logo

Cyber Security : Assignment

   

Added on  2021-06-14

10 Pages2985 Words80 Views
Running head: CYBER-SECURITY1Cyber-SecurityName:Institution:Date:

CYBER-SECURITY2IntroductionCybersecurity is the practice of system protection, protecting and securing networks and other programs from digital attack. The attacks are aimed at changing, destroying and accessing information which is sensitive to an organization. Most of the cyber-attacks are aimed at extorting money and interrupting standard business processes. But it is within an organization to build a cyber-security strategy practice of ensuring that there is information integrity, confidentiality, and availability. It also represents the recovery from hard drive failures out of attacks from adversaries and power failures (Bonaci, Herron, Yusuf, Yan, Kohno, & Chizeck, 2015). The cyber-security issue is the loss of essential data through banking hacks and mobile payment. Mobile payments have become a disruption, and banks are going the same way. With millions of attacks targeting banks and financial institutions where cybersecurity experts are scrambling to avoid intuitional attacks. Although in many companies for they consider that the IoT is one of the primary agents of positive change, some experts have begun to express the mistaken idea that this trend should instead be called "the Internet of threats (Benson, McAlaney, & Frumkin, 2018). Why the chosen cyber security is being included in the issueIt turns out that part of the intelligent devices that have full use in the banking and processing industry were installed without security protocols. Of course, those who introduced them did so on the assumption that they would be used in a closed and safe environment. However, recent violations of cybersecurity have shown that even the most straightforward banking system can be cheated for malicious purposes (Sidorov, Lam & Salleh,2017).

CYBER-SECURITY3Cybersecurity experts should always be working to protect the data centers from generic attacks, and the best way to do it is not to leave the security door wide open, nor to place a welcome mat. Because many of the Internet security recommendations focus on IT, it seems that some of the best practices for data center and facility professionals are behind schedule.Experts developed these recommendations assuming that active scanning tools (network scanners, intrusion detection and penetration records, email scanners and antivirus software) are implemented by the IT Department as part of the security measures necessary to protect the company, but sometimes work in the data center, and you are not sure of this situation, it is critical that you verify it (Trotter, Harding, Mikusz, & Davies,2018)..These are some basic information security tips so that your system, your sensitive information, and your data remain free of infections. From the most obvious, to the most complex, the recommendations on how to protect, more in such a hostile environment like theInternet, are beneficial. If you put them into practice, the chances of infection will fall considerably (Bush, Ayyagari, Lorimer, Benson,2015).Explanation/demonstration of the potential consequences of the identified issueWhile these basic information security tips are aimed at a less experienced public and Windows user - because it is the system most used by new computer users and because it is the most affected by viruses and threats - the rules can be transferred to the rest of the operating systems and each computer operation that we want to carry out without putting our data and system at risk. That said, let's see what you're doing wrong for your safety and how to fix it (Ganguly, Rajan, Shetty, & Gadhe,2017).Beware of attachments in your email

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Crime Fundamental Report 2022
|11
|2538
|17

Cybersecurity, Compliance, and Business Continuity
|7
|1538
|72

Cybersecurity Training
|4
|790
|406

Cybersecurity: Protecting Home and Office from Cyberattacks
|12
|2626
|224

Cybersecurity in Banks: Contemporary Issues in Business
|21
|7343
|214

Cybersecurity for Office and Home
|14
|3454
|46