MANAGEMENT INFORMATION SYSTEMS XXXXXXXXXX1 CYBER SECURITY FOR PERSONAL INFORMATION 2 Tarek Ben Fehri Department of Business, California Miramar University MIS 6110: Management Information Systems...

1 answer below »
Please find the attached draft and do the following:
1) expand the existing draft by adding 3 more pages to it . and add the following headlines and write a well-constructed paragraph with suitable citation of each one( some of them are already mentioned in the attached draft):


MANAGEMENT INFORMATION SYSTEMS 1 CYBER SECURITY FOR PERSONAL INFORMATION 2 Tarek Ben Fehri Department of Business, California Miramar University MIS 6110: Management Information Systems Instructor:  Maryam Hassanlou, PhD 1. Title Cyber security for personal information 2. Problem Statement under Investigation Cyber security is concerned with preventing unwanted access to and manipulating your internet and network-based digital devices and information (Callen-Naviglia & James, 2018). The internet has established itself as a channel through which we do business in addition to being a source of knowledge. The internet was never designed to track and record user activity. Because the internet provides many advantages, it also gives equal opportunity for cyber-terrorists and hackers (Demirkan, Demirkan & McKee, 2020). It is frequently used to enhance communication inside terrorist groups and information collecting and distribution for terrorist goals. In this fast-paced competitive world, Cybersecurity is crucial for the survival of any organization since it shields all the aspects of data from damage to theft. Primarily this includes safeguarding the sensitive information, private and confidential information, PII-personally identifiable information, personal details, governmental data, intellectual properties, etc. Unless there is a strong cybersecurity procedure, the organization is powerful enough to shield itself against any breach, hacking attacks, and becoming a target point for many criminals. 3. Importance of the Study Cyber threats may impact community policing (CP), just as they do on the citizens it is designed to protect. Traditional fraud and cybercrime have many similarities, but cybercrime has two distinct advantages: scale and anonymity (Callen-Naviglia & James, 2018). Just as a computer has improved the efficiency of legitimate firms, it has also improved the efficiency of illegal enterprises. Huge-scale cybercrime is now feasible because the internet has changed a cybercriminal's motive from merely targeting a limited number of high-value targets to many low-value targets. This, in turn, brings with it additional problems (Park & Lee, 2019). Cybercrime will only grow more common and damaging as society continues to integrate and rely on the online realm in their daily lives. Cybercriminals may have a greater influence because of the scalability that computers and the internet enable. Society is growing increasingly reliant on the integrity and confidentiality of computer systems without even recognizing it. Cybercrime attacks on people's online privacy and security can have real-world consequences for their reputations, job security, identity, and income. Protecting our essential infrastructure (financial markets, energy, healthcare, government, and transportation) against cyber-attacks is thus a national issue that, as we will see, necessitates an international response. This chapter describes the many features of cyberspace and some of the technology that may be utilized for both right and wrong within it (Park & Lee, 2019)." There are two damaging threats in the form of residual risk as well as the inherent risk that is constantly increasing with globalization and the utilization of several cloud services like AWS, Azure, GCP, etc. Since the cloud is leveraged as the global storehouse of data, especially sensitive data and personal information, it also becomes an easy target of hacking and attacks. The poor configuration of several cloud services that are clubbed with sophisticated cyber criminals can damage the data, making organizations suffer from breaches and attacks. 4. Purpose of the Study Governments, military organizations, financial institutions, colleges, and other enterprises acquire, process, and store personal data and information on computers. They then transfer it to other computers across networks. The study goes into great length regarding the nature of cyberspace and demonstrates how insecure the internet is for transmitting private and financial data (Valeriano & Maness, 2018). Cybercrime is constantly increasing and evolving in targeting the users and impacting the organization. While social engineering remains a much easier form of cyber attack with phishing, ransomware and spyware are the easiest forms of entrance. We show how hacking has become more widespread and dangerous to global security and defense and the numerous types of cyber assaults used throughout the world. Understanding the fundamental ideas of cyber security is critical and the current and upcoming risks that it poses (Demirkan et al., 2020). This chapter examines the origins of cybercrime and the shifting incentives and obstacles that come with tackling it. 5. Main Participants in the Study Essentially, the Cyber security professionals are responsible for safeguarding any network, edge devices, IT infrastructure, and data. Drilling deep down into the cyber security personnel, they are responsible for shielding confidential information and protecting private data from attackers and unwanted intruders. Usually, these professionals have strong backgrounds as system engineers, programmers, and IT knowledge. Furthermore, cyber security personnel are also required to be agile in their actions, apply critical thinking, and have a strong passion for learning. Today, highly skilled security personnel are in rapidly increasing demand. The majority of organizations seek strong professionals that can be immune from cybercrime. References Callen-Naviglia, J., & James, J. (2018). Fintech, Regtech and the Importance of Cybersecurity. Issues in Information Systems, 19(3) Demirkan, S., Demirkan, I., & McKee, A. (2020). Blockchain technology in the future of business cyber security and accounting. Journal of Management Analytics, 7(2), 189-208 Park, J. W., & Lee, S. J. (2019). Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants. Nuclear Engineering and Technology, 51(1), 138-145 Valeriano, B., & Maness, R. C. (2018). International relations theory and cyber security. The Oxford handbook of international political theory, 259
Answered 2 days AfterApr 21, 2022

Answer To: MANAGEMENT INFORMATION SYSTEMS XXXXXXXXXX1 CYBER SECURITY FOR PERSONAL INFORMATION 2 Tarek Ben Fehri...

Parul answered on Apr 23 2022
102 Votes
Cybersecurity for Personal Information -Need of the Hour
Cybersecurity for Personal Information
-Need of the Hour
Submitted by - Tarek Ben Fehri
Agenda
Essenc
e of Cybersecurity
Growing Relevance of Cybersecurity
Types of Cyber Crimes
Importance of Cybersecurity
Implementation of Cybersecurity
Essence of Cyber Security
Cyber security are fundamental standards that enable firms to implement strong defense mechanisms to shield from breach and data hacks.
It is technology that is designed to protect data, networks and computers from unwanted access, attacks and vulnerabilities that are inherent in this hyperconnected world
Cyber security is concerned with preventing unwanted access to and manipulating your internet and network-based digital devices and information.
The internet has established itself as a channel through which we do business in addition to being a source of knowledge. The internet was never designed to track and record user activity.
Growing Relevance of Cybersecurity
All organization irrespective of their capitalization and size are at risk. Small or Mid-cap companies might feel they aren't the target can be most dangerous illusion that can cost them their business.
Majority of cybercrime are indiscriminate since they target vulnerable network and computer systems.
Cybercrime will only grow more common and damaging as society continues to integrate and rely on the online realm in their daily lives.
Cybercriminals may have a greater influence because of the scalability that computers and the internet enable. Society is growing increasingly reliant on the integrity and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here