logo

Cyber Security Framework and Capacity Building for Cyber Security Acculturation

Write a short research report on mobile operating system security.

18 Pages4434 Words292 Views
   

Added on  2023-04-25

About This Document

This report discusses the latest technologies and techniques in cyber security, including tools and techniques, cyber security framework, legal and regulatory framework, compliance and enforcement framework, capacity building and cyber secure acculturation framework, and business development framework.

Cyber Security Framework and Capacity Building for Cyber Security Acculturation

Write a short research report on mobile operating system security.

   Added on 2023-04-25

ShareRelated Documents
Running head: CYBER OPERATION
Cyber Operation
Name of the Student
Name of the University
Author Note:
Cyber Security Framework and Capacity Building for Cyber Security Acculturation_1
1CYBER OPERATION
Abstract
In the last few years, Cyber Security has gained huge amount of importance and has become a
common part of everyone’s life. When people provide their data through online mode, then they
become vulnerable to both cyber attacks or even cybercrimes. Cyber attacks can easily take place
on any DNS server or even internal firewall. It can turn down data and required infrastructure
within the given enterprise which can cause significant to the business of the given organization.
Cyber Security aims to offer proper security from any kind of authorized access or exploitation.
It tends to provide online services to the given data that is associated with the appliance and
network needed for communication. The overall life cycle of cybersecurity can be classified into
different stages. In the coming pages of the report, the latest technologies and techniques have
been discussed in details. A list of justification has been provided with respect to selection of
particular tools and equipments. Various issues have been discussed with respect to installation
and configuration has been discussed in details. The last section of the report deals with social or
ethical issues and standard or legal issues. Ransomware is a well-known cyber-security that tends
to affect the system and backup devices.
Cyber Security Framework and Capacity Building for Cyber Security Acculturation_2
2CYBER OPERATION
Table of Contents
Introduction..........................................................................................................................3
Literature review..................................................................................................................4
Tools and Techniques......................................................................................................4
Cyber –Security Framework............................................................................................5
Legal and Regulatory Framework...............................................................................7
Compliance and Enforcement Framework..................................................................8
Capacity building and Cyber Secure acculturation framework.................................10
Business Development Framework...........................................................................12
Conclusion.........................................................................................................................13
References..........................................................................................................................15
Cyber Security Framework and Capacity Building for Cyber Security Acculturation_3
3CYBER OPERATION
Introduction
Cyber Security is nothing but a complex issue that cuts across various domains. It mainly
cuts up for multi-layer initiatives and multi-layer dimension. It aims to create challenges for
various government which is just because of various domain. It is mainly administered through
ministries and domain (Bada, Sasse and Nurse 2019). Overall development of Information
technology and its ease of application can be easily commercialized due to expansion of
cyberspace. Cybersecurity is all about protecting the required information and the given devices
from any kind of threat. It has ultimately become a part of the organization that collects and
maintains huge database for the information of customer. Apart from this, it aims to provide
social platform where required personal, as well as government information, is submitted. It
helps in describing the fact that how personal and key government information data are protected
from any kind of vulnerable attacks (Anwar et al. 2017). It can possess huge amount of threat to
information. The given information can be stored on either cloud, network, devices, and other
application. There is a need for huge amount of capital information in protecting the information
on online platform. With each passing day, the number of number of users are increasing so as a
result, the threat to information is also increasing.
The coming pages of the report a literature review has been done with cybersecurity
policies. After that, a list of technologies and techniques with respect to cybersecurity has been
discussed in details. A list of justification has been provided with respect to selection of proper
equipment and tools. A list of issues with respect to configuration and implementation has been
provided in details.
Cyber Security Framework and Capacity Building for Cyber Security Acculturation_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
- CYBER SECURITY.
|16
|3879
|6

Cyber security.
|9
|325
|20

Cyber Security Awareness Campaign: Literature Review and Limitations
|11
|2828
|400

Cyber Security Assignment PDF
|9
|2867
|2114

Cybersecurity for Office and Home
|14
|3454
|46

Research on Cyber Security for Business
|18
|2405
|240