logo

Sample Assignment on Cyber Security

9 Pages2344 Words38 Views
   

Added on  2021-04-21

Sample Assignment on Cyber Security

   Added on 2021-04-21

ShareRelated Documents
Controls for EffectiveCyber DefenseCyber Security
Sample Assignment on Cyber  Security_1
Cyber SecurityTable of ContentsIntroduction...........................................................................................................................................2Analysis & Reflection...........................................................................................................................2Learning Outcomes...........................................................................................................................2Issues & Concerns.............................................................................................................................5Areas of Improvement.......................................................................................................................5Conclusion.............................................................................................................................................6References.............................................................................................................................................71
Sample Assignment on Cyber  Security_2
Cyber SecurityIntroductionCyber Security is a term that refers to the utilization of protocols, tools, and techniques toprotect the data from cybercrimes and attacks. The course covers various aspects of cybersecurity and cyber defense and the same have been analysed to reflect upon and to assess thelearnings, issues and areas of improvement. Analysis & ReflectionLearning OutcomesConfidential, Integrity, and Availability (CIA) are the three primary information propertiesthat are the most significant and are attacked by the malevolent entities. Authentication,Authorization, and Accounting (AAA) are the three primary measures for access control tothe data sets (Nweke, 2017). Some of the most frequently occurring cyber security attacksinclude malware attacks, system failure, unauthorized access, and social engineering issuesthat may be prevented and detected by anti-malware software, authentication measures, databackup, encryption, and data removal. The course provided an insight in the various types ofhacker, such as White hats, Black hats, Grey hats, Elite hats, and Blue hats out of whichBlack hats are the most common. The various forms of malware, such as viruses, worms, logic bombs, ransomware, Trojanhorses, etc. enter the systems and data through software, messaging, interception, and otherchannels (Chen et al., 2012). There are measures, such as anti-malware software, intrusiondetection systems, and firewalls shall be used to detect and prevent the malware attacks.Authentication and data encryption are the two most popular measures for the protection ofhardware and mobile devices. Operating System hardening is the process of bringing down the attack surface by eliminatingthe unwanted services and functions. There shall also be frequent updates that must beinstalled as critical, windows, and driver updates. There are patches that are developed to fixspecific software functionality. The rules and protocols shall be monitored through grouppolicies and templates and the networking changes shall be managed through configurationbaselines. New Technology File System (NTFS) is a file system that offers benefits over theage old FAT32 system in terms of security, backups, encryption, logging, and partitioning.The convert command is used to convert the file system from FAT32 to NTFS (Rusbarsky,2
Sample Assignment on Cyber  Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Computer Crime Assignment 2022
|4
|618
|17

Cyber security Assignment PDF
|6
|1200
|86

Cyber-Security Tools in Using Automating Defense of Networks
|4
|655
|77

Cyber Security Breaches: Types, Prevention and Recommendations
|9
|1902
|143

Cyber Security: A Mini Report on Penetration Testing and Vulnerability Assessment
|5
|761
|432

Implementation and Evaluation of Penetration Testing Tools
|7
|969
|40