logo

Cyber Security – Challenges and Solutions

13 Pages3663 Words313 Views
   

Added on  2021-01-02

Cyber Security – Challenges and Solutions

   Added on 2021-01-02

ShareRelated Documents
Computing risks, challengesand solutions, approaches tocyber security
Cyber Security – Challenges and Solutions_1
TABLE OF CONTENTSINTRODUCTION...........................................................................................................................1MAIN BODY...................................................................................................................................1Computing risks on Cyber security........................................................................................1Cyber Security – Challenges and Solutions...........................................................................2The Latest Approaches of Cyber security..............................................................................3CONCLUSION................................................................................................................................9REFERENCES..............................................................................................................................10
Cyber Security – Challenges and Solutions_2
INTRODUCTIONCyber security is an important technology which is helpful for design methodology forcontrolling and protecting the network or system from cyber-attack. It is very helpful forreducing the risk on cyber-attacks. Further. It enables for providing protection to the organizationfrom any type of theft or loss of information in a proper manner. This assignment covers information about cyber security approaches which is helpful forproviding the best quality of facilitates and provide the best services in Information technology.Further, it also includesdifferent type of challenging issue face in the organization. In addition tothis, it covers about the solutions of cyber security and computing risk. MAIN BODY Computing risks on Cyber securityA cyber security is an essential for each and every organization to manage businessoperations and functions with the help of technology. Cyber security of computing risk willdetermine different information that could affect data of customer, computer system, laptop,hardware, etc. Computing risk is usually generated at time of execution and controls threatidentifies risk in system with the help of cyber security. Computing security is mainly concernedabout the large number of domains which are protecting their different platforms and hardware(Ashibani and Mahmoud, 2017). Important resources and data is required in the organization.Cyber security is helps for reducing the risk in the hardware system and provides protection totheir personal data and information. Most of the organizations uses this technology to protect thesecurity for data and information.There are various types of computing risk involved in the cyber security which are as follows:Data Breaches- The organization protects their data by cloud data storage. The illegaluse of new technique to damage the information and data in the system. It is important for Chiefsecurity officer to use new security techniques to measure threats in the network. The data breachaffects the trade secret, customer information and intellectual property. For Example- Most ofthe companies faces many challenging issues which damages brand image in market. Data Loss- Data loss is a crucial part of organization when disk driver is damaged andthe owner of company has not been created backup of important data and information. Data lossis the major problem in organization because the data is encrypted and their key is unlocked. For1
Cyber Security – Challenges and Solutions_3
example- Amazon Web server is server which suffering for loss of data due to generate the errorin 2011. Hacked Interfaces and insecure applications- Most of the application and cloudservices are communicated by cloud services. This application security directly affects thesecurity of cloud services (Berry and Berry, 2018). They have chances to hack data because thirdparty access the application. This is the major cause to lose confidential data by parties andcustomers. Distributed denial of services attack- Denial of service attack affects the businessprocess and their infrastructure as well as availability. This attack will affect the system and theirprocess which may cause the system is slow down and time out. Denial of services is veryexpensive to run for the organization.Cyber Security – Challenges and SolutionsCyber Security is the biggest approach which is beneficial for technology to protect theirdata and system in a proper manner. The cyber criminals are started to damage the system andthey also damage the devices or technology like thefts and frauds. Sometimes, it is very difficultto handle cyber-attack in the enterprises because some organizations uses specific protocols tomanage business operations and functions (Gai and Hassan, 2017). There are some importantfew challenge issue faced in the cyber security discuss following: Digital Data Threat-Digital data threat is one of the main problem in the computersystem while growing the online transaction is the biggest target for criminals to hack the dataand personal information of customer such as Bank account number etc. The chief Securityofficer is identify business process and also monitors the company. Security officer will alsoimplement the new policies regarding the security and it also identifies the risk on the business.Chief security officer plays an important role to manage functionality of business process andanalyses threats which affect the entire data (Gou and Gupta, 2017). The data security officerprovide the training to their employee for improve the performance and solve the problem ineffective ways. Supply Chain Inter-connection-The supply chain is essential for organizations to createconnection between the customers and vendors. They create a strong network between thecustomer and management. Sometimes, it disconnects the connection between them. The datawill be loss. It is important for organization to establish a strong security wall between. The2
Cyber Security – Challenges and Solutions_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Concepts of Information Security
|6
|1341
|83

Physical Security and How It Relates to Cybersecurity
|14
|1219
|55

Cyber Security Assignment PDF
|9
|2867
|2114

(Solved) Cyber security challenges Assignment
|8
|2715
|216

Foundation of Cyber Security
|6
|1679
|89

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375