Site icon Eminence Papers

On-Demand Economy – Cyber Security

On-Demand Economy – Cyber Security

In today’s world, innovations and technologies are controlling the rate at which enterprises are carrying out their business activities. The on-demand economy is one of the latest technologies, mainly focusing on how an enterprise can provide its services and goods to its customers whenever they need them (Shapiro, 2018). Developing a 24/7 service delivery would increase production and upgrade trust and reliability, which is a key competitive strength in the market. The evolution of mobile and the Internet of things has brought in a lot of vulnerabilities that affect enterprises if not well managed (Shapiro, 2018).

Cybersecurity

Cyber security, which mainly deals with information privacy and security, is a technical task that is carried out by the information technology department (Tirumala, Valluri,  & Babu, 2019). Its success is not guaranteed without support from the senior management in an organization or enterprise; they are responsible and accountable in case a data breach occurs. An attack causes a business to stop its operations and incur additional costs in recovering them. Advanced cybersecurity measures would ensure a business or enterprise is well equipped in incident response business continuity, and disaster recovery.

Cybersecurity Methodologies and Solutions

Who is responsible for cybersecurity? All the people in an enterprise responsible for securing data and systems are the employees, the IT department, and the senior management. Cybersecurity is implemented through the use of hardware, software, procedures, policies, and standards (Schreider, 2019). Security is dynamic as there are always new vulnerabilities and attack methods and patterns revealed each day. A cybersecurity program is a laid-out plan on how to carry out processes and activities to be carried out in case an incident occurs to ensure business continuity (Schreider, 2019).

To ensure that the top management implements a good cybersecurity program, risk analysis is evaluated. The enterprise assets are classified according to their value. The next step is finding out the vulnerabilities present and their level of impact in case a threat happens. From the evaluation of the value of an asset, the probability of an attack happening, and the extent of the impact a threat can cause the senior management can choose the level of security for each asset (Tirumala, Valluri,  & Babu, 2019). The following are some of the measures for cybersecurity: Access control, Intrusion detection systems (IDS), Intrusion prevention systems (IPS), Antiviruses and antimalware software, Rogue app monitoring, and remote wipe capability (Turban, Pollard, & Wood, 2018).

Intrusion Detection Systems (IDS)

This is a cybersecurity system that scans and monitors a network or systems to detect or identify any malicious activity and alerts the user of the attacks (Eskandari et al., 2020). After an attack is detected the security team can perform the incident response process to identify the culprits, contain the attack, and ensure recovery and business continuity. An IDS can be deployed in the network or at a particular host. IDS uses the following mechanism to detect an attack:

  1. Anomaly detection – based on comparison with known normal processes
  2. Signature detection – based on attack patterns and fingerprints
  3. Hybrid detection – combines both anomaly and signature-based detections

An IDS supplements the cybersecurity programs by ensuring when the measures are bypassed an alert is raised.

Conclusion

A cybersecurity program must have support from senior management and be enforced and implemented evenly in an enterprise. Vulnerabilities and attack patterns keep on changing; thus an enterprise needs to be well-equipped with incidence response and business continuity plans. Security needs to be applied to all areas to rate it as maximum. Each technology has its benefits but with it are some vulnerabilities that need to be controlled through a cybersecurity program and measures.

References

Eskandari, M., Janjua, Z. H., Vecchio, M., & Antonelli, F. (2020). Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet of Things Journal7(8), 6882-6897.

Schreider, T. (2019). Building an effective cybersecurity program. Rothstein Publishing.

Shapiro, A. (2018). Between autonomy and control: Strategies of arbitrage in the “on-demand” economy. New Media & Society20(8), 2954-2971.

Tirumala, S. S., Valluri, M. R., & Babu, G. A. (2019, January). A survey on cybersecurity awareness concerns, practices, and conceptual measures. In 2019 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-6). IEEE.

Turban, E., Pollard, C., & Wood, G. (2018). Information technology for management: On-demand strategies for performance, growth, and sustainability. John Wiley & Sons.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


One of the responsibilities placed on managers in today’s On-Demand Economy is that of ensuring that the business processes are held to a high degree of cybersecurity. Because the concept of data-on-demand is an operational necessity that places the enterprise’s and customers’ resources at risk of potential fraudulent hacks, all employees, including those that sit in the loftiest of office spaces, must be trained, made aware of the various methods and practices that can lead to vulnerabilities, and held to very high standards of compliance with standard cybersecurity practices.

On-Demand Economy – Cyber Security

The growth of mobile technologies and the IoT have played a significant role in the On-Demand Economy environment. A downside to the proliferation of such technologies is the cracks and doors into the corporate and agency networks that have been opened along the data path, allowing for an increased level of black hat intrusions and reconnaissance.

Case Study Assignment
Download the APA Style Template (DOCX) Download APA Style Template (DOCX) and review the Case Study Requirements section.

Conduct research on various methodologies and solutions relating to the implementation of effective cybersecurity programs that may be utilized to thwart outside-agency attacks on an enterprise’s networks. Your approach here should be to seek out scholarly source data relating to examples of the various cybersecurity measures that top management and IT departments might provide for employees and contractors, including data access enforcement, network intrusion detection, and prevention systems, and real-time responses to incidents and attacks. You could focus your research on any one of the various types of defenses such as anti-malware applications, Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs), biometric access, rogue app monitoring, mobile kill switch, or remote wipe capability technologies.
Case Study assignments require you to analyze real-world information systems topics and provide examples that illustrate how prominent businesses and organizations implement the theoretical concepts you are studying. Case Study assignments provide a broader, integrated, critical thinking process that helps you to expand on and clarify your understanding of the information systems topics.

Research
Be sure to conduct in-depth research on the topics and provide factual details obtained from primary sources that support the case that you are making.

Exit mobile version