Cyber Security 2Executive summaryIn this report the main focus is on the topic Cyber security. In today’s era, the change in technology has provided various benefits to the business by allowing them to store their huge amount of data online. The aim of this report is to figure out the challenges and issues associated due to cyber security. It is important to maintain the security of data as organisations completely rely on data stored online. In this report, limelight is on the possibleattacks that occur on the network and the security measures that could be taken to avoid the chances of security attacks. Cyber security keeps track of data packets assure that informationremains integrated, confidential and available to valid end users.
Cyber Security 3Table of ContentsCyber security.......................................................................................................................................3Identification of threats and attacks.......................................................................................................3Potential Damage..................................................................................................................................4Issues and challenges of cyber security.................................................................................................4Countermeasures and mitigation strategies............................................................................................4Conclusion.........................................................................................................................................6References.............................................................................................................................................7Appendix...............................................................................................................................................8
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Cyber Security: Threats, Challenges, and Mitigation Strategieslg...
|12
|3967
|307
Challenges in Cyber Security for Business 7 Running Head: Challenges in Cyber Security for Business 7 Running Head: Challenges in Cyber Security for Business 7 Running Head: Challenges in Cyber Securilg...
|12
|3221
|498
Implementation of Different Firewall Technologies: Advantages and Disadvantageslg...
|6
|2344
|50
Professional Skills In Information Communication Technology: Cyber Securitylg...