{"id":406,"date":"2023-11-12T21:24:35","date_gmt":"2023-11-12T21:24:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?p=406"},"modified":"2023-12-06T16:41:19","modified_gmt":"2023-12-06T16:41:19","slug":"use-the-article-the-state-of-industrial-cybersecurity-2017links-to-an-external-site-to-assist-in-your-answer","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2023\/11\/12\/use-the-article-the-state-of-industrial-cybersecurity-2017links-to-an-external-site-to-assist-in-your-answer\/","title":{"rendered":"Use the\u00a0article &#8220;The State of Industrial Cybersecurity\u00a02017 to assist in your answer."},"content":{"rendered":"\n<p>Provide your understanding of this report on Industrial Cybersecurity.&nbsp;Also,&nbsp;what are the impacts of a security breach on a company? Are organizations prepared for this type of threat?<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>According to the article from my perspective, companies overall underestimate the damage or result of<br>a cybersecurity attack and are typically ill-prepared. Some impacts include, but are not limited to:<\/p>\n\n\n\n<ul>\n<li>Costing Lives<\/li>\n\n\n\n<li>Impact on the environment<\/li>\n\n\n\n<li>Attracting fines<\/li>\n\n\n\n<li>Putting customers at risk<\/li>\n\n\n\n<li>Loss of product or services<\/li>\n\n\n\n<li>Business shuts down.<\/li>\n<\/ul>\n\n\n\n<p>Based on the survey listed breaches are attempted all the time and many have been successful in<br>2017. The impacts can be due to customer information being leaked or products that affect customers.<br>For an oil or gas company, this affects consumers and can greatly impact the environment and cause loss of<br>product. From the numbers listed Target attacks were the number one reason a threat occurred, and<br>human error was third. However, organizations listed target attacks as the fifth biggest concern, and<br>human error was third from their perspective.<br>Of the companies listed the reports indicate most incidents happened at least twice, but there was also<br>a percentage that experienced 11 or more attacks within a year. Another chart also listed that half the<br>companies were mostly prepared, but there were still vulnerabilities, and 17% were not prepared at all.<br>It seems as if the companies are figuring out after the attack happens instead of being prepared to fight<br>it when it happens. Instead of looking at the data such as the main cause of the attacks they are sticking<br>to their assumptions and not actually adjusting to the facts. According to an employee, most smaller<br>companies are worried about the number and do not consider the effects and benefits of using certain<br>tools. Instead of preventing a threat they attempt to stop it by not having the staff dedicated to identifying<br>it sooner.<\/p>\n\n\n\n<p>Advantage, B. (2017).&nbsp;<em>The State of industrial cybersecurity 2017<\/em>. Kaspersky. https:\/\/go.kaspersky.com\/rs\/802-IJN-240\/images\/ICS%20WHITE%20PAPER.pdf<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Provide your understanding of this report on Industrial Cybersecurity.&nbsp;Also,&nbsp;what are the impacts of a security breach on a company? Are organizations prepared for this type of threat? According to the article from my perspective, companies overall underestimate the damage or&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2023\/11\/12\/use-the-article-the-state-of-industrial-cybersecurity-2017links-to-an-external-site-to-assist-in-your-answer\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/406"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=406"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/406\/revisions"}],"predecessor-version":[{"id":464,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/406\/revisions\/464"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/categories?post=406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/tags?post=406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}