As we all know, cyber attacks are on the rise as technology keeps evolving. The approach of cyber policies and infrastructure should depend on the risks and vulnerabilities a company has. The NIST cybersecurity framework is a very useful guideline because it provides an understanding of the risks associated with using technology, and the correct responses the company can take to manage cyber attacks. One of the activities associated with the NIST cybersecurity framework is identify. Identify can be seen as organizing the information of these technology risks for the employees to completely understand the importance of a risk management strategy. It can also be used to bring a focus to assessing the management of the business and their needs, also the resources that an organization can use when in need of cyber support during a cyber attack.
Another activity in the NIST cybersecurity framework is detect. Detect is an activity that involves the identification of a cybersecurity attack, it develops the necessary functions to monitor events. It can be very useful in discovering a threat, it is always beneficial for the company to catch a threat early on so they can take early action. Understanding the risks and vulnerabilities associated with your company is the best you can do to establish cyber policies and infrastructure because it gives a sense of what the company needs to do to prevent a cyber attack.
Interactions between offenders and victims in general has not always been pretty, but with the advancement of technology these days it has impacted the relationship to a level like never before. Mostly everyone is on their mobile device nowadays, with teenagers being the most active users. Cyber stalkers can impact the victims life just by sending unwanted messages to their electronic device. These unwanted electronic communications can make the victim feel like they have anxiety and no control over their life because they constantly see disturbing messages pop up on their device all the time.
Sources: http://www.cybercrimejournal.com/hazelwoodkoonmagninijcc2013vol7issue2.pdf
https://drive.google.com/file/d/1wPp9kofp-gdlu3NAisszeM8d8ko1djF1/view
Leave a Reply