100% (1)
page:
8 pages/≈2200 words
Sources:
5
Style:
Harvard
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 58.32
Topic:

Developing Feasible Practice Principles for Internet Services Providers (ISPs)

Coursework Instructions:

Please note. This assignment is a continuation on the first part of the project which was mainly centred on the Infographic which has now been submitted. But the research part was not submitted. This 2nd part relates to report writing which is a continuation, a build up on the infographic. I suppose you can use that in conjunction to build this commentary report. Hope you still have it in hand, else let me know and I can forward it to you. Hope it makes sense. Please let me know if not clear.
Thanks

Coursework Sample Content Preview:

Principles and Procedures Associated with Cybersecurity in Internet Service Providers
Student Name
Course
Professor
Institution
Date
Principles and Procedures Associated with Cybersecurity in Internet Service Providers
Introduction
It is increasingly important to highlight and appraise policies and measures pioneered within specific entities that have proved capable of generating impact in reducing cybersecurity threats. Cybersecurity principles and procedures provides a framework for managing networks within organizations. That said, it is essential for organizations to develop their capacity to address most mainstream cyber security threats at their source to safeguard their clients. Many cyberattacks happen by exploiting comparatively simple weaknesses and could increasingly be identified and reduced before they reach possible victims. This report builds on literature to develop a set of feasible practice principles for Internet Services Providers (ISPs) as well as other entities involved in providing and supporting online communications.
Rationale for Subject Choice
It is important to develop and understand optimal practice principles for ISPs and other related organizations. The rationale is to make it significantly more challenging for online criminals to unlawfully derive benefits from unsuspecting members of the public. In that way, this report seeks to enhance collaborations across private and public sectors to create a “barrier to entry” for attackers more strong. The report would lead a fundamental shift to cybersecurity understanding and deterrence measures and thus enhance the digital economy. Extant literature describes the impact of cybercrimes across the globe to the magnitude of the threat (Jordan, 2020). The financial implications of cybercrime on individuals and businesses continues to rise, with Accenture estimating the cybercrime cost to businesses to have risen by 72 percent over the previous five years (Accenture Security, 2019, p.11).
The key cybersecurity issues analyzed here are tailored to capitalize on the fact that profit margins for respective attacks are negligible. Any activity that can be implemented to raise the cost of carrying out a cybercrime or has the potential to undermine organizational profitability, therefore, impacts the criminals’ motivation to conduct attacks and the return on investment respectively. Widespread adoption of comparatively straightforward, industry-centered protocols and practices including those incorporated into the principles will significantly impact on the negative ramifications of cyberattacks. Implementation of these principles and practices would heighten the barrier to entry for malicious parties inclined to carry out attacks and thus mitigate the effect of a considerable number of common online crimes. ISPs and other communication infrastructure and services providers holds a unique position within the online ecosystem (Jordan, 2020, p.5). The principles herein would assist facilitate discourse at diverse levels of these entities about their positioning towards detecting or preventing cybercrime and the degree to which such facilities are partnering to attain shared benefits.
Target Audience
The target audience for the report include ISPs and related organizations, internet services’ customers, and other parties interested in safeguarding their information technology infrastructure. The intention is to offer technical guidance on safeguarding networks and critical infrastructure from outside threats. These principles address critical strategic measures that ISPs can implement to safeguard their clients from mainstream online crimes, thus assisting “clean-up” the internet ecosystem holistically. ISPs customers or other internet users would be better protected if their organization played a critical role in promoting cybersecurity. In addition, these cybersecurity principles and practices would help ISPs to fight cybercrime and enhance their profitability and their sustainability.
Importance of Issue to Cybersecurity
It is important to safeguard consumers from the vast cyberattacks and act collaboratively with other stakeholders and peers to point out and respond to the emergent threats by default. ISPs play a critical role in defense by pointing out and assisting mitigate or prevent vast attacks way before they reach the customer. The chances that an attack would be successful could reduce drastically when ISPS take action. BT’s Cyber Index offers an effective indication of the magnitude of attacks that could be prevented when action is taken at organizational level. Apart from taking action to prevent attacks within their networks, ISPs play a significant role in information sharing with their peer organizations on threats, albeit ensuring that the protection provided to consumers is transparent. Malware is one example of a cybersecurity threat that can be addressed effective at ISP level (Jordan, 2020, p.8). It should be noted that malwares enter a device via contaminated files downloaded online due to successful phishing email and can be exploited to advance or establish attacks.
There are various ways in which personnel vulnerability or weakness could be exploited. However, phishing attacks, where spam emails are shared to users enticing them to share information or read “fake” links are the most common type of social engineering. Therefore, it is important to take action to increase awareness and comprehension of threats as well as support clients in safeguarding themselves and their IT infrastructure and networks. This principle creates impact by expanding the understanding of internet threat vectors that exploit end-user ignorance and offer technical measures and guidance to support clients in safeguarding against the increasingly complex attacks (Jordan, 2020, p.16). Implementing this principle reduces the reputational and financial impact of phishing attacks and the resultant identity theft and fraud.
Accordingly, cybersecurity procedures and principles enhance cybersecurity by enabling ISPs to work collaboratively with vendors and manufacturers of infrastructure, software and hardware to heighten minimal security thresholds. ISPs can play a significant role in establishing momentum and raising awareness to normalize the usage of secure infrastructure and devices. In that way, the principle is important to cybersecurity by reducing possible attacks by criminals seeking to launch attacks and thus mitigate the effect of potential crimes on both ISPs and consumers. Cybersecurity procedures and principles enhance cybersecurity by facilitating ISPs to take actions to shore up routing and signaling security to reinforce effective defense against attacks. In that way, implementing this principle greatly affects the online ecosystem entirely and thus bring efficiency to ISPs that have improved clarity on their relationship with peer organizations and partners (Jordan, 2020, p.5-6). The principle also mitigates the chances of possibly disastrous attacks on certain fundamental pillars of how information sharing via the internet happen. It also decreases lost value and revenues to ISPs.
Impact on society
While reliance on the internet and the digital economy continue to flourish, 68 percent of corporate leaders noted that cybersecurity threats are increasingly escalating. Social engineering fraud indicate a breach of cybersecurity regulations. This implies that the organization suffers from regulatory sanctions or fines due to the cybercrimes. Therefore, all businesses, including ISPs, should ensure that their personnel comprehend cybersecurity threats and the effective app...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!