logo

Cyber Security Name of the Student Name

   

Added on  2021-04-16

13 Pages2638 Words440 Views
Running head: CYBER SECURITYCyber SecurityName of the StudentName of the UniversityAuthor note

2CYBER SECURITY

3CYBER SECURITYTable of ContentsIntroduction..........................................................................................................................4Literature review..................................................................................................................4One time password..........................................................................................................5Malicious attack detection...............................................................................................5Installing Firewall............................................................................................................6Essentiality of cyber security systems.............................................................................7Cyber Security implementation.......................................................................................8Advantages of Cyber Security.........................................................................................9Conclusion...........................................................................................................................9Reference...........................................................................................................................11

4CYBER SECURITYIntroductionThe technological advancement in the field of digital communication is growing in aconstant rate. With all the threats regarding the malware and viruses increasing day by day theawareness for the security of the systems has also been increasing in constant rate. Committingfraud, stealing of data and bringing down data has been the major sources of cyber terrorism.With the increase in the usage of internet the chance and instances of cyber crime has expandedto a large scale. This review will provide the literature review of the concepts of cyber security.This report will also provide the literature review regarding the reasons of implementation ofcyber security. This report will provide literature review of the advantages of implementingcyber security. This report will further provide the literature review of the reasons forimplementing cyber security.Literature reviewAccording to Fielder, et al (2016), the main reason of implementing cyber security to thenetworking systems is to prepare for a cyber attack before it happens. In case of trying to recoverfrom the attack caused by the cyber terrorists it gets difficult as most of the data gets pirated oncethe cyber attack happens. In case of piracy of the data the organization looses most of the datathat are needed for the growth of the organization. Again according to Jones, et al (2016), thereason of implementing cyber security is to internally secure the sensitive data for the respectiveorganization as well as the stake holders of the organization. The data if not secure can beaccessed by the unauthorized personnel. This unauthorized access to any data can result tomodulation of data and spreading of wrong data resulting in deformation in goodwill of theorganization.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Cyber Secuirty
|5
|883
|29

Importance of Cybersecurity
|9
|1925
|214

Critical Thinking Internet of Things
|2
|725
|35

Security threats in cloud computing and preventive methods
|9
|2288
|116

(Solved) Cyber security challenges Assignment
|8
|2715
|216

DATA BREACH. DATA BREACH Name of the Student Name of th
|4
|404
|217