Cyber Security and IT Infrastructure: Challenges and Solutions

Verified

Added on  2023/05/29

|4
|723
|396
AI Summary
This research paper analyzes the concept of cyber security and IT infrastructure, the challenges faced by this technique, and the role of cyber security in an organization with their advantages and disadvantages. It also discusses cyber-threats or issues of the information system and provides an overview of the devices and components used by IT infrastructure.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber security and IT infrasrtuctre
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
A cyber security and computer security is defined as a process that protects physical
devices like computers, mobile and other electronic data. The use of cybersecurity is
growing very fast due to increasing information technologies, computer systems and
wireless networks and many organizations use this approach to control cyber-attacks
(Ericsson 1501-1507). In this research paper, the key purpose is to analysis the concept
of cyber security and IT infrastructure and the challenges faced by this technique. The
main problem faced by cybersecurity is privacy which occurs due to unauthentic
servers and most the organizations are facing this issue. This research paper is
explaining the role of cyber security in an organization with their advantages and
disadvantages and cyber-threats or issues of the information system.
Cyber security and IT infrastructure
Today, security of data is a very crucial problem which is growing rapidly because many
consumers use third-party applications and unauthentic networks that are developed
by hackers. To improve the security of computer networks information technology
established a new method that is cyber-security (Ralston, Graham, and Hieb, 583-594).
It provides a platform to handle and protect Internet-connected devices, computer
networks, software and other peripheral devices from hackers. The cyber-security
needs the coordination of efforts throughout an information system that involves
following key elements:
Information security
Network security
Data recovery
Application security
End-user education
It is estimated that in the year 2017 the use of cyber-security has increased by 30% that
time the information security devices and services has been reached $83 billion. There
are numbers of cyber security threats identified which are associated with computer
networks and internet connectivity, for example, ransom ware, malware, phishing,
denial of service, and sniffer attack (Von Solms, and Niekerk, 97-102).
Document Page
The term infrastructure in information technology is defined as an enterprise system
that contains software, hardware, computer networks, data links and other peripheral
devices. An organization IT infrastructure involves the physical devices and
equipment’s which are used by employees to transfer data or information (Wang, and
Lu, 1344-1371). It provides a way to transfer information technology services to
consumers and users and cyber security allow protection steps to these IT
infrastructures systems. Generally, IT infrastructure consists of the following devices
and equipment:
Hardware: computer, data centres, hubs, and switches
Software: ERP, consumer relationship management, and productivity applications
Network: internet connectivity, security, firewall and network enablement
Meat ware: network administrators, developers and IT appliance
Conclusion
Cyber security is an advanced technique to address the cyber-crimes and data breach
issues and also protect user’s private information. In the last five years information
technology produced advanced IT infrastructure which is used by many organizations
but these are associated with cyber-attacks. Cyber securities manage the security-
related issues and improve the performance of the computer system. This research
paper provided an overview of cyber security and IT infrastructure and evaluated
numerous devices and components used by IT infrastructure. It is investigated that
there are main three cyber-attacks occur in cyber security, for example, DDOS, malware
and ransom ware attack. People should ensure that they use only authorized networks
and adopt security tools like firewall and encryption to handle cyber-crimes.
Document Page
Works Cited
Ericsson, Go?ran N. 2010. "Cybersecurity and power system communication—essential
parts of a smart grid infrastructure."
IEEE Transactions on Power Delivery 25.3: 1501-
1507.
Ralston, Patricia AS, James H. Graham, and Jefferey L. Hieb. 2007. "Cybersecurity risk
assessment for SCADA and DCS networks."
ISA transactions 46.4: 583-594.
Von Solms, Rossouw, and Johan Van Niekerk. 2013. "From information security to cyber
security."
computers & security38: 97-102.
Wang, Wenye, and Zhuo Lu. 2013. "Cyber security in the smart grid: Survey and
challenges."
Computer Networks 57.5: 1344-1371.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]