logo

Cyber Security and IT Infrastructure: Challenges and Solutions

4 Pages723 Words396 Views
   

Added on  2023-05-29

About This Document

This research paper analyzes the concept of cyber security and IT infrastructure, the challenges faced by this technique, and the role of cyber security in an organization with their advantages and disadvantages. It also discusses cyber-threats or issues of the information system and provides an overview of the devices and components used by IT infrastructure.

Cyber Security and IT Infrastructure: Challenges and Solutions

   Added on 2023-05-29

ShareRelated Documents
Cyber security and IT infrasrtuctre
Cyber Security and IT Infrastructure: Challenges and Solutions_1
Introduction
A cyber security and computer security is defined as a process that protects physical
devices like computers, mobile and other electronic data. The use of cybersecurity is
growing very fast due to increasing information technologies, computer systems and
wireless networks and many organizations use this approach to control cyber-attacks
(Ericsson 1501-1507). In this research paper, the key purpose is to analysis the concept
of cyber security and IT infrastructure and the challenges faced by this technique. The
main problem faced by cybersecurity is privacy which occurs due to unauthentic
servers and most the organizations are facing this issue. This research paper is
explaining the role of cyber security in an organization with their advantages and
disadvantages and cyber-threats or issues of the information system.
Cyber security and IT infrastructure
Today, security of data is a very crucial problem which is growing rapidly because many
consumers use third-party applications and unauthentic networks that are developed
by hackers. To improve the security of computer networks information technology
established a new method that is cyber-security (Ralston, Graham, and Hieb, 583-594).
It provides a platform to handle and protect Internet-connected devices, computer
networks, software and other peripheral devices from hackers. The cyber-security
needs the coordination of efforts throughout an information system that involves
following key elements:
Information security
Network security
Data recovery
Application security
End-user education
It is estimated that in the year 2017 the use of cyber-security has increased by 30% that
time the information security devices and services has been reached $83 billion. There
are numbers of cyber security threats identified which are associated with computer
networks and internet connectivity, for example, ransom ware, malware, phishing,
denial of service, and sniffer attack (Von Solms, and Niekerk, 97-102).
Cyber Security and IT Infrastructure: Challenges and Solutions_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Assignment PDF
|9
|2867
|2114

Introduction to Cyber Security
|14
|3209
|388

Social Engineering and Cybersecurity
|7
|3161
|211

Implementation of Different Firewall Technologies: Advantages and Disadvantages
|6
|2344
|50

Cyber Security Assignment 2022
|12
|2845
|22

Understanding Security and Cybersecurity: Threats, Breaches, and Protection Measures
|5
|1404
|493