logo

HI6008 - Business Research on Cyber Security

19 Pages3876 Words330 Views
   

Holmesglen Institute

   

HI6008 Business Research (HI6008)

   

Added on  2020-03-13

About This Document

HI6008 - Cyber security is the process of ensuring data and data frameworks like networking, systems, database, and other applications. The countermeasures should also be assembled for the security of the main information. It mainly spotlights on securing the systems, networking projects, and the data which is unauthorized to get the opportunity to change. The research on cyber security focuses on cyber-crimes, challenges that are faced during securing information, and various methods that can be implemented for securing the data from database.  

HI6008 - Business Research on Cyber Security

   

Holmesglen Institute

   

HI6008 Business Research (HI6008)

   Added on 2020-03-13

ShareRelated Documents
Running Header: Cyber Security1Research on Cyber SecuritySubmitted byCourseProfessorDate
HI6008 - Business Research on Cyber Security_1
Cyber Security2AbstractCyber security is the process of ensuring data and data frameworks like networking, systems, database and other applications. Some of the security devices like firewalls, installation of antivirus in the system or any other device are used to protect the organization’s data in order to secure the data. As our country quickly assembling its Cyber-Infrastructure, it is necessary to train the individual regarding cyber security processes. People needs to be trained regarding Cyber Ethics, cyber-crimes, cyber security that is required in modern world. Various security measures help to guarantee the classification, accessibility, and integrity of data frameworks by keeping or moderating resource loss from Cyber security attack. Cyber security has been risen asa networking system or infrastructures having attention on the protection of important data that iskept on the system from various adversaries who hack the required information. This paper will focus on digital security and developing patterns while receiving new innovative advancements like versatile registering, distributed computing, web based business, as well as social networking. The paper additionally depicts the challenges because of absence of coordination between Security as well as the Critical IT Infrastructure. (Tonge, A., & Kasture, S., S., 2013).
HI6008 - Business Research on Cyber Security_2
Cyber Security3IntroductionThe exploration of cybersecurity provides numerous opportunities for propels in view of a multidisciplinary methodology. Organization must protect their systems from the cyber-attack which is a huge threat to their data. Hence, we can say that Cybersecurity is the association and group of assets, procedures, and structures used to secure the business and the internet empowered frameworks from any type of occurrence (Craigen, D. & Thibault, N., 2014). In quick innovative advancements, it has provided various areas of new opportunities andpotential methods of effectiveness which is associated of various shapes, these new techniques have carried threat with them. The cyber security is also known as the process that is used to protect the network, computers and all the data in the internet. Digital security will just turn out to be more vital as more systems are associated with the help of internet. The cyber security is the technique of applying efforts to establish safety to guarantee its privacy,its respectability, and its accessibility of data. The cyber security tries to ensure the confirmation of favorable conditions, which can join data, systems, its servers, structure of network, etc. The main purpose of cybersecurity is to ensure data of the business database. The countermeasures should also be assembles for the security of main information. It mainly spotlights on securing the systems, networking, projects and the data which is unauthorized to get the opportunity to change. This research paper will focus on cyber security and other emerging technologies that are used to save the data. This paper will also focus on challenges that are faced while securing the data (IT Governance Trademark, 2017).
HI6008 - Business Research on Cyber Security_3
Cyber Security4Project ObjectiveThe objective of cyber security of research project provides help with securing hardware and important data of the business by clarifying critical ideas, cost contemplations, as well as interrelationships of security controls. It outlines the advantages of security controls, the major methods or methodologies for each control, and imperative related contemplations. This project gives a broad concept of cyber security to enable the users to comprehend their system security requirement and also helps to build up a strong methodology to deal with the better security controls. (Guttman, B. & Roback, B., G., 1995).Project ScopeThe research on cyber security focuses on cyber-crimes, challenges that are faced during securing information and various methods that can be implemented for securing the data from database. (Kumar, A. & Ahuja, C., 2014).Literature ReviewCyber ThreatsCyber threat can be defined as the sign, situation, or happening with the potential that can damage the entire infrastructure of the organization as well as the resources that rely upon this foundation (Nojeim, G., T., 2010). These cyber threats are very challenging and risky for open security of the online group and this is because of its unexpected behavior globally. By covering vindictive utilization of data innovation isn’t troublesome; this implies risk analysis can work with better exclusion from anyplace. The perspective of cyber threat to various organizations is shown in figure 1 (Stanwick, P., A. & Stanwick, S., D., 2014).
HI6008 - Business Research on Cyber Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security and IT Infrastructure: Challenges and Solutions
|4
|723
|396

PfSense: A Comprehensive Cybersecurity Tool for Intrusion Detection System
|20
|3463
|311

Cyber Security Assignment 2022
|12
|2845
|22

Cyber Security Framework and Capacity Building for Cyber Security Acculturation
|18
|4434
|292

Cybersecurity for Office and Home
|14
|3454
|46

Business Research on Cybersecurity
|5
|1439
|37