Bi22bc CET324 Assignment 1
Bi22bc CET324 Assignment 1
Introduction
A cyber clinic, which would serve both Sunderland's students and staff as well as the general
public and local businesses, is now being considered by the school's administration.
The cyber clinic's mission is to help anyone who are worried about or have experienced a breach
in their cyber security.
Types of activities that a cyber-clinic might undertake to provide service to its stakeholders
All of these things are done by cyber clinic so that they may serve their clients.
Protecting the Community More Effectively: Cybersecurity education first and foremost raises
the bar on your business' safety. Staff members will be less likely to make careless mistakes that
might compromise your company's security if you educate them about the myriad threats that
exist, such as data leaks and ransomware.
If your team isn't aware of what hackers can do, a single second might be disastrous. Problems
may arise, for instance, if an employee used their personal smartphone to check email while
connected to a public Wi-Fi network. If everyone in your firm adheres to the same security
practices, you greatly reduce the chances of a breach occurring.
Reduces the burden on your cyber expert's time: It's a fantastic idea to hire a cyber-security
specialist or team. The most serious issues may be addressed by your professional cyber security
team while the rest of the workforce learns to recognize phishing emails and spam, maintains
strong passwords, and protects sensitive data from human mistake.
Cost and time savings: Less downtime due to cyberattacks means greater efficiency and
productivity for your business. Also, the reliability of your apps, servers, and networks will
improve.
Issues concerning liability and any legal or professional concerns in establishing a cyber-
clinic
As information and network technology has developed and the world has become more
interconnected, concerns regarding cyber security have increased in relevance. Cybersecurity is
concerned with illegal operations on a national and international scale. Inconsistencies between
different countries' penal codes are at the heart of the problem, and they need to be standardized.
One of the main factors contributing to global cybercrime vulnerabilities is the variety of
national laws, which makes it difficult to build a unified legal response to the issue on a global
scale. Cybersecurity examines how international law might be applied to the everyday uses of
network and computer technology, including their potential use in modern conflict. It is crucial
to distinguish between state and non-state actors when determining the offender's jurisdiction
and assigning responsibility for the offender's acts. In light of these challenges, it is essential to
develop a practical approach to providing legal guidance on the internet that can adequately
address the substance of the issue and its specialized complication on multiple levels, including:
authoritative intercessions for the type of criminalization and harmonization; global
participation; collaboration with the private sector; competent instructive and limit working in
regards to specialized help and help.
Conclusion
In this portion, I have discussed about the problems that my buddy was having, which are
immediately associated with the plot and the topic. The major slogan of cyber clinic is also
directly connected with these problems. My goal is to educate people about the ethics of cyber
security, as well as cyber security in general, as well as online harassment. People will be
educated at the clinic on how to create safe passwords, and the issue will be remedied, ensuring
that there will be no such problems in the future relating to online stalking.
Part 2
Introduction
I attended many seminars, laboratories, and lectures. What I discovered there is reflected in my
report. Preventative and corrective measures taken by individuals and organizations to strengthen
cybersecurity will be discussed.
They will be able to tell the difference between trustworthy and harmful people based on
their past experiences, allowing them to avoid dangerous situations. In this way, the
administrators of the system will have an advantage against potential intruders since they
will be aware of any potential weak points and can keep the system protected. They'll be
aware of their weaknesses and able to strive to strengthen them, allowing them to feel at
ease in any situation.
Time and money are both conserved: More people and businesses becoming aware of the
need of cybersecurity measures will reduce the need for additional cybersecurity staff,
leading to substantial savings over time. If they follow the maxim "Prevention is better
than Cure," they can protect their system against cyberattacks. Because they won't be as
concerned about these threats, they'll be able to focus more intently on their work. If they
had been aware of the situation earlier, they would have taken preventative measures.
Most cyberattacks happen because of carelessness, therefore people need to be more
careful. After receiving this education, both people and organizations will be prepared for
and able to recover from a cyber-security compromise. Because of their prior exposure,
they will recognize fraudulent emails, websites, and other online resources. Several
online frauds, including phishing, will be thwarted as a result of this change. Even the
most precarious situations can be managed by the individual.
Increased self-assurance means that many workers will feel comfortable deleting
annoying SMS and emails. Staff members who are given the authority to make decisions
and are made fully aware of the potential consequences are less likely to make the type of
error that might result in a catastrophic data leak. They'll also be less inclined to second-
guess themselves or hold up progress on straightforward tasks as they wait for
information technology support. They will be able to handle commonplace dangers and
issues on their own if you provide them with the proper knowledge.
Technicians, along with the rest of the staff, have a responsibility to protect the company's
sensitive information. Experts in cybersecurity and other IT workers must thus watch over
sensitive data and make sure all measures are functioning properly. It's important to keep in mind
that everyone with access to private information must maintain its secrecy at all times. In their
pursuit of secrecy, institutions may use a variety of technological methods aimed at preventing,
detecting, and fixing breaches. Most of these safeguards are geared on ensuring that only
authorized users have access to sensitive information.
Two different kinds of privacy constraints exist. Initially, many businesses create security rules
that center on the company's own ethical stances towards proper data management. Second, there
are a variety of privacy rules and regulations that educational institutions must follow.
Security
Information of any kind may be stolen or somehow compromised, making cyber security a must.
Examples of this include government and corporate databases as well as information systems
containing sensitive material, personally identifiable information (PII), protected health
information (PHI), private details, patents, data, and so on. Without a dedicated cybersecurity
strategy, your firm is a soft target for hackers who want to steal sensitive information.
Conclusion
You may minimize the likelihood of a data leak occurring by concentrating on its prevention by
making investments in cybersecurity. Individuals and businesses may be able to thwart hackers
and protect their data by making an investment in cybersecurity software, using a virtual private
network (VPN), and being familiar with typical attack strategies.
References