Order Number |
6438594251 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
Based on the sophisticated nature of today’s cyber-attack, it is prudent to diversify the security approach. Diversity should focus on all components of the IT system bearing the wider scope of the modern cyber technology. Since organizations are using the connected devices, the internet of things and the cloud system, the security diversity should broaden its scope to cover all these components (Sandhya & Sushila, 2017). On the other hand, the security strategy should be proactive in the sense that it should strive to prevent the insecurity event than rather focusing on the real even.
The basic security guidelines bulleted at the conclusion section, are sound and any organizations implement all of them if possible. Even more significantly, the security policy should focus on machine learning ability, storage power, and data mining techniques since it is from these concepts the current security pitfalls lie (Sandhya & Sushila, 2017). An organization should analyze the security risks associated with cloud computing, virtualizations, and big data to build an effective security strategy. Finally, the reason why I think the author highlighted the most important security approaches is the fact that the best security strategy should focus on the direction the future cyberattacks are likely to take. It means that an organization should build its security strategy based on the future scope of security implications.
Given paper deals with the change in cyber security and the reasons for the requirement of such change. Cyber security is increasingly becoming as necessity in today’s data dominated world. With the increasing data, the need to protect data is also increasing. Cyber security is crucial since the data created by various fields like bio informatics, Government researches, classified projects, banking etc. is sensitive. Paper also briefs about the High Performance computing, and how it is important to have more robust cyber security system for the better function of the HPCs and protection of the enormous data created by it.
Conclusions drawn in this paper are partially aligned with the requirement of cyber security in nonspecific way. That is each conclusion is general and superficial without any specificity. Requirement of better cyber security in different fields should be addressed in depth. Merely concluding “cyber security should be more pro active and dynamic”, not necessarily concludes anything. It is a go to conclusion for any cyber security paper. However, the other conclusions like building intelligent cyber security by exploiting the predictive powers of machine learning and data mining is predictive in nature and is highly researched upon.
Virtual dispersive technology, use of data mining and machine learning for the building of early warning systems are innovative techniques and ideas. But the actual know-how of the mentioned advancements is not touched in the paper. What paper actually doing here is to run through the various bottlenecks/pitfalls in cyber security and explains how cyber security goes out of date with many technological advancements and restless new attack methods by the hackers to get hold of data. But the Intelligent cyber security solutions are mere mentions o vaguely explained.