logo

Cyber-security Assesment Report

   

Added on  2022-09-12

4 Pages890 Words8 Views
Cyber-security
Student’s name
Institution Affiliation(s)

Cyber-security or computer security refers to protection for computers and other
computing devices such as smartphones, the internet, including private as well as public network
systems [1]. It covers different mechanisms wherein digital technology, including data services,
is secured from unauthorized access, intentional as well as unintentional changes or damage.
Such changes or losses have expanded, especially in the current setting, where society has
become very dependent on computers and related technology. Cyber-security also includes
ensuring the physical security of computers and phones, including the associated tools which
would protect the stored data. The purpose of this paper is to highlight the desired qualities of a
secure cyber-security network [2].
Cyber-security would involve the application of security resources which would
effectively provide the confidentiality, the integrity as well as the access of data commonly
referred to as the CIA triad [3]. Cyber-security would seek to ensure the protection of assets,
mostly with data, servers, desktops, people, and even buildings. The importance of cyber-
security is that it can provide the security of data while it is in transit and while it is at rest [4].
The desired qualities of the cyber system include confidentiality, integrity, availability,
authentication, and non-repudiation. In privacy, the system has to be protected in its
transmission of data, that unauthorized individuals would not release it. Also, the flow of data
must not be subject to traffic assessment [5]. This traffic assessment is applied to gather other
data, other than that which is released from the information system.
In case of integrity, this includes the protection of the data transmitted against any
changes. In this case, the data is the same leaving and arriving at the intended target. Integrity
also ensures that messages are not duplicated, destroyed, or lost. Integrity is crucial in ensuring
the security of property and also as a tool for the network system [3]. The integrity of the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Question Answer 2022
|6
|875
|10

ITC595-Security of Information in Computing
|9
|2902
|352

Telecommunication and Network Security
|17
|3181
|428

Cryptography and Network Security Applications
|8
|1917
|96

IT Risk Management: Cyber Security
|20
|4610
|231

Cryptography Techniques and Challenges: An Overview
|5
|1751
|65