Professional Skills In Information Communication Technology: Cyber Security

   

Added on  2023-03-23

12 Pages3882 Words66 Views
Running head: CYBER SECURITY
Professional Skills In Information Communication Technology: Cyber Security
Name of the Student
Name of the University
Author’s Note:
Professional Skills In Information Communication Technology: Cyber Security_1
1
CYBER SECURITY
Executive Summary
The most significant objective of the report is knowing about scenario of ABCT. The
management of this organization is extremely concerned regarding privacy and security of
systems, data and networks. Thus, few measures of cyber security are required to be deployed
in the business and company. The most common forms of cyber security measures include
data back ups and strong passwords. Data integrity is required to be maintained for ensuring
that networks, programs and data are secured from unauthorized access and hence cyber
security could be effective. The report has described about detailed analysis of cyber security
for ABC Technologies with relevant details.
Professional Skills In Information Communication Technology: Cyber Security_2
2
CYBER SECURITY
Table of Contents
1. Introduction............................................................................................................................3
2. Discussion..............................................................................................................................3
2.1 Proper Explanation of Cyber Security and Importance of Cyber Security in ABC
Technologies..........................................................................................................................3
2.2 Identifying and Explaining Three Security Vulnerabilities in Systems of ABC
Technologies with Relevant Justifications.............................................................................4
2.3 List of Five Different Kinds of Emerging Threats that could affect ABC Technologies
with basic Description about Damages that are caused by such Threats...............................6
3. Conclusion..............................................................................................................................8
4. Recommendations..................................................................................................................8
References................................................................................................................................10
Professional Skills In Information Communication Technology: Cyber Security_3
3
CYBER SECURITY
1. Introduction
A significant practice for protecting all kinds of systems, programs and networks from
digitalized attacks is termed as cyber security (Singer & Friedman, 2014). These distinctive
attacks are mainly targeted for accessing, changing and even destroying sensitive
information, resource extortion from either organization or users and even basic interruption
or disruption of business processes. To mitigate such issue within the business, it is highly
important to create an effective and efficient defence so that high privacy and security is
being obtained from any kind of cyber threat or attack (Von Solms & Van Niekerk, 2013). A
technological company, based in Australia, ABC Technologies comprises of some of the
major and the most significant kinds of high technology products and services, which include
software and hardware.
They are using VPN or virtual private networks in their organization to complete their
work and even comprises of a Bring Your Own Device policy, in spite of the fact that they
are extremely concerned regarding losing trust of customers and hardware or confidential
data. There could be some of the most significant chance and scope of attacks related to cyber
security towards growth and development of interlinked devices, which are required to be
eradicated on time (Ashok, Hahn & Govindarasu, 2014). This report would be providing a
detailed description on cyber security implementation and its respective importance within
the organization of ABCT with proper details such as identifying three security
vulnerabilities as well as five various kinds of emerging threat. Moreover, suitable
suggestions regarding mitigation strategies would even be described here.
2. Discussion
2.1 Proper Explanation of Cyber Security and Importance of Cyber Security in ABC
Technologies
Cyber security provides one of the most important as well as successful approach that
has numerous protection layers and could be used in various computerized systems,
networks, programs and data that the organizational member has the core intention for
keeping high security (Lee, Bagheri & Jin, 2016). The most important function in cyber
security involves better security of systems or organizational information from any kind of
cyber attack. A rapid adoption of these cloud application and workload can be stated as
responsible to extend few security requirements and data protection mandate such as NIST
framework. To secure any type of system or hardware, it is quite important to know about
Professional Skills In Information Communication Technology: Cyber Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Emerging Security Threats
|12
|3912
|46

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Professional skills for Information and Communication
|8
|1329
|480

Importance of Cyber Security for ABCT
|14
|4078
|94

Cybersecurity for Office and Home
|14
|3454
|46

Cyber Security for ABCT
|13
|3526
|21