Introduction
According to , Cyber Security is the protection of electronic information communication systems against confidentiality, integrity and availability issues. This paper will answer two questions about cyber security.
Question 2: Vulnerable area: smart grid
A smart grid is a digital technology that delivers electricity from suppliers to consumers for purpose of saving energy, reducing cost and increasing reliability and transparency. Threats occur in smart grid due to its complexity, large number of users, and time‐sensitive operations. According to these threats include; malware spreading whereby, an attacker develops malware and spreads it to infect smart meters, secondly, is access through database links where recorded activities in a database of control system are accessed through a network. Thirdly, is injecting false information, network availability, eavesdropping, and lastly is compromising communication equipment.
According to ,effective management policies that counter the risks are ensuring confidentiality by ensuring that sensitive information is not disclosed to unauthorized individuals, ensuring integrity by guarding against improper information modification or destruction, ensuring availability by ensuring there is timely and reliable access to and use of information. Lastly, is accountability by ensuring security goal is reached to generate requirement for actions.
Question 3: Mitigating global cyber security attacks on the enterprise
In order to mitigate attacks globally, have listed policies such as effective governance by centralizing coordination of security and promoting effective cooperation between public and private sector, reviewing and establishing legislative and regulatory frameworks to ensure legislation is in harmony, and development of cyber security technology frameworks that specifies requirement controls for any attack.
Also, documented that, security policy expresses the management’s commitment to securing critical assets and provides the framework for developing, implementing, and enforcing security controls, policy documents must be available to all personnel who are required to comply with its requirements and lastly, review and update the policy periodically.
References
Aloula, F. A.-A.-D.-M. (2012, September). Smart Grid Security: Threats, Vulnerabilities and Solutions. International Journal of Smart Grid and Clean Energy, 1(1).
Ghansah, I. (2012). Smart grid Cyber Security, Potential threats, vulnerabilities and risks. Sacramento: California State University Sacramento.
Lebanidze, E. (2011). Guide to Developing a Cyber Security and Risk Mitigation Plan. Wilson Boulevard, Arlington: National Rural Electric Cooperative Association.
MOSTI. (2012). NITC Malaysia: National Cyber-Security Policy. Retrieved from http://nitc.mosti.gov.my/nitc_beta/index.php/national-ict-policies/national-cyber-security-policy-ncsp