Cyber Crime Fundamental Report 2022

   

Added on  2022-08-29

11 Pages2538 Words17 Views
Running head: CYBER CRIME FUNDAMENTAL
Cyber Crime Fundamental
Name of the Student
Name of the University
Cyber Crime Fundamental Report 2022_1
1CYBER CRIME FUNDAMENTAL
Table of Contents
Introduction......................................................................................................................................2
Types of risks in IT system..............................................................................................................2
Mechanism for Authentication and Access Control........................................................................3
Protection of Internet System..........................................................................................................5
Security in System Design...............................................................................................................5
Reflection on the Completed Labs..................................................................................................6
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
Cyber Crime Fundamental Report 2022_2
2CYBER CRIME FUNDAMENTAL
Introduction
The process of protecting devices, systems, and networks from digital threats is known as
cybersecurity. These cyber-attacks are typically intended to access, change or steal the private
information; ransom user’s money or disrupt regular business processes. “Implementing the new
security concepts is especially difficult at present times as there are more advance computers as
well as the people, who are becoming more creative attackers nowadays” (Singer and Friedman
2014). Therefore, this report aims to discuss the cybersecurity attacks, which can threaten the IT
system and also recommends suitable measures, which can be taken to secure the IT system.
This report also presents a reflection of my completed labs on the topics “Malicious behaviour
“Defence toolkits” and “Methods of access control and integrity control”, which will give an
overview of the classes and the knowledge that I have gained from the lab classes.
Types of risks in IT system
Information technology or the IT risks pose some threat to the business records, critical
infrastructure, and the business process. This is the cost of using, owning, and running, affecting,
manipulating and implementing IT within the organization. IT risks are potentially harmful to
business profitability, and often arise from inadequate process and the event management. The
several types of risks associated with the IT system are:
Physical Risks
“Physical threats can come from persons or organizations that operate from outside of an
organization" (Jouini, Rabai and Aissa 2014). This may involve theft, flood or fire damage, or
unauthorized access by any employee or any outsider to the confidential or sensitive data.
Cyber Crime Fundamental Report 2022_3
3CYBER CRIME FUNDAMENTAL
Technical failures
“Technical errors like software errors that the developer can face are computer
malfunction or massive failure of different components of a computer” (Dwivedi et al. 2015). A
technological failure can be disastrous leading to permanent loss of data. For instance, data is
permanently lost if a user cannot recover data on a faulty hard drive and there is no copy of
backup with him as well.
Electronic threats
Electronic threats are aimed at accessing the business information, for example, a hacker
may be able to access the website. According to Alhassan et al. (2016), “The IT device may
become infected with a computer virus, or the user may be the victim of fraudulent website or
email”. Commonly these are illegal.
Infrastructure failure
Failures in infrastructure such as the loss of the internet connection can disrupt the
business. As a result, “the user may miss a significant purchase order” (Ouyang 2014).
Human error
“Human error is a major danger" (Evans et al. 2019). For example, somebody might
unintentionally delete essential data or fail to adequately follow the security procedures.
Mechanism for Authentication and Access Control
General access control in information security requires authentication, authorization, and
auditing. A more specific concept of access control includes access approval, in which the device
Cyber Crime Fundamental Report 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375

Future of the Cybersecurity Profession - ITECH7000
|6
|1177
|32

Cyber Security and IT Infrastructure: Challenges and Solutions
|4
|723
|396

IS Security and Risk Management
|12
|3177
|391

Cybersecurity Threat Name of the Student
|11
|2321
|49

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27