logo

Cyber Security Policies

   

Added on  2022-11-11

8 Pages2602 Words351 Views
Running Head: CYBER SECURITY POLICIES 1
Cyber Security Report
Name
College/affiliate

CYBER SECURITY POLICIES 2
Key terms
Cyber Security , Cyber Space , Cyber Threats , Cyber crimes
An Exposition on Major aspects of Cyber Security
Basics
There is great and special dawn in terms of technology all the world with a bid to increase and
improve the efficiency of the operations in each and every part of human life. As a result of this,
many inventions on the technology have been brought into view which is tailored to meet the
customers need everywhere. In fact, there is a global change of the way of life because of the
devices that have automated quickly people’s way of life and changed their perspectives in the
manner they have been working. This being the output, it has come along with so many risky
impacts as to the security of the users’ confidentiality especially data and their personal
belongings. In order to encourage and improve the clients’ confidence in the technology, there
must be decided strategies that are geared towards ensuring the safety of the information both for
personal and corporate business (Venkatachary, Prasad & Samikannu, 2018). One of the major
issues that are the leeway towards curbing all these threats that may face the organization is
actually cyber security. This is a branch in science that is just dedicated to ensuring the safety of
the technological systems everywhere they are employed. As a matter of fact, each and every
employee and the business must be able to understand this key aspect in order to be prepared to
cooperate with the laid down strategies to keep the data and the confidentially of the systems
installed everywhere safe. This has recently rose into the battlefield of securing these grounds as
a result of so much an unauthorized intrusion that has taken place also into these network and
technological systems by the malicious people (Voeller, 2014). There has been a massive loss of
the data and many organizations have suffered untold drawback.
The technical definition of cyber security
From the face value that any common person may view it, it is actually concerned with ensuring
that all the attacks that may be on the internet are mitigated. Its major work is protecting the
hackers from frustrating the organizations as well as individual users of the technological

CYBER SECURITY POLICIES 3
resources. By paying attention keenly to the operations that take place online, cyber security is
able to early note where a certain threat is coming from, nature and the magnitude it has towards
the safety of data and propose a way out (Joshi, n.d.). In other occasions, it is a documentation
that is prepared by experts in the cyber world with an aim of helping the companies and the
organizations globally to be well versed with the key concerns that attend the introduction of
new technology. In order to secure the data in the networked systems, this policy provides
sufficient information that is needed by managers of the different organizations to avoid
practices that may be a threat to the same effect (Alsmadi, n.d.). Technology is dynamic and it
tends to grow in an unexpected manner, as a result of this, there could be some unexpected
attacks that may bombard the organization, this branch aims to fulfil all these concerns that may
come along (Vaseashta, Susmann & Braman, 2014). In case of ABCT, as the employees are
working together with connection all over, both wired and wireless media, they are to be
educated so much on the very aspects they need to be aware of so that they evade much of the
incidences that have already happened. When an idea of Bring Your Own Device has taken place
in such an organization, this guideline is supposed to provide a way in which a safe use of their
devices is ensured. For example, there is a threat that is called a worm that is so dangerous in the
networks (Ali, Al Balushi, Nadir & Hussain, n.d.). This rapidly replicates itself in the network and
recopies into each and every computer that may be in the range. Some of this information is
covered under this special standard.
Cyber crimes
Though this technology has taken root and it is doing great in ensuring the privacy of personal
information everywhere, there several hitches that have presented great challenges in the real
practice of this sector (2017 2nd International Conference on Anti Cyber Crimes (ICACC),
2017). These cyber concerns can vary depending on their intention to the target environments.
There are attackers who are just there to do it for fun by hacking systems and penetrating to
know what is the framework found there. These attacks are passive and they may not have a
great negative impact overly in the systems (Qiu, n.d.). Though they may appear docile in their
nature they pose a serious thrill of fear to the administrators because the next attack may not be
known (Venkatachary, Prasad & Samikannu, 2018). Their main agenda in doing this is to get
information that they can hereafter use to advance their malicious ends ("Social And

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Threats - Essay
|20
|5781
|129

Information Technology Networking 2022
|6
|1887
|13

Professional Skills In Information Communication Technology: Cyber Security
|12
|3882
|66

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375

IT Security and Risk Management | CNSS Security Model
|6
|1362
|197

Network Security Analysis: Cyber Security
|10
|1925
|30