Cyber Resilience To Effectively Deal With Daily Provocations In Business Assignment Sample

Cyber Resilience To Effectively Deal With Daily Provocations In Business Assignment by New Assignment Help

  • 54000+ Project Delivered
  • 500+ Experts 24x7 Online Help
  • No AI Generated Content
- +
35% Off
£ 6.69
Estimated Cost
£ 4.35
12 Pages 3116Words

Introduction of Cyber Resilience To Effectively Deal With Daily Provocations In Business Assignment

Get free written samples from subject experts and online assignment writing service in UK.

Building appropriate cyber resilience to effectively deal with daily provocations in a business is a hard process. It necessitates several interconnected operations, including the configuration, implementation, and maintenance of a robust technological infrastructure, the development of appropriate established processes, and the development of a resilient culture among staff members. Edge computing, a different type of network infrastructure, has the potential to increase IoT service availability but also resilience in strange circumstances like network problems or denial-of-service (DoS) assassination attempts. Notwithstanding, the challenge of improving accessibility even though edge computers that would provide critical intelligence services such as authentication and authorization are becoming unavailable has received little attention.

Section 1

Authentication and authorization

In this paper, a resilient authentication and authorization approach is proposed to improve IoT service availability in the face of DoS attacks or failures. The proposed approach makes use of a technique known as secure population movement, which also enables an IoT device to relocate to another reliable edge computer whenever its local authorization server has become unreachable (Ahmadi-Assalemi et al. 2020).

“The Secure Swarm Toolkit (SST)” seems to be an “IoT authentication and authorization technology” those researchers recommended. SST has a unique architecture that is both locally centralized and recognized globally: It comprises a collection of Auth's, as well as local authorization enterprises, that are distributed on edge machines. SST's Auth imposes obtain initiatives and offers security assistance to small IoT devices (known as entities). Researchers showed how SST might provide strong privacy and security and truthfulness assurances for information exchange among Internet of things magnitude in previous work (Haque et al. 2018). Researchers also used statistical modeling and a set of experimentations to demonstrate SST's protection and expandability.

 Illustration of the edge computers, cloud services, and the IoT devices

(Source: Influenced by Caritas et al. 2020)

Researchers present a novel framework for supplying resilience against “denial-of-service (DoS) attack vectors on an IoT network”, a class of attack vectors designed to prevent IoT devices can access critical services including identity and access management. A DoS attack's ultimate objective is to negotiate a system's accessibility by interrupting as well as overburdening one or both of its provider endpoints. The “distributed DoS (DDoS) invasion” is a prevalent and well-known type of DoS attack.

 Analysis of the SST model

(Source: Influenced by Carías et al. 2020)

Configuration management

“Security configuration management” refers to the process of modifying an information platform's default configuration to provide a secure and reduced risk. Misconfiguration of a platform’s default configuration is identified by security continuous integration. Configuration Management aids in the prevention of unauthorized changes in the environment (Dupon, 2019). CM could help prevent performance bottlenecks, system discrepancies, as well as compliance requirements, all of which can result in regulations and financial penalties. Such unregistered differences can affect equipment downtime, destabilization, and malfunction over a period.

 Configuration management

(Source: Influenced by Estay et al. 2020)

In complex networks, being able to perform the above things manually is too difficult. Software configuration management involves hundreds or even thousands of elements per implementation, and without appropriate paperwork, IT organizations can easily lose focus of which structures need attention, how many steps are required to resolve issues, what activities should indeed be prioritized, as well as whether changes have already been substantiated and perpetuated throughout the device.

Sensitive data and Cryptography

Data security has long been thought to entail securing relevant information in a physical place, such as a data center. However, as data moves throughout networks, boundaries, and portable devices, as well as into the cloud and the “Internet of Things (IoT)”, focusing exclusively on its physical location seems to be no longer applicable (Hausken, 2020). Encryption is the method of encrypting information in such a way that it could only be accessed by authorized parties. Confidential material in plaintext would be password protected using a homomorphism data encryption, resulting in cipher text which can only be interpreted if decompressed.

