Cyber Control and Compliance: Models and Systems Report (Assessment)

Exclusively available on Available only on IvyPanda® Made by Human No AI

The seven elements of the brewer Security Matrix are as follows:

  • organizational cyber compliance can be enhanced through the following elements.
  • Identification-assist in detecting the compliance level of an organization.
  • Authentication-refers to the process of establishing the suitability of control measures.
  • Authorization-important in executing commands of a system.
  • Access Control-regulating the ease with each a system can be accessed.
  • Administration-management of the compliance system.
  • Auditing-carrying our appraisal of the system.
  • Assessment-evaluating whether an organization has fully complied.

The Sarbanes-Oxley Act of 2003 helps with internal controls and reporting by enhancing corporate transparency. It was enacted and adopted as an accountability la to corporations when reporting (Sarbanes-Oxley Act, 2009). The Act compels organizations to give the most accurate and precise company reports and if they fail to do so, they are held liable for poor reporting. Therefore, this piece of legislation greatly assists in improving the state of internal controls through accurate reporting. Audit reports and even those capturing data on cybersecurity compliance are under check courtesy of the Act.

Knowledgebase and inference engine are the two critical components of an expert system. However, it is worthy to note that both components utilize artificial intelligence platform. When it comes to internal controls and reporting in cybersecurity, facts and rules are required and therefore must be used (Göztepe, 2012). The latter is generated from the knowledge base component of the expert system.

Thereafter, the known facts are fed with the rules based on the information gathered from the inference engine. Also, there are instances when debugging capabilities and descriptions may be part and parcel of inference engines. The high cost of operation stands out as the main disadvantage of expert systems in security reporting and controls. For instance, any expert system should be managed by a team of well-trained professionals. Besides, such systems consume a lot of time before the final reports can be eventually generated. However,

An expert system improves the capabilities of an organization to run resilient, dependable information and communication platforms. Better still; expert systems can swiftly counter complex cyberspace threats in addition to ensuring secure access to cyberspace (Whitman & Mattord, 2011). Two main measurement approaches used in internal cyber controls include the time of detection of a threat and time before internal fines are executed. This implies that time metric is a crucial measurement that cannot be ignored at all when monitoring and generally managing internal cyber control.

Cyber compliance requires the fulfillment of certain standards and performance targets (Darius & Valdas, 2012). In other words, compliance does not come at a cheap cost. In any case, the safety of organizations largely depends on the compliance standards and performance goals that have been put up in place. Countrywide and industry safety also rely on existing compliance standards. One of the most outstanding benchmarks is the Security compliance framework. Internal controls and auditing should be done regularly. The Sarbanes-Oxley Act of 2000 also sets forth a performance dashboard that can be emulated by organizations.

International information security regulations should be harmonized so that all forms of controls and reporting are carried out correctly. Besides, accuracy is vital when it comes to security regulations on the global platform since better methods of addressing existing and emerging threats can be attained in a harmonized platform.

If individual nations forge their own information security regulatory measures, it is highly likely that some controls may be duplicated or even monitored by attackers. A unified approach enhances vibrancy and efficiency in security regulations (Eastton & Taylor, 2011). The latter ideal can only be achieved by harmonizing global information security control systems.

References

Darius, Š. & Valdas, K. (2012). The Regulation of the Security of Electronic Information in Lithuania and Russia: the Comparative Aspects. Social Technologies, 3(2), 441.

Eastton, C., & Taylor, J. (2011). Computer Crime, Investigation, and the Law. Boston, MA: Course Technology, Cengage Learning.

Göztepe, K. (2012). Designing a Fuzzy Rule Based Expert System for Cyber Security. International Journal of Information Security Science, 1(1), 13-19.

. (2009). Web.

Whitman, M. E., & Mattord, H. (2011). Reading & Cases in Information Security: Law & Ethics. Boston, MA: Course Technology, Cengage Learning.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, August 9). Cyber Control and Compliance: Models and Systems. https://ivypanda.com/essays/cyber-control-and-compliance-models-and-systems/

Work Cited

"Cyber Control and Compliance: Models and Systems." IvyPanda, 9 Aug. 2020, ivypanda.com/essays/cyber-control-and-compliance-models-and-systems/.

References

IvyPanda. (2020) 'Cyber Control and Compliance: Models and Systems'. 9 August.

References

IvyPanda. 2020. "Cyber Control and Compliance: Models and Systems." August 9, 2020. https://ivypanda.com/essays/cyber-control-and-compliance-models-and-systems/.

1. IvyPanda. "Cyber Control and Compliance: Models and Systems." August 9, 2020. https://ivypanda.com/essays/cyber-control-and-compliance-models-and-systems/.


Bibliography


IvyPanda. "Cyber Control and Compliance: Models and Systems." August 9, 2020. https://ivypanda.com/essays/cyber-control-and-compliance-models-and-systems/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1