100% found this document useful (1 vote)
461 views8 pages

Bi22bc CET324 Assignment 1

Uploaded by

Nikal Poudel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
461 views8 pages

Bi22bc CET324 Assignment 1

Uploaded by

Nikal Poudel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Part 1

Introduction
A cyber clinic, which would serve both Sunderland's students and staff as well as the general
public and local businesses, is now being considered by the school's administration.

The cyber clinic's mission is to help anyone who are worried about or have experienced a breach
in their cyber security.

Types of activities that a cyber-clinic might undertake to provide service to its stakeholders
All of these things are done by cyber clinic so that they may serve their clients.

 Improve cyber safety education


 Take a security strategy that puts people first
 Employee irresponsibility may be lowered, and common phishing strategies can be taught
to employees.
 Two, lock down access to your most valuable possessions.
 Securely handle credentials; prevent unwanted access from remote devices; follow the
principle of least privilege
 Act to Protect Personally Identifiable Information
 Outsource protection to a cybersecurity company
 Employ multi-factor authentication
 Securely store employee data and information
 Establish online safety policies and procedures
 Thirdly, you should establish joint cybersecurity rules and conduct frequent audits of
your cyber protection methods, which include scanning and monitoring networks to
detect and stop intrusions.

Benefits of the taken activities


The following are some of the advantages brought forth by the cyber clinic's initiatives:

Protecting the Community More Effectively: Cybersecurity education first and foremost raises
the bar on your business' safety. Staff members will be less likely to make careless mistakes that
might compromise your company's security if you educate them about the myriad threats that
exist, such as data leaks and ransomware.

If your team isn't aware of what hackers can do, a single second might be disastrous. Problems
may arise, for instance, if an employee used their personal smartphone to check email while
connected to a public Wi-Fi network. If everyone in your firm adheres to the same security
practices, you greatly reduce the chances of a breach occurring.

Reduces the burden on your cyber expert's time: It's a fantastic idea to hire a cyber-security
specialist or team. The most serious issues may be addressed by your professional cyber security
team while the rest of the workforce learns to recognize phishing emails and spam, maintains
strong passwords, and protects sensitive data from human mistake.

Cost and time savings: Less downtime due to cyberattacks means greater efficiency and
productivity for your business. Also, the reliability of your apps, servers, and networks will
improve.

Concerns that might arise from establishing cyber clinic


While it is common knowledge that establishing a cyber-clinic is not a simple endeavor, several
worries stand in the way of its implementation. The most difficult challenge is going to be
finding someone who has all of the necessary technical expertise for the sessions. This individual
will need to be willing to commit their precious time to learning these skills, therefore finding
them will be the most difficult effort. The expression "additional vulnerabilities or challenges"
refers to the fact that users who attempt to protect the network with insufficient skills might
make the situation worse. Since individuals’ intentions aren't always apparent, it's possible for
someone to use the information they obtain during the session for their personal advantage at the
expense of other people.

Issues concerning liability and any legal or professional concerns in establishing a cyber-
clinic
As information and network technology has developed and the world has become more
interconnected, concerns regarding cyber security have increased in relevance. Cybersecurity is
concerned with illegal operations on a national and international scale. Inconsistencies between
different countries' penal codes are at the heart of the problem, and they need to be standardized.
One of the main factors contributing to global cybercrime vulnerabilities is the variety of
national laws, which makes it difficult to build a unified legal response to the issue on a global
scale. Cybersecurity examines how international law might be applied to the everyday uses of
network and computer technology, including their potential use in modern conflict. It is crucial
to distinguish between state and non-state actors when determining the offender's jurisdiction
and assigning responsibility for the offender's acts. In light of these challenges, it is essential to
develop a practical approach to providing legal guidance on the internet that can adequately
address the substance of the issue and its specialized complication on multiple levels, including:
authoritative intercessions for the type of criminalization and harmonization; global
participation; collaboration with the private sector; competent instructive and limit working in
regards to specialized help and help.

