logo

Professional Skills In Information Communication Technology: Cyber Security

Write a formal academic report analyzing an assessment task, researching relevant information, and making recommendations for future practice.

20 Pages6717 Words27 Views
   

Added on  2023-03-23

About This Document

This report discusses the case study of ABC Technologies and the implementation of cyber security measures within the organization. It highlights security vulnerabilities, emerging threats, and provides recommendations for protecting networks.

Professional Skills In Information Communication Technology: Cyber Security

Write a formal academic report analyzing an assessment task, researching relevant information, and making recommendations for future practice.

   Added on 2023-03-23

ShareRelated Documents
Running head: CYBER SECURITY
Professional Skills In Information Communication Technology: Cyber Security
Name of the Student
Name of the University
Author’s Note:
Professional Skills In Information Communication Technology: Cyber Security_1
1
CYBER SECURITY
Executive Summary
The main aim of this report is to understand the case study of ABC Technologies. This
particular organizational management is highly concerned about their security and privacy of
networks, systems and confidential data. Hence, they have decided to implement cyber
security measures within their organization and business. A proper set of techniques is
needed for the purpose so that integrity of confidential data, programs and networks is
protected from any kind of unauthorized access and for his purpose it is important to involve
cyber security within their business and networks. This report has properly depicted every
detail related to cyber security after highlighting three security vulnerabilities and five
emerging threats. Moreover, three suitable recommendations are also provided in this report
for protecting home and office networks.
Professional Skills In Information Communication Technology: Cyber Security_2
2
CYBER SECURITY
Table of Contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................4
Explaining about Cyber Security with its Significance and Importance in ABCT................4
Identifying and Explaining about 3 Security Threats in System of ABCT with Proper
Justification............................................................................................................................6
Listing of 5 Different Kinds of Emerging Threat affecting Organization with Proper
Description regarding Damages caused by Attacks.............................................................10
Conclusion................................................................................................................................14
Recommendations....................................................................................................................15
References................................................................................................................................16
Professional Skills In Information Communication Technology: Cyber Security_3
3
CYBER SECURITY
Introduction
Cyber security can be defined as the major practice to protect any type of system,
network and program from digital attack (Von Solms & Van Niekerk, 2013).
Cybersecurity is the collection of tools, policies, security concepts, security safeguards,
guidelines, risk management approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment and organization and user’s
assets. Organization and user’s assets include connected computing devices, personnel,
infrastructure, applications, services, telecommunications systems, and the totality of
transmitted and/or stored information in the cyber environment.
These attacks have major aim to access, alter or even abolish sensitive information,
extortion of resources from the users and interruption of normal business procedures (Buczak
& Guven, 2015).
Cyber security is the set of technologies and processes designed to protect computers,
networks, programs, and data from attack, unauthorized access, change, or destruction.
Cyber security systems are composed of network security systems and computer (host)
security systems. Each of these has, at a minimum, a firewall, antivirus software, and an
intrusion detection system (IDS). IDSs help discover, determine, and identify unauthorized
use, duplication, alteration, and destruction of information systems. The security breaches
include external intrusions (attacks from outside the organization) and internal intrusions
(attacks from within the organization).
A proper deployment of cyber security measure is extremely stimulating as there are
several devices than organizational people and hackers can easily extract sensitive
information. An effective defence is to be created for getting security from such distinctive
attacks (Wang & Lu, 2013).
Cyber security emerges to be a critical issue because millions of electronic devices are inter-
connected via communication networks throughout critical power facilities, which has an
immediate impact on reliability of such a widespread infrastructure.
The users should understand and then comply with every principle of data security
such as selecting stronger passwords and ensuring data backups.
Professional Skills In Information Communication Technology: Cyber Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity for Office and Home
|14
|3454
|46

Professional Skills In Information Communication Technology: Cyber Security
|12
|3882
|66

Cyber Security Issues in ABCT System
|14
|3763
|23

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375

Cybersecurity and its Importance to ABCT
|5
|959
|422

Cybersecurity Risks and Recommendations for ABCT
|13
|3833
|55