Cybersecurity Assignment Technology and Trend Monitoring
The ever-evolving information communication technologies together with innovative services and applications are shaping the society of the future. Internet of Things, Software-Defined Networks, 5G mobile communication technologies, transformation of enterprise systems into cloud-based systems and other emerging trends are bringing about a paradigm shift to the functional and operational aspects of ICT overall.
In this context, you are expected to write an industry-style report on the current and emerging technologies related to your selected topic on IT Systems that is enabling the connected future. The report should address the following questions:
- As a reflective practitioner, you will write an abstract for an academic paper or an executive summary for a business report. This summary states your starting proposition.
- Conduct independent research and synthesise literature from wide array of sources on your selected IT systems topic. This research should include related theory and practice or technical focus. There should be no less than 3 sources. The media should include electronic references e.g. iLEARN eLibrary publications, Google Scholar, etc. that are current. Additionally, up-to-the-minute sources should be used e.g. news feeds, government regulations.
- Once the research data has been collected a critical review of the existing literature conducted to form an independent opinion. Data triangulation highlights the issues and identifies strengths and weaknesses related to the topics.
- The next stage of the analysis is to critically evaluate the emerging technological trends and identify potential challenges. Open areas of research should be addressed in this section by synthesizing (combining your knowledge trends to work towards predictions) ideas generated by the analysis.
- Impact analysis of the existing and emerging technologies on future trends is the focus
of this section. Related technology can be integrated into the argument from topics
- Communication technology e.g. long-range LTE and 5G and / or short-range NFC and ZigBee
- Cyber security e.g. Biometrics, homomorphic encryption
- Big Data and Analytics
- Internet of Things
- Augmented Reality
- Cloud Computing E.g. Distributed and Utility Computing
- Summary Discussion - Through a demonstration of clear understanding of technological advancement, suggested solution(s) and / or approaches to existing challenges are presented and linked to the threads of the arguments presented in previous sections. Predictions developed through the secondary research literature review analysis, trend and impact review can be offered with conclusions and recommendations.
References – The answers, claims or conclusions put forward in each section of this report or academic paper must be supported by evidence in the form of Harvard references or a real-world example (case study) that can be verified. Document format, spelling and grammar check must be done.
1. Executive summary for business report
The present study on cybersecurity assignment has emphasized on the importance of cybersecurity along with highlighting its relevant aspects that are used by different industries and the organisations. Cybersecurity has been signified as it tends to encompass each and everything, which pertains for safeguarding the sensitive data. On the other hand, the personal information; data of intellectual property and the information system of industry and government are also protected while prevention through the damage (Adamson et al., 2018, p. 1080). The cybersecurity assignment has outlined the works of literature relying on cybersecurity highlighting its management; use in recent days and challenges associated with it. It has been evidenced in the cybersecurity assignment that the breaches of cybersecurity might also cause reputational damage.
Consisting of a lack within faith in the security for the affected business, the customers are much more inclined to venturing elsewhere while resulting in a loss for profits and sales in organizations affected by a security breach or manhandling of data through inefficient IT systems. Several articles outlining the different facets of cybersecurity has been studied and critiqued while preparing this cybersecurity assignment, to explain the threats related to cybersecurity and issues in managing the same. The strengths and limitations of cybersecurity have been critiqued and stated in the research, to demonstrate the difference in views among different researchers, regarding cybersecurity. The critique reveals that there are certain ways through which the cyber threats can infect the victim’s computer where some of the common can be the sharing of files; websites and similar others.
The emerging trends of technology have been considered next in the present discussion, which has also been known to manage the trends in risk. The popularity of emerging trends explains how IT systems are expected to change in the coming years. All these trends can help in mitigating the challenges related to cybersecurity threats (Alavi et al., 2016, p. 730). The disadvantages related to these trends have also been mentioned in the cybersecurity assignment while outlining the impact based on the emerging trends and technology for cybersecurity. This indicated that scourge for cybercrime that affects the organisations across most of the industries and has also been developed within one of the greatest threats that are faced by the organisations. Based on the ventures of cybersecurity, cybercrime might cost around a global economy of $6 trillion per year within the year of 2021. The present section of the study has evaluated the trends of technologies affecting cybersecurity, which involved governance framework along with the password-less authentication within the growth of the trends, which can impact security, risk leaders and privacy as well. Discussion on the emerging trends as well as the potential challenges to the implication of the same, within a business as well as other scenarios, has enriched the study on cybersecurity assignment and helped in comprehending the impact that the IT systems excise on the operations within any business organization.
