Monday, December 9, 2019

Importance of Healthy Cyber Eco-system

Question: Discuss the importance of a healthy cyber eco system. Answer: Similar to the natural ecosystem, cyber ecosystem also comprises different components that interact between them for different purposes. Therefore in order to protect the data that resides in those devices and components it is important to protect those devices by providing distributed security mechanisms to those devices. A healthy cyber eco system provides several capabilities to a net work of computing devices. Like automation, situational awareness, risk based database management, monitoring of users behavior based on specific business rules and authentication (Hiller, 2013). As todays security cyber security mechanisms are not capable of providing integrated security mechanisms for all the devices in a network. It is able to provide automation to the speed of response according to the speed of attack. A healthy cyber eco system is capable of employing automation strategy to the local defenses that are supported by global and mobile defenses at different levels. This strategy enables the users and organizations to sustain from different security attacks by providing rapid incident detection and response mechanism.in addition to that it also helps in taking preventive mechanisms proactively to protect the cyber environment (Guan, Zhang Zhang, 2013). Therefore, it can be stated that, a healthy cyber ecosystem is helpful in developing cyber resilience. Hence it helps different components to powerfully resist different threats from accessing the network, react and recover against the severe security threats to the network. In addition to this, interoperability is another advantage of having a healthy cyber eco system. This provides the network; the ability of distributed threat detection across the devices so that they can collaborate with each other to defend the system from the insider attacks, remote network based attacks and different physical attacks. The defense system in a healthy cyber eco system can anticipate any complex security attack on the IT infrastructure and take action against it with agility and if affected then recover rapidly. Another building block of a healthy cyber eco system is authentication. Authentication is one of the crucial parts in cyber security so that it can be ensured that, while communicating and exchanging data between two parties in a cyber-environment both the parties are accountable for their actions in the whole process (Guan, Zhang Zhang, 2013). All this attributes of a healthy cyber eco system helps the users in the environment to be self-aware, so that they can gather information about the security properties and draw conclusions and decisions based on the analysis of those information. Moreover, it ensures the secure exchange of the data to authenticate and identify the all the participants to minimize the intrusion and the impact of the insiders attacks (Craigen Whyte, 2013). A cyber eco system with such abilities becomes self-defending infrastructure that is able to take more risks and can be more exposed to different security threats. in addition to this a healthy eco system can provide mutually reinforced security, reliability and usability of the components involved in the cyber eco system. References Asamoah, C., Tao, L., Gai, K., Jiang, N. (2016, June). Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph. In2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)(pp. 240-246). IEEE Craigen, D., Whyte, D. (2013). Securing Canada's Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research.Technology Innovation Management Review,3(7), 12. Guan, X., Zhang, Z., Zhang, S. (2013). Structure Evolution Mechanism Analysis of Ecosystem of Cyber-society Based on Hyper Cycle Theory.International Journal of u-and e-Service, Science and Technology,6(5), 145-158 Hiller, J. S. (2013, June). Legal aspects of a cyber immune system. InCyber Conflict (CyCon), 2013 5th International Conference on(pp. 1-15). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.