The report provides a literature review on the topic of cyber security, discussing its growth and emergence as a field of technology. It highlights the importance of one-time passwords, firewall installation, and other cybersecurity tools in protecting computing systems from unauthorized access and malicious attacks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER SECURITY Cyber Security Name of the Student Name of the University Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 CYBER SECURITY Abstract The growth of cyber security is in a stage of growth. With the increase inusage of the digital communication the threats possessed because of the attacks caused on cyber criminals is also been increasing as the data available in the digital platform increases which helps in gathering information of the organization and attacking the organization gets easier when the data is available. The cyber attackers pirates the data and uses the organization’s information against them and earns huge amount of revenue on returning back the incorrupt data of the organization. To stay protected from these kinds of attacks cyber security tools are being used. These tools keep the organization free from unauthorized access of imposters. Cyber security as a field of technology is facing a lot of changes as the technology is emerging at a very fast rate. The report discusses about the reasons that enhances the needs of Cyber Security. This report will provide the literature review of the topic Cyber Security. This report will give a literature review on the topic of one time password process to keep the computing system secured from the crimes. This discourse will also give a literature review on the malicious attack detection on the networking system. This report will further provide a literature review on the importance of firewall installation in the networking systems. This report will also discuss about the essentiality of the cyber security in today’s networking system with the help of literature review. This report will provide a literature review on the field of implementations of cyber securities in the networking systems. The literature review of the advantages of cyber security is also provided it the discourse. The report concludes by acknowledging the constant emergence and the need of cyber security against cyber terrorism. The cyber security tools also helps in blocking harmful websites that are harmful in nature and prevents access of the ransomare to the computing system.
3 CYBER SECURITY Summary Cyber Security is the technology that has gained global acceptance in the last decade. This technology has been ever evolving and the emergence cyber crime has force caused the emergence the cyber security. One time password is an efficientway of handling the cyber crime with proper efficiency. Installing firewall is also another way of protecting the computing device from the cyber attacks; Installation of firewall protects the computing system as well as the networking system from unauthorized access of the imposters that possess threat of cyber attack on the network system. The cyber security technology finds its usage in tracking against the viruses that cause harm to the computing devices. Virus has the potential to harm the networking system as well. The cyber security process also protects the computing system from thehackers that intend on get access to the private set of data without the concern of the genuine data owner. The data that the hackers gain access to moulds them and uses the same data against the genuine data owners to gain a huge amount of profit from the genuine customers by accessing the data of the client. A Cyber security process also keeps the computing device safe from the Trojan viruses. Conclusion The literature review concludes by stating that the growth of cyber security is in a state of growth as with increase in the cyber space cyber warfare has come along in disguise. Hence the security relate to cyber space has gained global acceptance leading to the increase in cyber security. To stay protected from the cyber attacks namely the viruses, the hackers and the Trojan virus the cyber security tools and the methodology is being used. The cyber attackers intend on getting the access of the data for which he is not permitted. After gaining the access to the data the cyber criminals modulate the data to harm the genuine client.
4 CYBER SECURITY
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5 CYBER SECURITY Reference Dark, M., & Mirkovic, J. (2015). Evaluation theory and practice applied to cybersecurity education.IEEE Security & Privacy,13(2), 75-80. Mármol, F. G., Pérez, M. G., & Pérez, G. M. (2016, July). I don’t trust ICT: Research challenges in cyber security. InIFIP International Conference on Trust Management(pp. 129-136). Springer, Cham. Shoemaker, D., Davidson, D., & Conklin, A. (2017). Toward a Discipline of Cyber Security: Some Parallels with the Development of Software Engineering Education.EDPACS,56(5-6), 12-20. Siegel, E., Rota, G. C., Poincare, J. H., & Young, F. (2018). GOLDBACH-CONJECTURE-(IN NUMBER (#)-THEORY) IS ANTI-COOPER-PAIRING (IN NON-SC) GapFUL Fermion/PAIR-BREAKING SC-TO-NORMAL PHASE-TRANSITION CRITICAL- PHENOMENON: Primes N-BEC-Factorization/DEncryption-Cyber-THREATS (IBM/BlockChain) Are MANDATORY!!!.Bulletin of the American Physical Society.