2. The independent research along with synthesized literature from the wide array of sources on Cybersecurity along with relevant theory and practices
As stated by Awolusi et al., (2018, p. 100) within this cybersecurity assignment, cybersecurity is referred to as the technological body along with its practices and processes which are designed for protection of the devices; networks; data and programs through damage; attack and unauthorised access as well. Cybersecurity can also be considered as information technology security. It holds a great significance due to the military; government; financial; corporate and the medical organisations which tend to gather the processes along with storing the unprecedented data within the computers as well as similar other devices. An important portion based on the present data might be sensitive information besides being an intellectual property; personal information; financial data and similar other data for which the unauthorized access can lead to some of the negative consequences. Most of the organisations are found to transmit the sensitive data over the networks as well as other devices for performing business along with the cybersecurity to describe the dedicated discipline for protecting the information along with the systems that are used for storing it.
Management of cybersecurity
It has been evidenced by Bakhtinet al., (2017, p. 2075) in regards to the case scenario of cybersecurity assignment, that the National Cyber alliance of security through SafeOnline.org recommends an approach of top-down for cybersecurity where the corporate management tends to lead with a charge based on the prioritization of the management in cybersecurity over the business practices. According to the advice of NCSA, the organisation needs to be prepared for responding towards the inevitable incident of cybersecurity; restoration of normal operations along with ensuring the assets of the organisation along with its reputation which is protected. The guidelines of NCA to conduct the assessments for cyber risk tends to emphasize within the three areas such as identification of organisational crown jewels for the most valuable information that requires protection; outlining the organisational damage that might incur lost data and the identification of threats facing the information. Hence, it is identified in the cybersecurity assignment that the risk assessments of cybersecurity need to consider the regulations which are found to impact the organisational processes for storing; collecting as well as securing the data like HIPAA; PCI-DSS and similar others.
Modern use of cybersecurity
In recent days, as opined by Bunn et al., (2018, p. 503), people make use of the internet for advertising along with selling the products within different forms while communicating with the retailers and customers. This also considers performing some of the financial transactions. Cybersecurity generally aims in protecting the networks; computers; software programs through the cyber-attacks. This point noted in this section of cybersecurity assignment indicates that cybersecurity holds more significance for the modern society as it impacts for improving the cyber speed. This happens due to the probable threats of cybersecurity for the system like any kind of virus or rather the malware, which ends up in stealing the important information, however, while reducing the speed based on the systems. This helps the organisations to ensure the safety of their data through the attacks related to the external and internal actors. This might encompass the processes; technologies, practices and structures which are used for protecting the networks, programs, computers along with the data from any of the unauthorised damage.
Cybersecurity consists of critical information and data which the organisations cannot afford to lose (Cao et al., 2018, p. 515). While considering the hackers, most of the organisations are known to be defenceless over these attacks. When employees become aware of its significance, they can perform in their way for completion of their part for achieving security for the organisation. According to a survey of cybersecurity in the year of 2018 considered in this segment of cybersecurity assignment, it has revealed that 43% of the businesses along with 19% of the charities within UK have been suffered through cyber attacks. The frequent activity of cybercriminals has been sending some of the fraudulent emails along with impersonating the organisations for being online. This has identified in the cybersecurity assignment that malicious emails were the common type of cyber attack within the threat report. The employees who make use of cybersecurity needs to protect the data while making use of stronger passwords authentication and connecting for securing the wi-fi. This also enables the firewall protection within both home and work (Chen and Yi, 2019, p. 555). A comprehensive awareness of security programs tends to set some of the clear expectations for the employees using cybersecurity, which can educate the users regarding the way to recognise the attack vectors while helping to prevent the incidents related to cybersecurity along with the response for a potential threat.
Challenges related to cybersecurity
To implement an effective system of cybersecurity, an organisation should coordinate with its efforts based on its overall information system. The biggest challenge with cybersecurity has been the ever-evolving nature based on the security risks. It has been evidenced in the cybersecurity assignment that the government and the organisations are mostly emphasized within their resources of cybersecurity within the perimeter security for protecting their significant components of the system along with defending against the known threats. In recent days, the approach is known to be insufficient as the threats are found to change and advance more quickly than the organisations might keep up with (Cunningham et al., 2018, p. 2060). This leads to advisory organisations for promoting more adaptive and proactive approaches for cybersecurity. Accordingly, the National Institute of Standards and Technology has issued the guidelines within its framework of risk assessment, which recommends a shift for constant monitoring along with the real-time assessments with an approach focussed on data for the security to be opposed for the traditional model based on the perimeter.
