logo

Cyber Security Assignment 2022

To gather, critically analyse, manage and present in meaningful ways information and data. To work collaboratively in small teams on a variety of large and small projects to produce models, software, documentation and reports. To take responsibility for their own time management delivering quality required material on time in dynamically changing technological and communication contexts whether as an individual or member of a small team.

12 Pages2845 Words22 Views
   

Added on  2022-10-17

Cyber Security Assignment 2022

To gather, critically analyse, manage and present in meaningful ways information and data. To work collaboratively in small teams on a variety of large and small projects to produce models, software, documentation and reports. To take responsibility for their own time management delivering quality required material on time in dynamically changing technological and communication contexts whether as an individual or member of a small team.

   Added on 2022-10-17

ShareRelated Documents
IT PROFESSIONAL 0
Cyber security
Cyber  Security   Assignment   2022_1
IT PROFESSIONAL 1
Executive summary
Cybersecurity refers to the body of processes, practices, and processes
which is mainly developed for protecting computing networks and devices
from the attacks. It is also defined as information technology security that
has the potential to control and manage security threats. In this generation,
the rate of security attacks is growing quickly as the users are using
unauthorized networks and third-party applications that help the attackers
for performing malware activities. This research mainly focuses on the
cybersecurity issues that occurred in computer networks and devices. It is
found that uber, yahoo and FriendFinder all these are best examples of
cybersecurity attacks that were suffered from data breach and hacking
related issues. Therefore, it is recommended that the companies should
develop security policies and implement security tools including firewall,
antiviruses, and encryption-related techniques. Moreover, consumers can
use authentic networks while accessing their accounts in computer systems.
Cyber  Security   Assignment   2022_2
IT PROFESSIONAL 2
Table of Contents
Introduction................................................................................................................ 3
Background................................................................................................................ 3
Real case studies based on cyber-security attacks....................................................4
Yahoo data breach in the year 2016.......................................................................4
Uber cybersecurity attack....................................................................................... 4
Friendfinder’s sites attack in 2017..........................................................................5
Recommendations...................................................................................................... 6
Use authentic networks........................................................................................... 6
Use two-step verification......................................................................................... 6
Provide proper training and education....................................................................7
Use firewall and antiviruses.................................................................................... 7
Develop and implement an encryption technique...................................................7
Use backup plans.................................................................................................... 7
Conclusion.................................................................................................................. 8
References................................................................................................................. 9
Cyber  Security   Assignment   2022_3
IT PROFESSIONAL 3
Introduction
Cyber security is defined as the protection of computing devices and
networks from hackers and protects data from security threats. In this
generation, the use of information technology is increasing quickly and
many companies are suffering from cybersecurity attacks due to the
utilization of unauthentic servers in IT systems. It is observed that the rate
of cyber-security attacks has increased by 45% in the last five years and
many companies were suffered from the data breach issues (Govindarasu,
Hann, and Sauer, 2012). The major significance of this report is to analyze
the impacts of cybersecurity attacks on organizational performance. To
better understand security threats three case studies will be analyzed along
with the security issues and attacks. It is observed that there are major two
risk elements that lead to security-related problems in the computer devices
including lack of security and involvement of unauthorized networks in the
systems.
Background
The term cybersecurity refers to the protection process which is used for
protecting data against security threats and risks and also handles
malware-related activities from the internet-connected systems. From the
previous study, it is found that cybersecurity is a kind the practice of
protecting computer systems, devices, and networks from the digital
attacks. These cyber-attacks are mainly aimed at changing, accessing of
destroying the personal data of the consumers without taking their
permission (Gupta, Agrawal, and Yamaguchi, 2016).
Implementing effective cybersecurity systems can help companies for
controlling and reducing the rate of cyber-attacks from the developed
systems. There are various kinds of attacks that occurred in the computer
networks and devices including malware attack, DDOS attack, phishing
Cyber  Security   Assignment   2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber security Attacks | Assessment 1
|7
|1374
|30

Implementation of Different Firewall Technologies: Advantages and Disadvantages
|6
|2344
|50

Leading Communication Technology
|5
|2088
|16

Ransomware & Malware
|5
|581
|276

Introduction to Cyber Security
|14
|3209
|388

(Solved) Cyber security challenges Assignment
|8
|2715
|216