Get Best Essay Written by US Essay Writers
loader
Phone no. Missing!

Please enter phone for your order updates and other important order related communication.

Add File

Files Missing!

Please upload all relevant files for quick & complete assistance.

scroll
In post-covid-19 times, an increased level of intrusion around university websites are identified (Okereafor 2021). Thus, protecting itself from the cyber-attacks have become important to a greater instance. In order to protect itself from a cyber-attack. University of Greenwich needs to update their existing anti-malware software as the dimension of cyber-attacks are being changed rapidly. Additionally, applying proper patches and updates to the existing sites to keep it safe from the intruders can be focused by the university to protect itself from a cyber-attack. These patches usually helps preventing exploitation of known vulnerabilities in overall systems as well third-party applications. Moreover, the university can focus on implementing access control as their workforce is significantly large and this control parameter will provide a proper idea on entry points and responsible person who have entered them. In addition to that, seeking update about the recent threat intelligence can be considered as another important element as it can help setting exemplary ideas on the methods of cyber-attacks (Lewis 2018). Furthermore, continuous updates of the cybersecurity incident response plans can be highlighted as another crucial element of consideration for improving their current level of protection against cyber-threats. In addition, performing an information assessment and asset assessment to understand the level of tolerance and conveying the same to the responsible entities can be done by the organisation as it will help in a knowledge-backed idea on further improvement process implementation.
 

References


Lewis, J.A., 2018. Rethinking cybersecurity: strategy, mass effect, and states. Rowman & Littlefield.
 
 
Okereafor, K., 2021. Addressing Post-COVID Cybersecurity at Universities. eLearning Africa Cybersecurity Conference. 1(2), pp.12-21. 
 
 
Benson, V. and McAlaney, J. eds., 2019. Emerging cyber threats and cognitive vulnerabilities. Academic Press.
 
 
Chapman, J., 2019. How Safe is Your Data?: Cyber-security in Higher Education (Vol. 12, pp. 1-6). Oxford, UK: Higher Education Policy Institute.
 
 
Kaloudi, N. and Li, J., 2020. The ai-based cyber threat landscape: A survey. ACM Computing Surveys (CSUR), 53(1), pp.1-34.
 
 
Lakshmanan, A., 2019. Literature review on Cyber Crimes and its Prevention Mechanisms. no. February. pp, pp.1-5.
 
 
Mandritsa, I.V., Peleshenko, V.I., Mandritsa, O.V., Fensel, A., Tebueva, F.B., Petrenko, V.I., Solovieva, I.V. and Mecella, M., 2018. Defining a cybersecurity strategy of an organization: criteria, objectives and functions. In В сборнике: Integrating Research Agendas and Devising Joint Challenges. International Multidisciplinary Symposium ICT Research in Russian Federation and Europe (pp. 199-205).
 
 
Yang, S.H., Cao, Y., Wang, Y., Zhou, C., Yue, L. and Zhang, Y., 2021. Harmonizing safety and security risk analysis and prevention in cyber-physical systems. Process safety and environmental protection, 148, pp.1279-1291.
scroll

Hurry and fill the order form

Say goodbye to dreadful deadlines