The global cyber threat has continued evolving within a rapid pace while arising with a number for data breaches in each year. It has been evidenced in the cybersecurity assignment that the retailers; medical services and public entities have experienced the most breaches involving malicious criminals who have been responsible for different incidents. However, these sectors are found to be more appealing for the cybercriminals as they gather medical and financial data and nevertheless, all the businesses make use of the network, which might be targeted regarding the customer data; customer attacks and corporate espionage.
The respective challenges related to cybersecurity can be mitigated through the implementation of MTD Systems Theory, which relies upon the concept of a configurable system that is generally defined as per the parameters of configuration (Dias and Paulo Silva Cunha, 2018, p. 2414). These parameters are known to be used for capturing the notion of the units, which is referred to as the configurable system, which might control and is also formalised as a pair. This theory outlined in the cybersecurity assignment helps in capturing the policies and goals for the system being the essential elements.
3. A critical review of the existing literature and forming the independent opinion as well as highlighting the issues and identification of weaknesses and strengths
Strengths and weaknesses of cyber securities
There are several types of cybersecurity, which are utilised by the organisations and their employees to secure the data.
As stated in the cybersecurity assignment, this aims in protecting the private information of the users through unauthorized access while identifying the theft. This tends to protect the privacy for hardware and data, which can handle the store along with transmitting the same. For instance, this involves cryptography and user authentication. However, according to Duan et al., (2018, p. 815), as the technology has been changing every day, nothing might be secured completely. When a user misses a particular area, which needs to be protected, the security of the whole system can be compromised. This can result in being extremely complicated along with the users who might not understand their dealing.
This generally aims for protecting the software along with the applications through the vulnerabilities, which can occur because of the flaws within the application installation; design; maintenance phases and development as well. While making use of application security, it can also lead to certain shortcomings such as identification of the rules can become difficult, systems can lead to difficulty and block access for different sites. All these can create extreme complications for using this cybersecurity within the organisations.
This is known to aim for protecting the integrity; usability as well as safety of the networks that are related with the shared data; components for the network (Ena et al., 2016, p. 1041). It has been observed in the cybersecurity assignment that when a network is secured, the potential threats tend to get blocked to enter within the network. For instance, antivirus along with antispyware programs and the firewall which blocks the unauthorized access for the network as well as VPNs which are used for securing the remote access. On the other hand, this type of cybersecurity can also result in having difficulty as the firewalls can become complicated for leading to correct configuration and this can eventually block the users from performing several actions within the internet as the firewall configured correctly. This needs to be kept updating for new software for keeping the security updated.
Issues in managing cybersecurity
The threats of cybersecurity continue to evolve and grow. The cybersecurity assignment considered the words of Haak et al., (2017, p. 70) that the trusted identities are found to combat the particular threats being a part of the holistic, which can combine the authentication of multi-factor; physical identity and credential management, which are eventually supported through the real-time profiling technology of risk along with the digital certificates while bringing trust within the internet.
The top risks of cybersecurity with trusted identities to provide critical protection includes fighting frauds, securing IoT and several similar such aspects.
As per the investigation on cybersecurity assignment, the recent solutions of risk management make use of the trusted identities along with the analytics for protecting the transaction systems as well as sensitive applications. The employment of a combination of the evidence-based capabilities, the machine learning and behavioural biometrics helps the organisation for detecting phishing along with the fraudulent transactions. However, it is considered to be impossible for humans to keep up the pace with exponential rates where the transactions have been made within the space of e-commerce.
This indicates the digital certificates for adding trust within IoT and has been a core component to combat the risks of cybersecurity (Haaket al., 2017, p. 580). The trusted services of cloud are also used for the unique issue while the digital IDs for the devices which have been ranging through the mobile phones; video cameras; tablets along with building the systems of automation for the medical equipment and connected cars. The industrial IoT has been another area noted in the cybersecurity assignment which has seen a huge adoption within the critical industries such as the utilities; chemicals; gas and oils and similar others. The multi-dimensional information might provide the indicators for detecting the traditional means. The IoT systems for being interconnected offers control besides any of the security measures and might lead to different kinds of network attacks.
