Cyber. Security Risks and MITIGATING TECHNIQUES. Introd

Verified

Added on  2022/11/15

|12
|422
|56
Presentation
AI Summary
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
CYBER SECURITY RISKS
AND MITIGATING
TECHNIQUES
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTRODUCTION
Cyber security techniques are considered as the opposing force to the
cyber attacks that are imposed by the imposters. This ensures the fact
that with the help of the implementation of the cyber security robustness
of the platform is increased.
Document Page
CYBER ATTACK
The cyber attacks due to which the cyber security methide are required
are as follows: -
Ransomware
Trojan Horses
Virus
Data breach
Document Page
TYPES OF METHODS
The methods that are used in the cyber security process are as follows: -
Firewalls
Antivirus
Content filtering
Intrusion detection system
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
METHODS
Firewall
Firewall is implemented in the networking system for avoiding
unnecessary interference of the imposters. This help in securing the
network via which the data is being transacted. With the help of
increasing the robustness, data breaching process gets performed.
Document Page
METHODS
Antivirus
Antivirus is used for dealing with the malware and ransomware attacks.
As in the processing of the antivirus the main advantage that is gained is
that the antivirus prevents entry of virus via platforms that will affect the
functioning of the system
Document Page
METHODS
Content Filtering
Content filtering is based on the processing of eliminating the data that is
unwanted and causing harm in the regular living process. This ensures
that unauthorized and unethical fata will not pop up on the screen.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
METHODS
Intrusion detected system
With the help of the Intrusion detected system, the main aspect that is
taken into consideration is that the cyber security management is
performed as per the detection of the malware and ransomware and gets
treated
Document Page
SUMMARY
Digital platform is one of the latest technologies that are in trend. Due to
this aspect a lot of security issues are caused. For mitigating these
security issues, cyber security is introduced. With the help of the cyber
security proper processing the daily tasks that requires security in the
system
Document Page
RESEARCH METHODS
The research method used in this study is secondary data collection and
both qualitative data analysis as well as the quantitative data analysis.
With the help of the qualitative and quantitative data analysis process
the research method gets easy. Proper management of the business
arrangement is to be performed.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CONCLUSION
From the above ppt it can be stated that importance of cyber security
has been ever increasing. With the help of the cyber security system, it is
expected is that the robustness of the entire platform increases.
Document Page
REFERENCES
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and
employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.
Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack
detection. Computers in Human Behavior, 48, 51-61.
Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications Surveys &
Tutorials, 18(2), 1153-1176.
Carr, M. (2016). Publicprivate partnerships in national cyber-security strategies. International
Affairs, 92(1), 43-62.
Kent, A. D. (2016). Cyber security data sources for dynamic network research. In Dynamic
Networks and Cyber-Security(pp. 37-65).
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, 52-80.
Syed, Z., Padia, A., Finin, T., Mathews, L., & Joshi, A. (2016, March). UCO: A unified
cybersecurity ontology. In Workshops at the Thirtieth AAAI Conference on Artificial
Intelligence.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]