logo

Cyber Security & Ethical Hacking : Report

   

Added on  2020-06-06

9 Pages2386 Words80 Views
Cyber Security & EthicalHacking
Cyber Security & Ethical Hacking : Report_1
TABLE OF CONTENTSINTRODUCTION...........................................................................................................................11) Three cyber vulnerabilities at personal and organisational level.......................................12) Three cyber exploits and its damages when identified by an attacker...............................33) Components of IDPS to fight against the vulnerabilities...................................................3CONCLUSION:...............................................................................................................................5REFERENCES:...............................................................................................................................6
Cyber Security & Ethical Hacking : Report_2
INTRODUCTIONCyber security is a major issue in today's contemporary world. There are various securityissues that are faced by organisation. The cyber threats can damage and harm the organisationdata and information to a great extent. So it is important to secure the database to keep the datasafe from hackers (Berger,. and Jones, 2016). They steal or hack the data and misuse them fortheir own purpose. Besides this, ethical hacking means an expert who penetrate a computernetwork for the purpose of finding security vulnerabilities. It is either for financial purpose or forexploiting organisation data. For keeping the data safe and secure various software and methodsare used. These help in providing limited access to data and restricting hacker to enter in thenetwork. With this organisation is able to share data in a network easily. Also, it can be used atpersonal level to keep the system safe. This report will show cyber vulnerabilities and damagesdone by attacker. Moreover, intrusion detection and prevention system (IDPS) can be usedagainst vulnerabilities. 1) Three cyber vulnerabilities at personal and organisational levelCyber vulnerabilities refers to flaw in system that can lead to cyber attack. It can occurdue to weakness in computer system or network (Marsh, 2017). These vulnerabilities can highlydamage the entire network leading to leaking of confidential information. It can occur at personaland organisational level. The three cyber threats at organisational level are :- Inadequate protection of data- It refers to storing data in database. It means using weak orunsecure platforms to store the data. This can occur when data device is not encrypted andcauses threat of getting hacked. It also happens when organisation is having poor access controlover their system (Abu-Shaqra. and Luppicini,, 2016). Moreover, staff does not know how tohandle different types of data. The hacker takes advantage of this and enters the databasethrough a network. With this data can easily be stolen creating vulnerabilities to entire system. Itbecomes very essential to remove vulnerabilities from system as it can leak confidentialinformation of company. Third party risk- It is related to using of third party for doing transaction. An organisation dealswith various suppliers, distributors, etc. for business operations. Also, sometimes third party isused to do payments. This is very risky as it can lead to cyber vulnerability. Besides this, audit is1
Cyber Security & Ethical Hacking : Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Information System Breaches - Yahoo
|4
|1091
|38

Communicating Security in the Internet of Things
|4
|663
|152

Speaking Cyber With Reference to Security Theories
|25
|4562
|16

Assessing the Risks of Creating a Business Information System
|7
|855
|60

Report on Security Risk to Organisation and Policies
|16
|4980
|104