorporates the frequency of the occurrence. Supporting and enhancing the environmental conditions is also another case which includes the human-made conditions that may enhance or support the cybersecurity occurrence probability (County, 2006). The hazards, as well as threats identified within the state and federal emergency management's agencies, will be included and also appropriately weighted as access to resources from the state, regional or federal entities may be slowed down in case the cybersecurity emergency is broad-reaching.

The assessment of the consequences have to be performed against each risk exposure for the identification of the scope repercussions in the field and whose weights are done as per the severity and scope as well as range from impact to resources, i.e. infrastructure and facilities. All the sites with no specific hazard and threat analysis as well as the assessment of the consequence will defer to the county assessment and analysis. In Florida institutions take a holistic approach in managing the emergencies through preparedness and protection, response, recovery, mitigation and prevention efforts (Agencies, 2018).

Planning Assumptions

There are planning assumptions that are considered in the development of the Comprehensive Emergency Management Plan (CEMP). They include the following:Timing and escalation: in this case, the emergency might occur with little or no warning and rapidly escalate affecting an organization's technological infrastructure, operations and core-mission areas.

The critical utilities of institutions, communications and infrastructure systems are likely to be interrupted and extended for periods.

The events' succession is not predictable as there is a variation in the disaster especially in character by magnitude severity, distribution, frequency and probability hence increasing the plan development difficulty. Hence the s CEMP in Florida together with other plans devised before the time of the case will primarily serve as a guide and hence may need modifications to meet specific emergency circumstances.

With the management of the cybersecurity emergencies, the insecurities in the regional, national or international impacts of operations, including the personnel under various organizations will need enhanced significant coordination with the external entities.

References

Agencies, L. (2018). Emergency support annexe (ESF)# 13 public safety and security annex coordinator (Doctoral dissertation, Evergreen State College).

County, S. (2006). Emergency Management Plan. The city of Eldorado. http://www.sanjuandem.net/About/PDFs/SAN%20JUAN_CEMP.pdf

Harrison, J. P., Harrison, R. A., & Piermattei, H. J. (2008). The role of emergency medical planning in disaster response. International Journal of Public Policy, 3(5-6), 354-365. https://www.fau.edu/emergency/pdfemergency/FAU%20CEMP%20-%20Basic%20Plan%20-%20signed%202018.pdf

Kapucu, N. (2012). Disaster and emergency management systems in urban areas. Cities, 29, S41-S49. https://www.sciencedirect.com/science/article/abs/pii/S0264275111001387

Ross, K. L., & Bing, C. M. (2007). Emergency management: expanding the disaster plan. Home Healthcare Now, 25(6), 370-377. https://journals.lww.com/homehealthcarenurseonline/Abstract/2007/06000/Emergency_Management__Expanding_the_Disaster_Plan.5.aspx

Cite this page

Cybersecurity: Protecting Networks, Systems & Data From Digital Attacks - Essay Sample. (2023, Mar 09). Retrieved from https://proessays.net/essays/cybersecurity-protecting-networks-systems-data-from-digital-attacks-essay-sample

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism