logo

Cyber security Attacks | Assessment 1

7 Pages1374 Words30 Views
   

Added on  2022-10-04

Cyber security Attacks | Assessment 1

   Added on 2022-10-04

ShareRelated Documents
IT 0
Cyber security Attacks
Cyber security Attacks | Assessment 1_1
IT 1
Table of Contents
Introduction................................................................................................................ 2
Summary of cybersecurity attack............................................................................... 2
Reason for selecting cyber-attack..............................................................................3
Impact of cyber-attacks on business and societies....................................................3
Conclusion.................................................................................................................. 4
References................................................................................................................. 5
Cyber security Attacks | Assessment 1_2
IT 2
Introduction
Cybersecurity refers to an approach used to protect data and computer
systems against hackers and unwanted signals. In the engineering and
computer systems security is the biggest issue that is increasing quickly
due to lack of privacy and unauthorized access present in the networks.
Cybersecurity attack is an IT issue where the hackers attack on the
computer devices used by the communities and perform data breach
activities (Abomhara, 2015). The significance of this research is to examine
the impact of cybersecurity attacks on organizational performance and
societies.
Summary of a cybersecurity attack
The term cyber-attack is defined as an attack that is mainly launched from
numerous computer systems against networks in order to access the
personal accounts of the companies. In this generation, the use of internet
connection is rising quickly due to which hackers are able to attack on
computer devices and systems (AlDairi, 2017). It is very significant for the
engineers and developers to provide effective and reliable services to the
consumers where they can protect the sensitive data from the criminals and
third parties. Cybersecurity attack mainly uses high-level algorithms and
hacking software like malware for developing large amounts of traffic
signals and unwanted networks. It is identified that the rate of cyber-attacks
has increased by 45% worldwide due to which thousands of users were lost
their private data or information including name, profile details and
financial information (Ashok, et al., 2015).
There are various kinds of cyber-attacks occurring in the engineering and IT
systems, for example, malware, phishing attack, DDOS, and many more. It
is identified that unauthorized access present in the system is the major
factor associated with the computer networks due to which the users are
Cyber security Attacks | Assessment 1_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Article 2022
|5
|1172
|24

Introduction to Cyber Security
|14
|3209
|388

IoT Security: Risks and Mitigation Techniques
|10
|865
|302

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Cyber Security Assignment 2022
|12
|2845
|22

Methods to Address Cybersecurity Issues in JL Organization
|13
|2416
|109