Cyber Security and Risk ManagementRead at least two (2) academically reviewed articles on Cyber Security and Risk Management and complete the following activities:(Wikipedia articles will not be accep

Week 5 Discussion

by Sai Ram Kudupudi - Saturday, May 30, 2020, 5:58 AM

 

Article Summary

Analysis of information security risk is an increasingly important component of the processes of the organization. Common risk analysis of information security is a method of quantitative and qualitative analysis. Qualitative and quantitative approaches to assessing the information risk take some benefits. The hierarchy method was commonly used in safety assessment, however. Risk analyzes form the basis for information defense and risk in the information protection process. The method of evaluating risk for information security is an essential prerequisite for achieving empirical and successful risk assessment (Lee, 2014, pp. 29-32).

Active cyber risk management would contain the usage of insurance not only to pass cyber risk but also to provide covered companies with opportunities to capitalize on cyber self-sustainability. This paper proposes the Cyber Risk Scoring and Mitigation method to tackle this issue, which estimates cyber-attack probabilities by explicitly tracking. A significant aspect of cyber risk management is the relationship between buying insurance and the amount in self-protection the insured receives. In other words, by encouraging lower insurance costs, the insured invests more in mitigating the insured risk (Shetty, McShane, & Zhang, 2018, pp. 1-3).

Relationship

Cybersecurity risk management is an activity that any organization needs to look after to protect its critical assets in the business. Risk management also promotes the cybersecurity field to avoid cyber-attacks on corporate networks that could compromise valuable assets of companies. Cybersecurity risk management is an activity that any organization needs to look after to protect its critical assets in the business. Risk management also promotes the cybersecurity field to avoid cyber-attacks on corporate networks that could compromise valuable assets of companies. Risk management is the process of any company that cybersecurity risk management experts define the essential risks and, in fact, develop a plan to address these risks. The risk management plan for cybersecurity is based on various factors like corporate culture, critical pieces of information, cybersecurity framework, etc. To the companies, proactive monitoring of cybersecurity risk management is also beneficial.

 I have learned several articles related to risk management and cybersecurity. Apply this concept to the business with proper manners. Security plays the most important role in all types of business organizations. Because without security, the business data cannot be secure from the attackers.

 References

Lee, M.-C. (2014). Information security risk analysis methods and research trends: AHP and fuzzy comprehensive. International Journal of Computer Science & Information Technology, 6(1), 29-32. Retrieved from http://airccse.org/journal/jcsit/6114ijcsit03.pdf

Shetty, S., McShane, M., & Zhang, L. (2018). Reducing informational disadvantages to improve cyber risk management. Reducing Informational Disadvantage, 1-3. Retrieved from https://web-oup.s3-us-gov-west-1.amazonaws.com/showc/assets/File/CIRI_Shetty_Reducing%20Information%20Disadvantages%20to%20Improve%20Cyber%20Risk%20Management(1).pdf