Business decisions and user experience
Besides the detection of threat, the addition of analytics for the organisations to achieve solutions and information of user location tends to enable the organisations for realising the other valuable benefits. The predictive analytics on cybersecurity assignment is also found to help the threats of pinpoint along with measuring the countermeasures through defining the attributes of the users and the behaviour for the risk being assigned within the areas and the people (Hiebertet al., 2019, p. 290). This also provides insights across the personnel movement for making the organisations to optimise the workflows along with the usage of common areas; facilities and individual rooms as well. However, this also consists of certain limitations such as creating a lack of interaction within the staff and the customers; at times, the support systems are also not proper through which the customers can get a quick response. All these can lead to difficulty in making business decisions.
What are the issues related to the modern use of cybersecurity mentioned in this cybersecurity assignment?
There are several threats illustrated in the cybersecurity assignment related to cybersecurity, which can occur within its use in the modern days.
These are the malware programs, which are designed specifically for causing damage in the computers. Viruses can self-replicate across the right conditions and can also infect the computer system rather taking any of the permission from the user. This can corrupt the files along with stealing private information such as the details of credit cards and similar others.
As opined by Honecket al., (2018, p. 455) within this cybersecurity assignment, this is considered as a threat to cybersecurity that involves the stealing of personal information for the victims through the websites of social media like Instagram; Facebook and similar others along with making use of that for building the picture of the victims.
This is the group of malware which is referred to as in generating the pop-ups. When a user is found to notice a strange message of pop-up within their computer screen, this is considered as most likely for being a malware attack. The major intention of the adware has been for gaining permission, which allows them to install additional and malicious software. After downloading the additional software, it might steal or rather delete the data (Järvinen, 2016, p. 1065).
4. The emerging technological trends along with the potential challenges
With the evaluation of the emerging technologies within the cybersecurity system, all the trends under this arena provide the indicators to the network security, data security, and information security.
Trend 1: GDPR becomes regular
Herein cybersecurity assignment, it is clear that as per the passage of the years, it is clear the significance of the data protection and rights of personal privacy is growing and thus, as stated by Klonoffet al., (2017, p 180), in 2019, the GDPR (General Data Protection Regulation) has been launched. The process involves the gathering, organizing, structuring, storing, altering, consultation, utilization, communication, combining, restricting, erasure, or the destruction of the confidential data. Thus, the theory explored in the context of cybersecurity assignment consists of seven principles such as Lawfulness (transparency and fairness), data minimization, purpose limitation, accuracy, storage limitation, confidentiality, and integrity along with accountability. Hence, with the launch of this contemporary revolutionary regulation of data protection within Europe, the other countries in the world like Australia, Canada, and Brazil are rolling out their laws regarding data protection.
Trend 2: ML and AI-based systems of security
In 2019, there was the development of solutions regarding cybersecurity which makes the utilization of Artificial Intelligence along with Machine Learning. However, these solutions leverage in dynamically identifying the threats within real-time which help the organizations to act proactively rather than being reactive to threats. Moreover, as expressed by Kumari et al. (2017, p 300), it is noted in the cybersecurity assignment that the utilization of AI helps in gathering and analyzing the data that facilitates decision making. Thus, both this system within the cybersecurity forum will help in solving the wide ranges of issues within different industries as well as an application like the reduction of street traffic, improvement of online shopping, making the life easier with the voice-activated digital assistant and much more.
Trend 3: Cloud Security remaining as the top priority
With more and more companies migrating their workloads, data, and applications to the cloud system, cloud security has continued to grow in importance. Thus, from the overall discussion on cybersecurity assignment it is stated that in case of many if the companies, the data leakage or loss, privacy as well as confidentially has become the prime concerns and thus, the cloud providers have continued to grow the security services to protect the several cloud platforms and it is also up to the clients for securing the applications as well as the data which are stored within the cloud environment.
Trend 4: IoT security
As estimated by Li et al., (2018, p 663) in regards to the case scenario of cybersecurity assignment, the count of Internet of Things (IoT) devices will exceed up to 20.4 billion in the year 2020, and thus, the experts posit the increase of adopting the IoT services 3ill make the consumers and the companies much more vulnerable to the online bad actors. Thus, IoT security is the technological area that is concerned with the safeguarding networks and the connected devices within the IoT and it involves the addition of internet connectivity to the system that is interrelated to computing devices, digital and mechanical machines, people, objects as well as animals.
