logo

Computer viruses Report 2022

   

Added on  2022-08-26

10 Pages2865 Words14 Views
Data Science and Big DataPolitical Science
 | 
 | 
 | 
1/19/2020
Running Head: CYBERSECURITY 0
Student name
Cybersecurity
Report
Computer viruses Report 2022_1

CYBERSECURITY 1
Executive Summary
In most industries, Information Technology (IT) has used for managing different operations
in a better way. It is helpful in the improvement of the performance and productivity of the
companies as well. This report will provide the introduction of cybersecurity for a firm.
Moreover, it will provide a security plan for Cyber Café in which it will discuss about the
risks and threats. It will provide the reason behind various issues in security. It will find
various solutions to those issues. This report will discuss about the security countermeasures
and training for the firm. It will explain the role of security policy for the company in the
later section of this report.
Computer viruses Report 2022_2

CYBERSECURITY 2
Table of Contents
Introduction................................................................................................................................2
Security Plan..............................................................................................................................2
Computer viruses:..................................................................................................................3
Social engineering:.................................................................................................................3
Phishing:.................................................................................................................................3
Ransomware:..........................................................................................................................3
Emails:....................................................................................................................................3
Security Countermeasures...........................................................................................................4
Acceptable Use Policy (AUP):...............................................................................................4
Access Control Policy (ACP):...............................................................................................4
Incident Response (IR) Policy:..............................................................................................4
Remote Access Policy:...........................................................................................................4
Email/Communication Policy:...............................................................................................5
Backup and Recovery Policy:................................................................................................5
Training......................................................................................................................................5
Security Policy...........................................................................................................................6
Conclusion..................................................................................................................................6
References..................................................................................................................................7
Computer viruses Report 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Cafe Case Study Assessment
|13
|2585
|16

Report on the Cyber Security 2022
|14
|3027
|5

Executive Summary of Cyber Security
|14
|2768
|9

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375

Internet Security Report | Cyber Security
|12
|2590
|11

Corporate Security Management: Cyber Threats and Countermeasures
|6
|1177
|375