Encryption is often used to secure data as it travels through one location to the as while being in transit) from transmitter to recipient. When the user is using a laptop or a mobile phone to communicate to the bank's website, the information transferred between their device as well as the bank's webpage would be encrypted. Public key, furthermore known as asymmetric encryption, and cryptographic signature, as well as encryption algorithm, seem to be the two most commonly used techniques for cryptographic protocols. As per the view of Estay et al. (2020), both use key pairs; however the transmitting and receiving stakeholders start sharing the passwords but also manage the encryption/decryption process differently. This could help to protect private highly sensitive data, as well as increase the safety of client-server communication. In other words, when the traffic is compromised, it is protected from prying eyes.

Working procedure

Encryption uses non-readable complex computations and algorithms to scramble information. An algorithm creates a key for encryption in an encryption method. Although it is conceivable to decrypt without the security code if encryption equipment is completely designed, high computation resources and abilities would be obligated. With a better impact by the creator, an authorized beneficiary can conveniently decrypt the data (Ibne Hossain et al. 2020). Apart from that, if the encryption key would be lost or destroyed, the encrypted data on the desktop may not even be recoverable. As a result, before having to implement encrypted communication technologies, businesses must establish stringent important management systems, processes, and innovations.

Architectural design to store the sensitive data

(Source: Influenced by Kott and Linkov, 2021)

Any documentation which is designed to protect against unjustified disclosure would be classified as sensitive information. Data security may be necessary for moral or constitutional reasons, concerns about individual privacy, or patented technology relevant factors. Encryption is the method of converting a comprehensible message into an unintelligible form so that it cannot be read by unauthorized parties. The method of transforming an encrypted file return to its previous (comprehensible) form factor would be known as cryptography. This same plaintext message seems to be the original message. Whereas if pass code or key is lost, the user will be unable to open the encryption method. Utilizing simpler passwords in encryption technology, on the other hand, means the information insecure, and everyone can connect directly it at any time. These same two very important computer activities are hashing and encrypted communications.

Parameter manipulation and Exception management

A simple intrusion on the user's stored procedures could be a parameter trying to interfere. Such an attack exploits the fact that many software developers use hidden or remedied sectors as the only protective measure for only certain operational processes (including a concealed tag in a shape or a component in a URL). This same attack's success is contingent on dignity and logic verification mechanism errors, as well as it’s profiteering can lead to “XSS, Code Injection, file inclusion, as well as path disclaimer attacks, among other things”.

Web servers' primary function is to serve files. Specifications have been interchanged between the Internet browser and also the Web application throughout a Web browser to keep track of the client's session, obviating any need for a complicated directory on the application server (Kott and Theron, 2020). URL query strings, input fields, and settings are all used to identify factors that contribute. Changing specifications in form fields is a prime example of parameter tampering. Whenever a user has made a selection on an HTML page, this same value of the form field is typically reserved and sent to the Web-based application as an HTTP request. Such options include pre-selected options (combo boxes, checkboxes, radio buttons, and so on), free text, and hiding. An attacker could manipulate any of these principles. Hidden fields also seem to be specifications that are not transparent to the end-user and typically should provide status data to a Web implementation.

Auditing and logging

The goal of auditing and logging would be to keep track of and investigate exercises in the knowledge system that affects data assets. This would include any components, applications, or prescriptive controls in place to events that took places such as modifying information assets inside information management, such as privacy and confidentiality (Linkov and Kott, 2019). All activities that take place in an organization are classified by log or infuse supervision. This same system can weed out data that reveals possible threats inside an underlying network as it understands whether any operations are normal.

As hackers become more sophisticated, cyber security solutions should evolve to keep up. It's no longer possible to rely on firewalls and intrusion prevention to keep sensitive data safe. Data security isn't just good business for many companies; it's also required by law. Certain laws require the reader to protect large amounts of sensitive customers ' information when the company would be required to gain and retail outlet it. Lack of compliance in this accordance has properly maitnained with laws and regulations in harsh penalties (Lykou et al. 2018).