Trend 5: Authentication technology of next generation
It is evident in this cybersecurity assignment that more than 85% of the cyberattacks are considered as the result of individuals getting tricked out of their passwords as argued by Li and Li (2020, p 6). Thus, with the passage of years, the move that is away from the passwords system is observed and thus, many of the companies are gravitating towards the authentication technologies of the next generation such as the Biometrics, Homomorphic Encryption as well as multi-factor authentication. Thus, Biometrics is referred to as the authentication techniques which rely upon the measurable physical characteristics which could be automatically checked and thus, there are various types of schemes used in biometric identification such as face and the analysis of the facial characteristics. Whereas, homomorphic encryption in the form of encryption allows the computation upon the ciphertexts, generating of encrypted outcomes that when decrypted tries to match the outcome of operations as they have been performed on the plaintexts. Hence, this system is used for privacy-preserving computation and outsourced storage. On the other hand, there are certain potential challenges as outlined in the cybersecurity assignment related to the cybersecurity that can act as a threat to many organizations.
As suggested by MA et al., (2017, p 15) within this cybersecurity assignment, the Ransomware has become one of the most significant threats that impact on the business which exploits the basic vulnerabilities that include the lack of networking backups as well as segmentation. Thus, today the threat actors employ the same variety of ransomware that was previously utilized for encrypting data for ransoming the organization's system or resources to mine the cryptocurrency, and this practice is known as Cryptojacking.
IoT device threats
The companies are now adding solutions like smart container ships and security cameras and a lot of them don’t have the idea of how they are going to be managed and factored in the design of the products and thus, the maintenance of these devices is often the last consideration.
More and more companies are starting to consider where the products are based or have been implemented along with where the data are stored which is in terms of the cybersecurity regulation like GDPR and the risks of the threat actors Peters et al., (2016, p 3950). Hence, as stated in the cybersecurity assignment if the companies do not consider the geopolitical risks and locations, those, which store the sensitive data with the third parties, can run the risk of the threat actors or the resources of a nation-state that has been used against them.
This allows the adversaries to use the business websites for executing the untrusted code within victimized browsers that make it easy for the criminal to interact with the users along with stealing their cookie information that is used for the authentication for hijacking the site except for their credentials.
The prime pinpoint within this space is the Android installed base which is becoming the top attacking target which the trend rooted in the poor management of vulnerability. Moreover, it is also clear in the cybersecurity assignment that the majority of the android devices in this world are still using the old version of the android system (Saritas, 2016, p 20). Thus, it makes it easy for the attacker to attack and steal the personal pieces of information and data and has become challenging to support these devices as well as get the timely patches.
5. Impact analysis of emerging and existing technologies on the future trends of Cyber Security
The future of cybersecurity is much more proactive as the future will have a heavy focus on the utilization of artificial intelligence (AI) for securing the devices as well as the systems within the increasingly connected world. The IoT (Internet of things) along with the connected device that is proliferating at such incredible rates and thus, leave the companies to get exposed to the potential attacks of cybercrime that are increasing. Moreover, it is observed by Siyu and Tiangang (2019, p 360) herein cybersecurity assignment, the legacy system does not have the capabilities for keeping up with the evolving threats of security along with relying solely on the human oversights that might prove to be woefully inadequate. Thus, the cybersecurity will move forwards to the capable automated system, which can help in monitoring, detecting, managing, and preventing cyberattacks within real-time.
With the emergence of the new trends, the technology will also continue to evolve with more and more companies that will adopt the 5G networks. This networking technology mentioned in the cybersecurity assignment will help billions of contemporary devices to get connected with the internet with much more density, speed, and efficiency than ever before. With the software applications and system getting more complex, the potential vulnerabilities in cybersecurity might increase. However, with an increased collection of the high valued information such as contract data, health information, and financial data that are stored and shared through the connected cyber environments in the next decades and more, the requirement for expertise in cybersecurity will explode, for combating the cybersecurity issues like hacking or other criminal activities (Urata et al., 2019, p 1).
With the awareness of the significance of privacy and security grows, the consumers will slowly begin to realize the critical significance of digital privacy and thus, the companies are taking note of it. Thus, the findings obtained in the cybersecurity assignment signify that the steady growth of encrypted messaging services such as WhatsApp as well as Signal highlights society's growing demand for more secure ways of online interactions. In the future, the application of consumer-ready platforms along with mobile-first applications that incorporate privacy by default along with meeting growing customer demands as well as filling the gaps within the market that the large tech incumbents have failed to deliver.