Conclusion
In this portion, I have discussed about the problems that my buddy was having, which are
immediately associated with the plot and the topic. The major slogan of cyber clinic is also
directly connected with these problems. My goal is to educate people about the ethics of cyber
security, as well as cyber security in general, as well as online harassment. People will be
educated at the clinic on how to create safe passwords, and the issue will be remedied, ensuring
that there will be no such problems in the future relating to online stalking.
Part 2

Introduction
I attended many seminars, laboratories, and lectures. What I discovered there is reflected in my
report. Preventative and corrective measures taken by individuals and organizations to strengthen
cybersecurity will be discussed.

Necessary steps that can be taken by individuals and organizations


 To prevent a data breach, they may do extensive research on cybersecurity. They will be
able to keep their cool in the face of a cyberattack because they will know what to do to
safeguard their data and essentials.
 Data backups: In case of system failure, you should always have a copy of your data
stored off-site.
 Multi-factor authentication may be used to provide an extra layer of protection to their
security system.
 A good rule of thumb for avoiding cyber security risks is to only use legitimate resources
online.

Benefits of this taken steps


Efforts to protect them against cyberattacks have the following benefits.

 They will be able to tell the difference between trustworthy and harmful people based on
their past experiences, allowing them to avoid dangerous situations. In this way, the
administrators of the system will have an advantage against potential intruders since they
will be aware of any potential weak points and can keep the system protected. They'll be
aware of their weaknesses and able to strive to strengthen them, allowing them to feel at
ease in any situation.
 Time and money are both conserved: More people and businesses becoming aware of the
need of cybersecurity measures will reduce the need for additional cybersecurity staff,
leading to substantial savings over time. If they follow the maxim "Prevention is better
than Cure," they can protect their system against cyberattacks. Because they won't be as
concerned about these threats, they'll be able to focus more intently on their work. If they
had been aware of the situation earlier, they would have taken preventative measures.
 Most cyberattacks happen because of carelessness, therefore people need to be more
careful. After receiving this education, both people and organizations will be prepared for
and able to recover from a cyber-security compromise. Because of their prior exposure,
they will recognize fraudulent emails, websites, and other online resources. Several
online frauds, including phishing, will be thwarted as a result of this change. Even the
most precarious situations can be managed by the individual.
 Increased self-assurance means that many workers will feel comfortable deleting
annoying SMS and emails. Staff members who are given the authority to make decisions
and are made fully aware of the potential consequences are less likely to make the type of
error that might result in a catastrophic data leak. They'll also be less inclined to second-
guess themselves or hold up progress on straightforward tasks as they wait for
information technology support. They will be able to handle commonplace dangers and
issues on their own if you provide them with the proper knowledge.

Ethical and professional issues in relation with the implemented steps


 Confidentiality

Technicians, along with the rest of the staff, have a responsibility to protect the company's
sensitive information. Experts in cybersecurity and other IT workers must thus watch over
sensitive data and make sure all measures are functioning properly. It's important to keep in mind
that everyone with access to private information must maintain its secrecy at all times. In their
pursuit of secrecy, institutions may use a variety of technological methods aimed at preventing,
detecting, and fixing breaches. Most of these safeguards are geared on ensuring that only
authorized users have access to sensitive information.

 Dangers to Personal Data Privacy

Two different kinds of privacy constraints exist. Initially, many businesses create security rules
that center on the company's own ethical stances towards proper data management. Second, there
are a variety of privacy rules and regulations that educational institutions must follow.

 Security
Information of any kind may be stolen or somehow compromised, making cyber security a must.
Examples of this include government and corporate databases as well as information systems
containing sensitive material, personally identifiable information (PII), protected health
information (PHI), private details, patents, data, and so on. Without a dedicated cybersecurity
strategy, your firm is a soft target for hackers who want to steal sensitive information.

Conclusion
You may minimize the likelihood of a data leak occurring by concentrating on its prevention by
making investments in cybersecurity. Individuals and businesses may be able to thwart hackers
and protect their data by making an investment in cybersecurity software, using a virtual private
network (VPN), and being familiar with typical attack strategies.

References

You might also like