Every internet backbone activity is regarded as a cyber security incident. Emails, firewall notifications, as well as user activity are now all logged in a complex set of logs that define the atmosphere of their network. As per the view of Estay et al. (2020), the complete data logs comprise so much data that risks would be impossible to spot with the naked eye. Conversely, their log or network security remote monitoring appears to work to filter out irrelevant data so that it can consider the following. Companies may have different requirements for their systems. Nonetheless, some indispensable types of logs are commonly used by businesses to avoid potential risks. These events will be included in an effective monitoring program.

Section 2


Any manipulable weak location that compromises an institution's cyber security is referred to as a cyber known vulnerability. In cyber security and contingency planning strategies, vulnerability management is a key process. As per the view of Ibne Hossain et al. (2020), acknowledging the security problems that exist across the IT infrastructure is part of vulnerability assessment. As per the view of Estay et al. (2020), the objective is to establish and analyze these security problems so that actions can be taken to decrease their attack surface as well as start reducing the risk of data breaches to their business. To evaluate potential coordinates of oppression and identify due to malicious, a security vulnerabilities scan could be conducted. The number of vulnerabilities discovered by a scan could be daunting. It's rare for IT teams to be capable of addressing every security vulnerabilities, particularly when some patches aren't available and security problems emerge during the patch management procedure. Of furthermore, but not all of those flaws will pose a threat to business-critical investments or structures, making it almost impossible to identify critical flaws even without appropriate tools.

As per the view of Lykou et al. (2018), Computer security flaws can be classified into a variety of categories based on factors including where they exist, what exacerbated them, and how they could be exploited. The following are some broad approaches of vulnerability types:

Networking vulnerabilities

These are flaws in a platform's software or hardware which make it vulnerable to outside encroachment. Wi-Fi base stations that aren't secure and access controls that aren't provisioned properly are two such examples (Petrenko and Vorobieva, 2019).

System vulnerabilities

These are flaws in a computer system which hackers could use to obtain entry to an investment that the OS is implemented onto it to cause serious damage. Default system administrator records, which may occur in certain OS installations, and concealed remote code execution programmes are good instances (Linkov and Kott, 2019).

 Security in SDLC

(Source: Influenced by Petrenko and Vorobieva, 2019)

Prioritization based on information security and spatial awareness is an important part of vulnerability assessments. When focusing on improving the vulnerabilities depending on their experiential risk, keep in mind how security vulnerabilities extraction could lead to the compromise of key infrastructure and the possible business impact of malicious activities. Integrating vulnerability scanning and other actions into an extant development phase is part of a protected SDLC. As per the view of Zhang et al. (2020), Security measures should be written along with requirement specifications, as well as an architecture risk assessment should be performed even during the design phase of SDLC. An information systems insecurity, to put it more simply, seems to be a flaw or loss of strength in a network or system which could be manipulated to cause harm or allow hackers to rig the whole system in certain way.

Resilience strategies

Cyber resilience is the capacity to adapt and carry on with company operations and targets despite cyber security threats. Cyber resilience includes actively not only preparing for computer hackers or data breaches but also preparing for other adverse circumstances and difficulties. Cyber resilience entails going further than computer security (Linkov and Kott, 2019). As per the view of Ibne Hossain et al. (2020), this same ability to make preparations for, react appropriately to, and recoup from such a cyber incident would be known as cyber perseverance. It assists a company in preventing cyber risks, defending against hacking attempts, limiting the magnitude of an assassination attempt, and ensuring their continued existence in the case of an injury.