As expressed by Vega et al., (2018, p 1352) with regards to the case scenario of cybersecurity assignment, with more and more businesses joining the digital era for storing, recording and the utilization of the data is the part of the model, it can be assumed that the organization will gain the solutions in place for defending giants the incoming cyber-attacks and threats. Thus, the future of cybersecurity will be the vast array of endpoint solutions, platforms for security monitoring, and the process of improving authentication. Thus, there is a need for encouraging the business leaders to choose the right solutions regarding their companies and do not become exhausted or overwhelmed with the options that are ever-growing when it comes to the improvement of cybersecurity. The future of cybersecurity lies within AI, that drives the anti-malware tools and the next-generation firewalls, which learns as well as detects the new threats with their evolution. The cybersecurity now as well as in the future relies upon the education and creation of the culture regarding cyber awareness among the teams and individuals and it is the best path forward for the reduction of the human risks and error (Vincent et al. 2020, p 15).
Moreover, in the upcoming future, cybersecurity will also focus on the security controls that are related to the adoption of SaaS and IaaS applications along with the continuation of evolving and securing new technologies such as containerization as it will become the mainstream. Moreover, cybersecurity will also continue to become much more ingrained into the contemporary developed models for software introductions. Thus, cybersecurity is expected to provide for and manage the uniform, all-encompassing security controls over the various types of enterprise deployment applications such as hybrid cloud, on-site data centres, and multi-clouds.
The fate of cybersecurity is, of course, the cloud system as it is the best bet for the concept such as the Microsoft, Amazon, and Google could afford the recruitment of the best talent for securing their operations and thus, most of the competitive organizations simply cannot compete upon the cybersecurity fronts. Moreover, it is evident in the cybersecurity assignment that the Cloud system allows the organization to concentrate upon the logic of business despite worrying about the levels of operating system patch management (Wang et al., 2019, p 809). Thus, through utilizing the IaaS(infrastructure as a service) or the Serverless Setup as mentioned in the cybersecurity assignment the companies could purely concentrate upon the computation and data and could let their cloud provider worry about the other things that involve the OS updates, certification management, HTTP request processing, HTTP security protocols and more. However, the emergence of the technological trends like the Artificial Intelligence as well as Machine Learning will become the future for the cybersecurity that will include the human working along with these automated assistants and the devices like the Cortona, Google Home, and Alexakind of tools will help in providing the cyber bits of intelligence that will help in moving forward.
For combating with the merging threats in the future, Biometrics will be used in abundance as it incurs high volumes of data regarding the individuals, their behaviours, as well as activities such as voices, faces, traits as well as the slightest details, will be stored within the system which will help to prevent the cybercriminals for targeting and exploiting the new generation of the personal data. Furthermore, as suggested by Wang et al., (2019, p 5) herein cybersecurity assignment, the three-factor authentication will be the best option available such as the Know (Password), Are (Biometrics), and Have (token) and thus, each of them makes the process much stronger as well as secured.
6. Summary of Discussion
With challenges being involved within the cybersecurity system, there is the significance of addressing the challenges through starting from network security basic as the key and thus, there are some recommendations provided within this cybersecurity assignment for the improvement of the cybersecurity in business as well as in other areas of the world such as:
- Investing within cybersecurity education and training for the individuals as most of the data breaches occurs when individuals click upon the links or the provided information that allows the cybercriminals to access the network.
- Have the Business Class NSA (Network Security Appliance) in place as it acts as the guardian on the gate of the network that controls the data coming in and out of the network (Xinet al., 2019, p 012100).
- Maintaining the multi-layer malware and antivirus protections up in the network as the antivirus software scans the entire files that the individual opens that provides real-time protection.
- The technology of strong web-filtering as it provides the real-time monitoring of the URL and the content for blocking the undesired access as well as upholding the permission for protecting the network.
- Two-factor authentications that access the control of the computer networks which is paramount to the security that starts with the confirming user identity along with the two distinguished components for accessibility (Zhang et al. 2017, p 1003).
- Robustrotation policy and password complexity as passwords are the significant aspects of computer security and every organization should have the policy for addressing this. Thus, the purpose of this type of policy discussed in the cybersecurity assignment is for establishing the standards of creation regarding the string password, password protection, and the change frequency.
- Effective backup along with the ransomware as the prevalent threat for the security and the risk of losing access to the company files and practising the regular backups of the network which is the proactive step forward for the continuity plan for the organization (Ziegler et al., p 764).
