International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Reviewer Referral Program
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 6 Issue 6
November-December 2024
Indexing Partners
Cyber Security Risk Management
Author(s) | Mohammed Mustafa Khan |
---|---|
Country | USA |
Abstract | Until organizations establish and implement necessary cyber security risk management programs, they lack assurance that their security controls are operating as expected. Additionally, organizations without cyber security risk management activities are left in the dark. They are not cognizant of information security vulnerabilities and threats impacting mission-critical operations until service disruption occurs. Most organizations mistakenly perform risk management as a one-and-done activity. They conduct risk assessments once and put them aside for a long time as they get engaged in their day-to-day operations; little did they know that their daily operations involved risks. Cyber security risk management is not a destination but an ever-ending journey that ensures the business operations are secure and maintains an acceptable level of risk in case cyber security disasters strike them. The threat landscape is ever-changing, elevating the level of risk for organizations. As organizations shift their operating environments from the Prem environment to cloud and containerized platforms, the attack surfaces are extended; thus, risk exposure is adversely increased with all these transitions. For instance, any time a new device is added to the network, it signals an additional potential risk. Threat exposure has become a dynamic factor, so organizations must normalize evaluating their risk by adopting and implementing a cyber security risk management strategy. |
Keywords | Cyber Security, Risk Management, Vulnerability, Threats |
Published In | Volume 6, Issue 4, July-August 2024 |
Published On | 2024-08-27 |
Cite This | Cyber Security Risk Management - Mohammed Mustafa Khan - IJFMR Volume 6, Issue 4, July-August 2024. DOI 10.36948/ijfmr.2024.v06i04.23754 |
DOI | https://doi.org/10.36948/ijfmr.2024.v06i04.23754 |
Short DOI | https://doi.org/g8k5v2 |
Share this
E-ISSN 2582-2160
doi
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.