Every activity on the core network is considered a cyber security incident. Emails, firewall notifications, and user activity are all now logged in a complicated set of logs that define their network's atmosphere. Risks would be impossible to spot with the naked eye in the complete data logs because there is so much data. As per the view of Zhang et al. (2020), their log or network security remote monitoring, on the other hand, appears to filter out irrelevant data in order to consider the following. Different companies may have different system requirements. Nonetheless, businesses use certain types of logs that are required to avoid potential risks. These occurrences will be tracked as part of a comprehensive monitoring programme.

 Resilience strategies

(Source: Influenced by Petrenko and Vorobieva, 2019)

As per the view of Zhang et al. (2020), this differs from such a "cyber threat" in all of that, unlike a cyber threat, information systems vulnerabilities are present on the network investment such as a machine, data system, or maybe even an application domain from the start. Furthermore, they are rarely the consequence of an attacker's deliberate effort—though cybercriminals would then exploit such imperfections in their attack vectors, supposed to lead some to confuse the conditions. As per the view of Petrenko and Vorobieva, (2019), the manner in which computer vulnerability would be exploited is determined by the characteristics of the security vulnerabilities and the attacker's motivations. Unexpected conversations of distinct software programmes, components of the system, or basic imperfections in a single programme can all lead to security breaches. It is critical to understand that vulnerabilities exist in almost every system is no method to spot and identify them all due to the extremely complicated world of contemporary system architecture.

Reference list

Ahmadi-Assalemi, G., Al-Khatib, H., Epiphanies, G. and Maple, C., 2020. Cyber resilience and incident response in smart cities: A systematic literature review. Smart Cities3(3), pp.894-927.

Caritas, J.F., Borges, M.R., Labara, L., Arrizabalaga, S. and Hernantes, J., 2020. Systematic approach to cyber resilience operationalization in SMEs. IEEE Access8, pp.174200-174221.

Dupont, B., 2019. The cyber-resilience of financial institutions: significance and applicability. Journal of cybersecurity5(1), p.tyz013.

Estay, D.A.S., Sahay, R., Barfod, M.B. and Jensen, C.D., 2020. A systematic review of cyber-resilience assessment frameworks. Computers & security97, p.101996.

Haque, M.A., De Teyou, G.K., Shetty, S. and Krishnappa, B., 2018, November. Cyber resilience framework for industrial control systems: concepts, metrics, and insights. In 2018 IEEE international conference on intelligence and security informatics (ISI) (pp. 25-30). IEEE.

Hausken, K., 2020. Cyber resilience in firms, organizations and societies. Internet of Things11, p.100204.

Ibne Hossain, N.U., Nagahi, M., Jaradat, R., Shah, C., Buchanan, R. and Hamilton, M., 2020. Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: a system of systems problem. Journal of Computational Design and Engineering7(3), pp.352-366.

Kott, A. and Linkov, I., 2021. To improve cyber resilience, measure it. arXiv preprint arXiv:2102.09455.

Kott, A. and Theron, P., 2020. Doers, not watchers: Intelligent autonomous agents are a path to cyber resilience. IEEE Security & Privacy18(3), pp.62-66.

Linkov, I. and Kott, A., 2019. Fundamental concepts of cyber resilience: Introduction and overview. In Cyber resilience of systems and networks (pp. 1-25). Springer, Cham.

Lykou, G., Anagnostopoulou, A. and Gritzalis, D., 2018. Smart airport cybersecurity: Threat mitigation and cyber resilience controls. Sensors19(1), p.19.

Petrenko, S.A. and Vorobieva, D.E., 2019, May. Method of Ensuring Cyber Resilience of Digital Platforms Based on Catastrophe Theory. In 2019 XXII International Conference on Soft Computing and Measurements (SCM)) (pp. 97-101). IEEE.

Zhang, J., Li, L., Lin, G., Fang, D., Tai, Y. and Huang, J., 2020. Cyber resilience in healthcare digital twin on lung cancer. IEEE Access8, pp.201900-201913.

35% OFF
Get best price for your work
  • 54000+ Project Delivered
  • 500+ Experts 24*7 Online Help

offer valid for limited time only*