The present study on cybersecurity assignment focuses on the concept of Technology and Trend monitoring mainly highlighting the aspect of Cybersecurity and its impact on the business and other areas in the world. The study on cybersecurity assignment contains the independent research along with the synthesized literature from the wide arrays of the sources upon the cybersecurity along with the relevant theories and practices, the critical reviews on the existing literature along with firming the independent opinion and highlighting the issues and identifying the strengths and weaknesses. The emerging technological trends of Cybersecurity along with the potential challenges as well as the impact analysis of cybersecurity on the future trends are also mentioned within the cybersecurity assignment. Furthermore, the recommendation regarding the improvement of the cybersecurity concept is also determined within the cybersecurity assignment.
Adamson, G.D., de Mouzon, J., Chambers, G.M., Zegers-Hochschild, F., Mansour, R., Ishihara, O., Banker, M. and Dyer, S., 2018. cybersecurity assignment International Committee for Monitoring Assisted Reproductive Technology: world report on assisted reproductive technology, 2011. Fertility and sterility, 110(6), pp.1067-1080.
Alavi, A.H., Hasni, H., Lajnef, N. and Chatti, K., 2016. Continuous health monitoring of pavement systems using smart sensing technology. Construction and Building Materials, 114, pp.719-736.
Awolusi, I., Marks, E. and Hallowell, M., 2018. Wearable technology for personalized construction safety monitoring and trending: Review of applicable devices. Automation in construction, 85, pp.96-106.
Bakhtin, P., Saritas, O., Chulok, A., Kuzminov, I. and Timofeev, A., 2017. Trend monitoring for linking science and strategy. Scientometrics, 111(3), pp.2059-2075.
BUNN, J.A., Navalta, J.W., Fountaine, C.J. and REECE, J.D., 2018. Current state of commercial wearable technology in physical activity monitoring 2015–2017. International journal of exercise science, 11(7), p.503.
Cao, W., Dong, G., Xie, Y.B. and Peng, Z., 2018. Prediction of wear trend of engines via on-line wear debris monitoring. Tribology International, 120, pp.510-519.
Chen, N. and Yi, X., 2019, October. Method of abnormal flight data correction without trend items monitoring sequence and its application. In 2019 IEEE 1st International Conference on Civil Aviation Safety and Information Technology (ICCASIT) cybersecurity assignment (pp. 552-555). IEEE.
Cunningham, S., Deere, S., Symon, A., Elton, R.A. and McIntosh, N., 2018. A randomized, controlled trial of computerized physiologic trend monitoring in an intensive care unit. Critical Care Medicine, 26(12), pp.2053-2060.
Dias, D. and Paulo Silva Cunha, J., 2018. Wearable health devices—vital sign monitoring, systems and technologies. Sensors, 18(8), p.2414.
Duan, Z., Wu, T., Guo, S., Shao, T., Malekian, R. and Li, Z., 2018. Development and trend of condition monitoring and fault diagnosis of multi-sensors information fusion for rolling bearings: a review. The International Journal of Advanced Manufacturing Technology, 96(1-4), pp.803-819.
Ena, O., Mikova, N., Saritas, O. and Sokolova, A., 2016. A methodology for technology trend monitoring: the case of semantic technologies. Scientometrics, 108(3), pp.1013-1041.
Haak, T., Hanaire, H., Ajjan, R., Hermanns, N., Riveline, J.P. and Rayman, G., 2017. Flash glucose-sensing technology as a replacement for blood glucose monitoring for the management of insulin-treated type 2 diabetes: a multicenter, open-label randomized controlled trial. Diabetes Therapy, 8(1), pp.55-73.
Haak, T., Hanaire, H., Ajjan, R., Hermanns, N., Riveline, J.P. and Rayman, G., 2017. Use of flash glucose-sensing technology for 12 months as a replacement for blood glucose monitoring in insulin-treated type 2 diabetes. Diabetes Therapy, 8(3), pp.573-586.
Hiebert, J., Alam, A., Vinnakota, V.R. and Subakti, D., 2019. Operational Use of Synchrophasor Technology for Power System Oscillations Monitoring at California ISO. cybersecurity assignment In Power System Grid Operation Using Synchrophasor Technology (pp. 285-296). Springer, Cham.
Honeck, E., Castello, R., Chatenoux, B., Richard, J.P., Lehmann, A. and Giuliani, G., 2018. From a vegetation index to a sustainable development goal indicator: Forest trend monitoring using three decades of earth observations across Switzerland. ISPRS International Journal of Geo-Information, 7(12), p.455.
