Cyber Security: Protecting Your Systems And Data

BIT503 Cyber Security System

Understanding Cyber Security

Cyber security or computer security can be defined as the proper protection of various computer systems from being damaged or theft to the respective software, hardware or any form of electronic data (Von Solms & Van Niekerk, 2013). Moreover, this type of security is also effective to disruption as well as misdirection of services, they are providing. This cyber security even involves perfect control of physical access to the system hardware and also securing from harm that could be done through access of network, injection of code and malicious data. Due to the malpractices by various operators, irrespective of the fact that it is accidental or intentional, the personnel of IT security could be tricked from deviation of the secure processes (Wang & Lu, 2013). The wireless networks like Wireless Fidelity and Bluetooth are utilized for the means of cyber security.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The following report outlines a brief discussion on the cyber security and being the analyst of cyber security in the new organization or Skyward Company. This is mainly because to prepare a proper briefing for the executive management. The CIO or chief information officer contains of the understanding of IT or information technology. Relevant details will be provided in this report.

Cyber security is the perfect security of the Internet connected systems that comprise of the software, hardware or data from any type of cyber attack (Hahn et al., 2013). The security consists of physical security and cyber security for protecting against the unauthorized access to the data centres or the other computerized systems. This type of security is for maintaining the integrity, availability and confidentiality of data. The cyber security analyst comprises of various important and significant responsibilities. The first and the foremost responsibility of a security analyst is to plan, implement as well as upgrade the security measures or controls (Amin et al., 2013). Moreover, various plans or protocols are also established for the protection of information systems and digital files from the destruction, unauthorized access and modification of data. The data is maintained and monitored from the security access. The vulnerability testing is performed properly. The other important responsibilities of a cyber security analyst mainly include conducting internal and external security audits, analysis of security breaches, managing network, prevention systems and intrusion detection. The major cause of security breach is detected by analysis. The corporate security policies are properly defined maintained and implemented by the cyber security analyst (Elmaghraby & Losavio, 2014). Appropriate tools or counter measures are installed and recommended by cyber security analyst.

The Role of a Cyber Security Analyst


To build a secure and resilient cyberspace for Skyward Co.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper


To protect information as well as information infrastructure in the cyber space, to respond or prevent from cyber threats or attacks and to reduce or diminish vulnerabilities or minimize damage from the cyber incidents in Skyward Co.


  1. i) To create secured cyber environment for the employees of Skyward Co.
  2. ii) To secure information and information infrastructure for Skyward Co.

iii) To create an assurance framework for design of security policies and for promotion and enabling actions for compliance to global security standards and best practices by way of conformity assessment in Skyward Co (Buczak & Guven, 2016).

  1. iv) To make stronger Regulatory framework to ensure secured cyber environment.
  2. v) To enhance as well as create mechanisms to obtain strategic information about threats or attacks to the ICT infrastructure and hence scenarios should be created for crisis management in an effective manner in Skyward Co (Dunn Cavelty, 2013).
  3. v) To improve the visibility of integrity of various products or services of ICT by the establishment of testing or validation of product security in Skyward Co.


  1. i) Creation of secured cyber environment: This is the first and foremost strategy for the Skyward Co. Being the cyber security analyst, all the matters that are related to the cyber security are well coordinated (Sommestad, Ekstedt & Holm, 2013). Moreover, the CIO or chief information officer would encourage all private or public departments for the efforts of cyber security and initiatives. A particular budget should be maintained for the implementation of cyber security initiatives and thus to meet the emergency response in any type of cyber incident. Furthermore, a specific mechanism should be established to share important information and also to identify or respond to the incidents of cyber security (Wells et al., 2014). Proper guidelines should be adopted by Skyward Co for providing procurement of the indigenously manufactured products of ICT.
  2. ii) Creation of Assurance Framework: The second important strategy for the organization of Skyward Co. is that an assurance framework should be created properly. The adoption of the information security or compliance should be promoted properly for enhancing posture of cyber security. The infrastructure should also be created in certification of the cyber security guidelines or standards. A proper risk management process or plan should also be undertaken by the organization of Skyward Co (Cavelty, 2014). Moreover, the cyber crisis management plan should also be made by them. The software development process must be ensured and for securing the application. A conformity assessment framework should be created for the periodic verification of compliance for cyber security. The information technology systems are to be ensured with security or compliance. The networks would also be secured with this.

iii) Encouraging Open Standards: The next important and significant strategy for the organization of Skyward Co is the encouragement of the open standards. The interoperability is well facilitated and the exchange of data within several products and services (McGraw, 2013). The enhancement of the certified information technology services or products on the basis of the open standards should be done properly.

  1. iv) Strengthening the Regulatory framework: The final important strategy for Skyward Co is the strengthening of the regulatory framework. A dynamic legal framework is properly developed and all the cyber security issues or challenges are well addressed within the cyber space (Elmaghraby & Losavio, 2014). The international frameworks are harmonized for the Internet governance. A proper awareness is enabled of this regulatory framework.

Skyward Co has an extremely strong impact of cyber security policy. This type of policy would be extremely effective for them. The various recommendations for the organization of Skyward Co are given below:

  1. i) The network designs and the topologies should be properly analyzed by them.
  2. ii) The second recommendation is to update the architectures, infrastructure and protocols of Skyward Co.

iii) The network should be completely wireless for saving money or time.


Therefore, from the above discussion, it can be concluded that cyber security can be easily defined to the set of tools or techniques that are utilized for the protection of integrity of networks, data or programs from unauthorized access, damage or attack. The fast growth of market is significantly fuelled by the array of various trends of technology that includes several security requirements. The major requirements of cyber security are IoT or internet of things and BYOD or bring your own device. The fast adoption of the cloud based applications or workloads that extend security needs or requirements beyond data centre and mandates of data protection like NIST or National Institute of Security Technology Cyber Security Framework and General Data Protection Regulation. The most significant functionality of the cyber security majorly includes protection of systems or information from the several cyber threats and cyber risks. All of these cyber risks could be taking various forms like malware ransom ware, application attacks, phishing and many more. The cyber adversaries comprise of the role for launching automated as well as sophisticated attacks by utilizing all the tactics at extremely lower costs. Some of the most common forms of cyber threats are cyber terrorism, cyber warfare and cyber espionage. The above report has clearly outlined a cyber security policy for the organization of Skyward Company. Significant details are provided within the report.


Amin, S., Litrico, X., Sastry, S., & Bayen, A. M. (2013). Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 21(5), 1963-1970.

Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.

Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701-715.

Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105-122.

Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-497.

Hahn, A., Ashok, A., Sridhar, S., & Govindarasu, M. (2013). Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions on Smart Grid, 4(2), 847-855.

McGraw, G. (2013). Cyber war is inevitable (unless we build security in). Journal of Strategic Studies, 36(1), 109-119.

Sommestad, T., Ekstedt, M., & Holm, H. (2013). The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures. IEEE Systems Journal, 7(3), 363-373.

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.

Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344-1371.

Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), 74-77.