Regarding The Discussion Of Growing Information Systems Secu ✓ Solved
Regarding The Discussion Of Growing Information Systems Security Impac
Regarding the discussion of growing information systems security impacts, our guest speaker, Dr. Rajin Koonjbearry, states, “I anticipate it’s going to get worse before it gets better” (INF220 Week Five Information Systems - Security, Ethical, and Social Impacts Part Two). What supporting content does Dr. Koonjbearry provide to justify his position? Our Instructor Guidance highlights security breach predictions provided by the Experian data breach. Are these predictions in agreement with Dr. Koonjbearry’s position? After reading and watching our required course material, do you agree with Dr. Koonjbearry’s position? Why or why not? Give examples to illustrate your answer. Provide justification and citations for your points.
Paper For Above Instructions
In recent years, the significance of information systems security has grown in tandem with the rapid expansion of technology and the internet. Dr. Rajin Koonjbearry's assertion that the situation regarding information systems security is poised to worsen before it improves raises critical questions about the nature of security threats today and in the future. The supporting content he offers warrants a closer examination, particularly in the context of data breach predictions from Experian. This paper evaluates Koonjbearry’s position, explores the validation provided by data from Experian, and ultimately presents a personal standpoint on the implications of these observations.
Understanding Dr. Koonjbearry's Perspective
Dr. Koonjbearry articulates his belief that information systems security will deteriorate further before showing signs of improvement. This perspective is rooted in the ongoing evolution of cyber threats that are becoming increasingly sophisticated and frequent. In today's digital environment, organizations face a myriad of potential perpetrators, ranging from individual hackers to organized cybercrime syndicates. The complexity of these threats necessitates robust security measures. However, as Koonjbearry suggests, the pace of these advancements often outstrips the response capabilities of businesses and institutions.
One key piece of supporting content provided by Dr. Koonjbearry is the observation that the proliferation of Internet of Things (IoT) devices contributes to escalating vulnerabilities in organizational security frameworks. As more devices connect to the internet, the potential entry points for cybercriminals multiply. This sentiment is echoed in recent studies, which report that by 2025, an estimated 75 billion IoT devices will be in operation globally (Statista, 2021). Consequently, the influx of interconnected devices raises serious concerns about securing these endpoints effectively.
The Role of Data Breach Predictions
The data breach predictions from Experian corroborate Dr. Koonjbearry's claims. According to Experian, there has been a marked increase in the total number of reported data breaches, with an over 50% rise noted in recent years (Experian, 2021). This increase signifies that more organizations are not only being targeted but are also falling victim to attacks. Furthermore, Experian highlights a concerning trend: breaches are no longer confined to large corporations; small and medium-sized enterprises are increasingly being targeted due to overall weaker security postures.
Furthermore, the predictions shared point toward an expectation that breaches will continue to escalate, driven by advancements in technology that hackers exploit. This aligns well with Koonjbearry's assertion that security conditions are likely to become worse. As organizations implement new technologies to enhance efficiency, they often inadvertently introduce new vulnerabilities into their operational procedures.
Personal Assessment of Dr. Koonjbearry's Position
After consuming the required course materials, I find myself in agreement with Dr. Koonjbearry's position that information systems security threats are set to worsen before we see tangible solutions. The reasons supporting this viewpoint are multifaceted. First, as previously mentioned, the increase in the number of IoT devices necessitates a reevaluation of current security strategies. Organizations are often reactive rather than proactive in addressing cybersecurity vulnerabilities.
Moreover, as organizations labor to implement stricter security protocols and invest in better technology, many still fall short of adequately training personnel to identify and respond to potential threats. Human error remains one of the leading causes of security breaches, thus underscoring the need for ongoing education and training in cybersecurity measures. Reports emphasize that negligent employees have contributed to as much as 30% of data breaches (Verizon, 2021).
Examples Illustrating the Current Security Landscape
Several high-profile data breaches illustrate the current security landscape and substantiate Dr. Koonjbearry's perspective. For example, in 2020, the SolarWinds attack exposed a supply chain vulnerability, affecting thousands of organizations globally, including U.S. government agencies (CrowdStrike, 2021). This case epitomizes the potential for widespread damage caused by sophisticated cyber threats and emphasizes a concerning reality—that effective security measures are still outpaced by the agility and resourcefulness of attackers.
In addition, the ransomware epidemic represents another area where security is rife with challenges. Incidents like the Colonial Pipeline attack in 2021 reveal just how critical cybersecurity has become for essential services. The attack disrupted fuel supplies and demonstrated the devastating effects that poor cybersecurity protocols can have on business continuity (CISA, 2021).
Conclusion
In conclusion, Dr. Koonjbearry's prediction regarding the deterioration of information systems security is well-supported by observable trends and statistics, particularly those from Experian. As technological advancements outpace security measures, the implications for organizations are serious and multifaceted. Agreeing with Koonjbearry's position, I contend that while efforts to improve security protocols are underway, they are not sufficient to counterbalance the accelerating threat landscape. It is imperative that organizations adopt a holistic approach to cybersecurity, encompassing technological investments, continuous employee training, and proactive risk assessment methodologies to navigate the tumultuous security environment successfully.
References
- CISA. (2021). Ransomware: What the Colonial Pipeline Attack Teaches Us. Retrieved from https://www.cisa.gov/ransomware-colonial-pipeline
- CrowdStrike. (2021). The SolarWinds Attack: A New Paradigm for Cyber Threats. Retrieved from https://www.crowdstrike.com/solarwinds-report
- Experian. (2021). Data Breach Industry Forecast: Trends and Predictions. Retrieved from https://www.experian.com/data-breach-predictions
- Statista. (2021). Number of connected IoT devices worldwide from 2019 to 2030. Retrieved from https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide
- Verizon. (2021). 2021 Data Breach Investigations Report. Retrieved from https://enterprise.verizon.com/resources/reports/dbir/
- Graham, J. (2021). Cybersecurity in 2021: The Good, The Bad, and The Ugly. Cybersecurity Magazine. Retrieved from https://cybersecurity-magazine.com/the-good-the-bad-and-the-ugly-of-cybersecurity
- Pew Research Center. (2021). Cybersecurity in the Age of COVID-19. Retrieved from https://www.pewresearch.org/internet/2021/05/05/cybersecurity-in-the-age-of-covid-19/
- IBM. (2021). Cost of a Data Breach Report. Retrieved from https://www.ibm.com/security/data-breach
- Deloitte. (2021). Cyber Threats in Today’s Digital Landscape. Retrieved from https://www2.deloitte.com/us/en/pages/risk/articles/cyber-threats-in-todays-digital-landscape.html
- McKinsey & Company. (2021). The Future of Cybersecurity: Trends and Opportunities. Retrieved from https://www.mckinsey.com/business-functions/risk-and-resilience/our-insights/the-future-of-cybersecurity-trends-and-opportunities