logo

Cyber Security: Analyst, Policy, and Recommendations for Skyward Co

Prepare a briefing for executive management at Skyward Co. on the analysis of network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks affecting cyber security. Develop a policy recommendation based on current research and real-world data.

10 Pages1963 Words53 Views
   

Added on  2023-06-10

About This Document

This report outlines a brief discussion on the cyber security and being the analyst of cyber security in the new organization or Skyward Company. Cyber security policy, recommendations for Skyward Co, and strategies are discussed in detail.

Cyber Security: Analyst, Policy, and Recommendations for Skyward Co

Prepare a briefing for executive management at Skyward Co. on the analysis of network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks affecting cyber security. Develop a policy recommendation based on current research and real-world data.

   Added on 2023-06-10

ShareRelated Documents
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author’s Note:
Cyber Security: Analyst, Policy, and Recommendations for Skyward Co_1
1
CYBER SECURITY
Table of Contents
Introduction................................................................................................................. 2
Discussion...................................................................................................................2
Cyber Security Analyst............................................................................................2
Cyber Security Policy.............................................................................................. 3
Recommendations for Skyward Co.........................................................................6
Conclusion.................................................................................................................. 6
References..................................................................................................................8
Cyber Security: Analyst, Policy, and Recommendations for Skyward Co_2
2
CYBER SECURITY
Introduction
Cyber security or computer security can be defined as the proper protection of
various computer systems from being damaged or theft to the respective software,
hardware or any form of electronic data (Von Solms & Van Niekerk, 2013).
Moreover, this type of security is also effective to disruption as well as misdirection of
services, they are providing. This cyber security even involves perfect control of
physical access to the system hardware and also securing from harm that could be
done through access of network, injection of code and malicious data. Due to the
malpractices by various operators, irrespective of the fact that it is accidental or
intentional, the personnel of IT security could be tricked from deviation of the secure
processes (Wang & Lu, 2013). The wireless networks like Wireless Fidelity and
Bluetooth are utilized for the means of cyber security.
The following report outlines a brief discussion on the cyber security and
being the analyst of cyber security in the new organization or Skyward Company.
This is mainly because to prepare a proper briefing for the executive management.
The CIO or chief information officer contains of the understanding of IT or
information technology. Relevant details will be provided in this report.
Discussion
Cyber Security Analyst
Cyber security is the perfect security of the Internet connected systems that
comprise of the software, hardware or data from any type of cyber attack (Hahn et
al., 2013). The security consists of physical security and cyber security for protecting
against the unauthorized access to the data centres or the other computerized
Cyber Security: Analyst, Policy, and Recommendations for Skyward Co_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Social and Cultural Impact of the Use of ICT Associated With Cyber Security | Report
|15
|4018
|9

Cyber Security: Attacks and Mitigation Techniques
|11
|2291
|301

Cybersecurity Policies for Skyward Company
|8
|1830
|439

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1577
|381

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1749
|483

Network Security & Its Vulnerabilities | Document
|9
|1749
|130