Cyber Security Name of the Student Name
Added on 2021-04-16
13 Pages2638 Words440 Views
Running head: CYBER SECURITYCyber SecurityName of the StudentName of the UniversityAuthor note
2CYBER SECURITY
3CYBER SECURITYTable of ContentsIntroduction..........................................................................................................................4Literature review..................................................................................................................4One time password..........................................................................................................5Malicious attack detection...............................................................................................5Installing Firewall............................................................................................................6Essentiality of cyber security systems.............................................................................7Cyber Security implementation.......................................................................................8Advantages of Cyber Security.........................................................................................9Conclusion...........................................................................................................................9Reference...........................................................................................................................11
4CYBER SECURITYIntroductionThe technological advancement in the field of digital communication is growing in aconstant rate. With all the threats regarding the malware and viruses increasing day by day theawareness for the security of the systems has also been increasing in constant rate. Committingfraud, stealing of data and bringing down data has been the major sources of cyber terrorism.With the increase in the usage of internet the chance and instances of cyber crime has expandedto a large scale. This review will provide the literature review of the concepts of cyber security.This report will also provide the literature review regarding the reasons of implementation ofcyber security. This report will provide literature review of the advantages of implementingcyber security. This report will further provide the literature review of the reasons forimplementing cyber security.Literature reviewAccording to Fielder, et al (2016), the main reason of implementing cyber security to thenetworking systems is to prepare for a cyber attack before it happens. In case of trying to recoverfrom the attack caused by the cyber terrorists it gets difficult as most of the data gets pirated oncethe cyber attack happens. In case of piracy of the data the organization looses most of the datathat are needed for the growth of the organization. Again according to Jones, et al (2016), thereason of implementing cyber security is to internally secure the sensitive data for the respectiveorganization as well as the stake holders of the organization. The data if not secure can beaccessed by the unauthorized personnel. This unauthorized access to any data can result tomodulation of data and spreading of wrong data resulting in deformation in goodwill of theorganization.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Assignment on Cyber Secuirtylg...
|5
|883
|29
Importance of Cybersecuritylg...
|9
|1925
|214
Critical Thinking Internet of Thingslg...
|2
|725
|35
Security threats in cloud computing and preventive methodslg...
|9
|2288
|116
(Solved) Cyber security challenges Assignmentlg...
|8
|2715
|216
DATA BREACH. DATA BREACH Name of the Student Name of thlg...
|4
|404
|217