logo

Project Report on Cyber Attack Prevention System

Developing a methodology for deploying honeypots in the form of a honeynet to prevent network-centric cyber-attacks.

10 Pages2286 Words296 Views
   

Added on  2023-06-03

About This Document

This report discusses the different aspects associated with the designing of a security system and their associated factors such as legal, ethical and other factors. It also explains the professional, ethical, legal and social aspects that have to be considered by the system administrators to ensure optimum organizational security.

Project Report on Cyber Attack Prevention System

Developing a methodology for deploying honeypots in the form of a honeynet to prevent network-centric cyber-attacks.

   Added on 2023-06-03

ShareRelated Documents
Running head: PROJECT REPORT ON CYBER ATTACK PREVENTION SYSTEM
PROJECT REPORT ON CYBER ATTACK PREVENTION SYSTEM
Name of the student:
Name of the university:
Author note:
Project Report on Cyber Attack Prevention System_1
1PROJECT REPORT ON CYBER ATTACK PREVENTION SYSTEM
Executive summary:
In today’s world cybercrime is one of the most dangerous issues that the organizations
are facing and need to be immediately addressed. In the recent past there have many reported
cases wherein hackers have taken control over the organizational systems, have stolen important
data, and breached the privacy of the systems. They have conducted tax frauds and other illegal
activities after stealing the important data such as financial tax sheets and other documents.
In this report the different aspects associated with the designing of a security system and
their associated factors such as legal, ethical and other factors will be discussed. By the end of
this report, the reader will have a clear understanding of these aspects and have an in depth
understanding about the security measures that can be taken within the organizations.
Project Report on Cyber Attack Prevention System_2
2PROJECT REPORT ON CYBER ATTACK PREVENTION SYSTEM
Table of Contents
Introduction:....................................................................................................................................3
Project description and initial solutions:..........................................................................................3
Problem evaluation and opinion on the proposed solution approach:.........................................4
Project Evaluation:...........................................................................................................................5
Legal issues:.................................................................................................................................5
1. Code of Conduct:...........................................................................................................5
2. Extra-legal, minor:.........................................................................................................6
3. Extra-legal, major:.........................................................................................................6
Social issues:................................................................................................................................6
1. Social websites:.............................................................................................................6
2. Social engineering:........................................................................................................6
Ethical issues:..............................................................................................................................6
1. Ethical hackers:.............................................................................................................6
2. Ethical behavior of the employees:...............................................................................6
Professional issues:......................................................................................................................7
1. Trust and integrity:........................................................................................................7
2. Employee vandalism as well as favoritism:..................................................................7
Conclusions:....................................................................................................................................7
References:......................................................................................................................................9
Project Report on Cyber Attack Prevention System_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ASSIGNMENT WHAT IS CYBER CRIME ?
|8
|1982
|28

Computer Security within JL: Mitigation Techniques and Advantages of Artificial Intelligence
|11
|2506
|299

Cyber Security Information Technology Report 2022
|4
|725
|22

Ethical Issues in the Cyber World
|4
|1178
|341

Cyber Crime
|9
|1980
|464

Recent Cybercrimes: UniCredit Bank and British Airways Data Breach
|42
|11271
|487