Järvinen, A., 2016, December.Virtual reality as trend contextualising an emerging consumer technology into trend analysis.In 2016 Future Technologies Conference (FTC) (pp. 1065-1070). IEEE.
Joung, J. and Kim, K., 2017. Monitoring emerging technologies for technology planning using technical keyword based analysis from patent data. Technological Forecasting and Social Change, 114, pp.281-292.
Klonoff, D.C., Ahn, D. and Drincic, A., 2017. Continuous glucose monitoring: a review of the technology and clinical use. Diabetes Research and Clinical Practice, 133, pp.178-192.
Kumari, P., Mathew, L. and Syal, P., 2017. Increasing trend of wearables and multimodal interface for human activity monitoring: A review. Biosensors and Bioelectronics, 90, pp.298-307.
Li, H., Xu, F. and Uszkoreit, H., 2018, September. TechWatchTool: Innovation and trend monitoring. In Proceedings of the International Conference Recent Advances in Natural Language Processing 2011 (pp. 660-665).
Li, Y. and Li, Y., 2020. Analysis of the Development Process of Payment Methods and Mobile Payment Technology Diffusion Trend in China. Technology and Investment, 11(1), pp.1-11.
MA, M.M. and PAN, P.F., 2017. Realization and Application of Key Parameters Trend Monitoring in Aeroengine Flight Test. Aeroengine, (1), p.15.
Peters, A.L., Ahmann, A.J., Battelino, T., Evert, A., Hirsch, I.B., Murad, M.H., Winter, W.E. and Wolpert, H., 2016. Diabetes technology—continuous subcutaneous insulin infusion therapy and continuous glucose monitoring in adults: an Endocrine Society clinical practice guideline. cybersecurity assignment The Journal of Clinical Endocrinology & Metabolism, 101(11), pp.3922-3937.
Saritas, O., 2016.Integration of Trend Monitoring into STI Policy.In Deploying Foresight for Policy and Strategy Makers (pp. 11-32).Springer, Cham.
Siyu, C. and Tiangang, L., 2019. Dynamic Monitoring of Grassland Vegetation Phenology in Tibetan Plateau based on EVI2 and Three Trend Approaches. Remote Sensing Technology and Application, 34(2), pp.355-366.
Urata, N., Tsubakizaki, S., Aoki, K., Yamamoto, Y., Hirasaki, T. And Iida, S., 2019. Development of Thickness Trend Monitoring Technology (Thin-Film UT Sensor) and Field Verification of Water Treatment Technology (High-AVT) for HRSG FAC Control. Mitsubishi Heavy Industries Technical Review, 56(1), p.1.
Vega, J., Torres Garcia, E.E., Verdugo, O.G. and Monico Muñoz, L.F., 2018. Prevention of Compressor Stall on Rolls Royce M250 Engines C20 Series Using Trend Monitoring Analysis.In 2018 AIAA Aerospace Sciences Meeting (p. 1352).
Vincent, L.A., Hartwell, M.M. and Wang, X.L., 2020. A Third Generation of Homogenized Temperature for Trend Analysis and Monitoring Changes in Canada’s Climate. Atmosphere-Ocean, pp.1-19.
Wang, J., Wang, Z., Wang, Y., Liu, S. and Li, Y., 2016. Current situation and trend of marine data buoy and monitoring network technology of China. ActaOceanologicaSinica, 35(2), pp.1-10.
Wang, L., Zhang, G., Wang, Z., Liu, J., Shang, J. and Liang, L., 2019. Bibliometric Analysis of Remote Sensing Research Trend in Crop Growth Monitoring: A Case Study in China. Remote Sensing, 11(7), p.809.
Xin, Q., Jingfeng, G., Junjie, G., Mingxing, Y. and Pian, Z., 2019, October. Automobile tire pressure monitoring technology and development trend. In Journal of Physics: Conference Series (Vol. 1314, No. 1, p. 012100). IOP Publishing.
Zhang, J., Zhang, J., Hong, E., Chongyang, D.U. and Xiaojiang, Y.U., 2017. Application of real-time trend monitoring data collected schemata of intensive nursing records. Chinese Journal of Practical Nursing, 33(13), pp.1002-1004.
Ziegler, R., von Sengbusch, S., Kröger, J., Schubert, O., Werkmeister, P., Deiss, D. and Siegmund, T., 2019. Therapy adjustments based on trend arrows using continuous glucose monitoring systems. cybersecurity assignment Journal of diabetes science and technology, 13(4), pp.763-773.