z-logo
open-access-imgOpen Access
Cybersecurity Assessments
Author(s) -
Sanjana Gadalay
Publication year - 2020
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.d5004.119420
Subject(s) - computer security , risk analysis (engineering) , business , harm , supply chain , risk management , computer science , finance , marketing , political science , law
The purpose of this study is to review the existing cybersecurity assessments and practices used by technology companies to protect their assets from potential harm and damage. Today, the software systems have thousands of vulnerabilities and, when breached, can cost the companies millions of dollars. A clear path for identifying risks, detecting threats, and responding to them is imperative. However, it is not easy to quantify cybersecurity risks as the networks and networks of networks are becoming complicated and, so most risk assessments use relevant parameters to calculate a risk score. If this score is high, it has a high impact on the critical systems. This knowledge helps hi-tech companies such as finance, banking, healthcare, defense, and supply-chain sectors to prioritize their actions and investments effectively. This study examines the risk assessment strategies and steps that companies adopt across the software development lifecycle (SDLC) to stay ahead of cybersecurity risks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here