The purpose of this report is to briefly explain the concept of Cyber Security considering the three major aspects of it, which includes Cyber Confidentiality, Integrity, and Availability.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: Cyber Security ESSAY ON CYBER SECURITY Name of the Student Name of the University Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1Cyber Security The purpose of this report is to briefly explain the concept of Cyber Security considering the three major aspect of it, which includes Cyber Confidentiality, Integrity and Availability. Cyber Security stands to protect or secure software, computer information resourceandcomputersystemsaswell(Craigen,Diakun-Thibault&Purse,2014). Considering the current business development and ICT industries the usage of internet network has increased to a high extend. However, internet has offered the industries several benefits there are also various drawbacks which includes Phishing, Ransomware, Rootkit, Spyware, Virus, Zero-day exploit and Trojans present in the scenario of Computer network. Thus, in order to mitigate the possibilities of these attacks the report will explore about the three major components of Cyber Security which will provide a detail description on effective Cyber Security. Aspects of Cyber-Security: While considering the effectiveness of Cyber Security the major aspects has been observed which will help to provide high security to the computer devices, networks and information resources as well. The cyber security aspect includesConfidentiality,Integrity andAvailability. Confidentiality: In the field of Cyber Security Confidentiality is on of the significant aspect of data security which controls information access. The necessity of keeping the information with high security occurred due to several fields which include military operations, government activity information and other confidential detail of civilian. Initially in the cyber security field the first attempt was to secure the information of military. The fundamental principle of this aspect is to control the access of information which supports confidentiality by the approach of Key Cryptography. However, utilization of Cryptography has several other issues such as the misleading of the decode key can cause a huge blunder. Thus, the mechanism of confidentiality has been supported by the approach of Digital Certificate, BiometricVerificationandDigitaltoken.Alongwiththeaboveaspectsthereisa signification responsibility of users which demands to avoid sensitive data in less protected storage systems (Abomhara, 2015).
2Cyber Security Integrity: The second aspect of the Cyber security is the data integrity which stands for the correctness or the trustworthiness of the information resources. While comparing the aspect of data confidentiality and integrity is has been observed that the data confidentiality is mainly focused on the access control of those data however, the aspect of data integrity is followed by the concept which prevent to store information from unauthorized resources. The information sources must be credible and must have proper authentication. Thus, in order to enhance the Cyber Security, it must provide a proper prevention from unauthorized changes along with the access control. The cryptography checksum is used to verify the integrity of the information resources (Hewett, Rudrapattana & Kijsanayothin, 2014, April). Availability: Last but one of the major aspects of cyber security is its information availability which stands to guarantee the constant access of sensitive data by the authorized people. In order to provide the proper availability to the stored information the mechanism of Cyber Security obtained the faster recovery plan of connection between the sources and the user. Along with that in order to prevent the data loss and from malicious attacks it is necessary adopts backup plans as well as the data protection protocol (Gollmann & Krotofil, 2016). Lastly,itcanbeconcludedthattheconceptofConfidentiality,Integrityand Availability is essential to incorporate with the mechanism of Cyber Security in order to provide an effective protection to the sensitive information resources by analysing the possible threats and the authorization. 
3Cyber Security Reference: Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks.Journal of Cyber Security and Mobility,4(1), 65-88. Gollmann, D., & Krotofil, M. (2016). Cyber-physical systems security. InThe New Codebreakers(pp. 195-204). Springer, Berlin, Heidelberg. Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity.Technology Innovation Management Review,4(10). Hewett, R., Rudrapattana, S., & Kijsanayothin, P. (2014, April). Cyber-security analysis of smart grid SCADA systems with game models. InProceedings of the 9th annual cyber and information security research conference(pp. 109-112). ACM.