logo

Cyber Security

   

Added on  2023-01-10

4 Pages820 Words48 Views
Running head: Cyber Security
ESSAY
ON
CYBER SECURITY
Name of the Student
Name of the University
Author Note:

Cyber Security1
The purpose of this report is to briefly explain the concept of Cyber Security
considering the three major aspect of it, which includes Cyber Confidentiality, Integrity and
Availability. Cyber Security stands to protect or secure software, computer information
resource and computer systems as well (Craigen, Diakun-Thibault & Purse, 2014).
Considering the current business development and ICT industries the usage of internet
network has increased to a high extend. However, internet has offered the industries several
benefits there are also various drawbacks which includes Phishing, Ransomware, Rootkit,
Spyware, Virus, Zero-day exploit and Trojans present in the scenario of Computer network.
Thus, in order to mitigate the possibilities of these attacks the report will explore about the
three major components of Cyber Security which will provide a detail description on
effective Cyber Security.
Aspects of Cyber-Security:
While considering the effectiveness of Cyber Security the major aspects has been
observed which will help to provide high security to the computer devices, networks and
information resources as well. The cyber security aspect includes Confidentiality, Integrity
and Availability.
Confidentiality:
In the field of Cyber Security Confidentiality is on of the significant aspect of data
security which controls information access. The necessity of keeping the information with
high security occurred due to several fields which include military operations, government
activity information and other confidential detail of civilian. Initially in the cyber security
field the first attempt was to secure the information of military. The fundamental principle of
this aspect is to control the access of information which supports confidentiality by the
approach of Key Cryptography. However, utilization of Cryptography has several other
issues such as the misleading of the decode key can cause a huge blunder. Thus, the
mechanism of confidentiality has been supported by the approach of Digital Certificate,
Biometric Verification and Digital token. Along with the above aspects there is a
signification responsibility of users which demands to avoid sensitive data in less protected
storage systems (Abomhara, 2015).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Management: Cyber Security
|20
|4610
|231

Cryptography Techniques and Challenges: An Overview
|5
|1751
|65

Cyber Security: Threats, Challenges, and Mitigation Strategies
|12
|3967
|307

Cyber Security CIA: Confidentiality, Integrity, and Availability
|10
|2334
|49

Cyber security.
|3
|390
|36

Security Issue in Cloud Computing
|14
|624
|70