Running Head: Cyber security IT Infrastructure Management
Cyber security 1AbstractIn the limelight of below presented analysis it has been concluded that cyber security is the key concern for every organisation. As almost all the data is stored online it is necessary to protect the information from getting leaked. Apart from cyber security, compliance is one of the factors that can be used to secure the network. These are the set of rules that need to be followed at time of miss-happening. Sometimes a bug hits the system and due to which it can cause harm to the business. Thus business continuity plan has the ability to recover the system from unexpected situation as they assure the success of business even in the critical condition. Thus it can be noted that every business should built a business continuity plan by identifying the purpose of disaster recovery plan and usefulness of business continuity plan.
Cyber security 2Table of ContentsAbstract.................................................................................................................................................1Introduction...........................................................................................................................................3Cyber -Security, Compliance, and Business Continuity..........................................................................3Cyber security....................................................................................................................................3Compliance........................................................................................................................................3Business continuity plan....................................................................................................................3Conclusion.............................................................................................................................................3References.............................................................................................................................................4Appendix................................................................................................................................................5
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Cyber Security: Threats, Challenges, and Mitigation Strategieslg...
|12
|3967
|307
Assignment on Cyber Security pdflg...
|10
|1812
|84
Importance of Cyber Security in Protecting Against Cyber Attackslg...
|26
|8270
|85
Securing the Enterprise Infrastructure Report 2022lg...
|4
|772
|15
Application of Risk Mitigation and Planning Toolslg...
|3
|830
|42
Professional Skills In Information Communication Technology: Cyber Securitylg...