logo

Assignment | INFORMATION GOVERNANCE 2022

   

Added on  2022-10-09

4 Pages446 Words20 Views
Running head: INFORMATION GOVERNANCE
INFORMATION GOVERNANCE
Name of the Student
Name of the University
Author Note:
Assignment | INFORMATION GOVERNANCE 2022_1
INFORMATION GOVERNANCE1
Both technology and increased internet access can easily bring a huge amount of positive
things. As a result of technological development in the domain of cyber-criminals can help in
robbing the banks. Cyber-attacks can be divided into two categories that are target to keep the
system offline and secondly to access the system data (Chhaya et al., 2017). There are mainly
seven kind of cyber-attacks like malware, phishing, denial of services, cryptojacking, SQL
injection, zero-day exploits. At present, system and access to internet can take of place of gun on
the web platform. Various kind of activities like phishing, spamming, web privacy can easily
take place in just one cubical way. There is a list of behind the growth of cyber-criminals in the
last few years. The current law enforcement agencies lack updated tools and technologies for
tackling cyber-attack (Al-Mohannadi et al., 2016). The victims lack some of the basics skills and
awareness of information technology until and unless it is late. Complete expertise for cyber-
attacks, training to employees, educational campaign needs to be there in both public and private
organization. The victims of this cyber-attack are government, school, banks, defence bodies,
private individual and defence contractor.
The target victim countries of cyber-attacks are
Belgium
Dominican republic
Hong Kong
Samoa
China
Tajikistan
Australia
Afghanistan
Assignment | INFORMATION GOVERNANCE 2022_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Phishing Attacks: Research and Defense Strategies
|8
|2164
|404

Cyber Security and Phishing Attacks on Customers and Companies
|8
|1902
|456

IoT Threats to Database Security
|5
|1145
|364

Cyber Technology | Essay | Assignment
|10
|2508
|20

Information Security Management Case Study of Widgets and Gadgets
|11
|732
|331