Fundamentals of Information Security- Risk as a Foundation of Cybersecurity
Title: Fundamentals of Information Security: Risk as a Foundation of Cybersecurity
Author: Melissa Parsons
Publication Date: December 8, 2023
Summary
This article expounds on the criticality of information security in today’s complex digital era. Protecting digital assets has become more complicated because of the increased cyber threats that confront organizations. The article also argues that organizations should not rely exclusively on traditional antivirus software and password policies but must implement holistic information security approaches integrating people, processes, and technology.
Additionally, the article defines information security as ‘the practice of preserving information in all its forms and aspects ensuring it’s used only by authorized individuals’. It highlights the main requirements for keeping the information confidential, integral, and available. Further, information security involves protecting information from unauthorized access through physical means or logical systems.’ The article gives a historical perspective on information security and cybersecurity from when computer networks were started until today. It outlines how physical safeguards have been replaced by advanced ones and what has changed concerning cybersecurity principles.
Further, Parsons, M (2023) presents key concepts in terms of the CIA Triad, including confidentiality, integrity, and availability as groundwork for securing practices according to controls. Finally, in her work, Parsons suggests that qualitative measurement techniques should be brought into line with quantitative ones in order to achieve a more robust security posture based on risk analysis and risk management.
Application in Day-to-Day Activities
This article has many practical uses in daily activities related to information security. It provides insights into the changing cybersecurity environment, the importance of basing risks on them, and basic principles of security. Consequently, various information protection professionals will find valuable tips on how to better safeguard their digital assets and most effectively mitigate cyber threats.
Application to Organizations
The relevance of this article extends beyond individuals to organizations of all sizes. Much emphasis is provided on the need for holistic information security strategies involving people, processes, and technology. This implies that there is a need for companies to align their security postures as well as prioritize cyber-security issues with reference to business goals by using the principles discussed herein.
Challenges
I agree with the information presented in the article; however, the challenge with it is the limited discussion on emerging threats. The article, while discussing the history and present-day practices related to cybersecurity, does not go into depth about new threats and changing attack surfaces. Since the cyber security environment is always changing, it would help if information was included about new emerging threats that organizations should know about.
.References
Parsons, M. (2023, December 8). Fundamentals of Information Security: Risk as a Foundation of Cybersecurity. C-Risk Blog. https://www.c-risk.com/blog/fundamentals-information-security
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions with your classmates. Be substantive and clear, and use examples to reinforce your ideas.
Review an article that focuses on the fundamentals of information security. In addition to reviewing the article, discuss the implication of the article against the security posture of the organization. Take this opportunity to describe and discuss the following points about the chosen article:
Article name, author, and publication information
Summary of the article
How can the article be applied in your day-to-day activities regarding information security?
How can the article apply to organizations, not just individuals?
Describe any challenges that you see with the article. Do you agree with all of the information that was presented in the article?