Cybersecurity-Case Study

879 Words2 Pages

Technology is one of the greatest inventions we have in this life. With this invention, our life became much easier than it was. Nowadays, technology has given our society full opportunities to explore our world in many fields such as medicine, Engineering, information systems, communications and information technology. In addition, it helped countries and organizations to reduce time and effort by using online services, e-gov and e-business. Moreover, it allowed people to communicate with each other in all over the world and to share information, documents and pictures by using mobile phone and social media such as Facebook, Twitter, YouTube, and Instagram. These things made governments, organizations and information security experts in IT thinking seriously about finding right strategies to apply the cybersecurity in order to protect networks, PCs and information from hacking, steal passwords, vandalism or unauthorized access by hackers, crackers and Social engineering. These strategies include applying cybersecurity polices.in fact, issuing cybersecurity polices are only the first step however, applying cybersecurity polices is the core step to minimize of risks, so cybersecurity policies have some rules that need IT group to be aware of. These policies had been reviewed by case study and our professor Dr. Elliott Lynn in the first life classroom include:
1- “The biggest potential weakness in cyber security policy is when IT group do not have any support.
2- The staff who are responsible for cyber security policy are IT professionals, because we cannot expect that executive management to be aware of security issues.
3- IT group is responsible for making sure that cyber security policy is enforced including tools.

4- The bes...

... middle of paper ...

...chieve level of work ethics that help organization to move on.
Cybersecurity is not only IT responsibility, but also the every single person at organization. Also, employees need to understand that attack at any part of organization means attack's at all organization due we work as a one team. Training, workshops, conferences are good methods to increase the level of staff awareness. Using antivirus, firewalls and security policy would reduce security threats.

This is my last case study and I hope you like it.
Best Regards
Mohammed Almohdar

Works Cited

Dhillon, G. (2007). Principles of information systems security: Text and cases. Hoboken, NJ:

John Wiley & Sons.

Media: life classroom # 1 by Dr. Elliott Lynn.
https://seu-online.blackboard.com/webapps/portal/frameset.jsp?url=%2Fwebapps%2Fblackboard%2Fexecute%2Flauncher%3Ftype%3DCourse%26id%3D_349997_1%26url%3D

Open Document