Cyber. Security Risks and MITIGATING TECHNIQUES. Introd
VerifiedAdded on 2022/11/15
|12
|422
|56
Presentation
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
CYBER SECURITY RISKS
AND MITIGATING
TECHNIQUES
AND MITIGATING
TECHNIQUES
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTRODUCTION
Cyber security techniques are considered as the opposing force to the
cyber attacks that are imposed by the imposters. This ensures the fact
that with the help of the implementation of the cyber security robustness
of the platform is increased.
Cyber security techniques are considered as the opposing force to the
cyber attacks that are imposed by the imposters. This ensures the fact
that with the help of the implementation of the cyber security robustness
of the platform is increased.
CYBER ATTACK
The cyber attacks due to which the cyber security methide are required
are as follows: -
• Ransomware
• Trojan Horses
• Virus
• Data breach
The cyber attacks due to which the cyber security methide are required
are as follows: -
• Ransomware
• Trojan Horses
• Virus
• Data breach
TYPES OF METHODS
The methods that are used in the cyber security process are as follows: -
• Firewalls
• Antivirus
• Content filtering
• Intrusion detection system
The methods that are used in the cyber security process are as follows: -
• Firewalls
• Antivirus
• Content filtering
• Intrusion detection system
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
METHODS
Firewall
Firewall is implemented in the networking system for avoiding
unnecessary interference of the imposters. This help in securing the
network via which the data is being transacted. With the help of
increasing the robustness, data breaching process gets performed.
Firewall
Firewall is implemented in the networking system for avoiding
unnecessary interference of the imposters. This help in securing the
network via which the data is being transacted. With the help of
increasing the robustness, data breaching process gets performed.
METHODS
Antivirus
Antivirus is used for dealing with the malware and ransomware attacks.
As in the processing of the antivirus the main advantage that is gained is
that the antivirus prevents entry of virus via platforms that will affect the
functioning of the system
Antivirus
Antivirus is used for dealing with the malware and ransomware attacks.
As in the processing of the antivirus the main advantage that is gained is
that the antivirus prevents entry of virus via platforms that will affect the
functioning of the system
METHODS
Content Filtering
Content filtering is based on the processing of eliminating the data that is
unwanted and causing harm in the regular living process. This ensures
that unauthorized and unethical fata will not pop up on the screen.
Content Filtering
Content filtering is based on the processing of eliminating the data that is
unwanted and causing harm in the regular living process. This ensures
that unauthorized and unethical fata will not pop up on the screen.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
METHODS
Intrusion detected system
With the help of the Intrusion detected system, the main aspect that is
taken into consideration is that the cyber security management is
performed as per the detection of the malware and ransomware and gets
treated
Intrusion detected system
With the help of the Intrusion detected system, the main aspect that is
taken into consideration is that the cyber security management is
performed as per the detection of the malware and ransomware and gets
treated
SUMMARY
Digital platform is one of the latest technologies that are in trend. Due to
this aspect a lot of security issues are caused. For mitigating these
security issues, cyber security is introduced. With the help of the cyber
security proper processing the daily tasks that requires security in the
system
Digital platform is one of the latest technologies that are in trend. Due to
this aspect a lot of security issues are caused. For mitigating these
security issues, cyber security is introduced. With the help of the cyber
security proper processing the daily tasks that requires security in the
system
RESEARCH METHODS
The research method used in this study is secondary data collection and
both qualitative data analysis as well as the quantitative data analysis.
With the help of the qualitative and quantitative data analysis process
the research method gets easy. Proper management of the business
arrangement is to be performed.
The research method used in this study is secondary data collection and
both qualitative data analysis as well as the quantitative data analysis.
With the help of the qualitative and quantitative data analysis process
the research method gets easy. Proper management of the business
arrangement is to be performed.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CONCLUSION
From the above ppt it can be stated that importance of cyber security
has been ever increasing. With the help of the cyber security system, it is
expected is that the robustness of the entire platform increases.
From the above ppt it can be stated that importance of cyber security
has been ever increasing. With the help of the cyber security system, it is
expected is that the robustness of the entire platform increases.
REFERENCES
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and
employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.
Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack
detection. Computers in Human Behavior, 48, 51-61.
Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications Surveys &
Tutorials, 18(2), 1153-1176.
Carr, M. (2016). Public–private partnerships in national cyber-security strategies. International
Affairs, 92(1), 43-62.
Kent, A. D. (2016). Cyber security data sources for dynamic network research. In Dynamic
Networks and Cyber-Security(pp. 37-65).
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, 52-80.
Syed, Z., Padia, A., Finin, T., Mathews, L., & Joshi, A. (2016, March). UCO: A unified
cybersecurity ontology. In Workshops at the Thirtieth AAAI Conference on Artificial
Intelligence.
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and
employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.
Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack
detection. Computers in Human Behavior, 48, 51-61.
Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications Surveys &
Tutorials, 18(2), 1153-1176.
Carr, M. (2016). Public–private partnerships in national cyber-security strategies. International
Affairs, 92(1), 43-62.
Kent, A. D. (2016). Cyber security data sources for dynamic network research. In Dynamic
Networks and Cyber-Security(pp. 37-65).
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, 52-80.
Syed, Z., Padia, A., Finin, T., Mathews, L., & Joshi, A. (2016, March). UCO: A unified
cybersecurity ontology. In Workshops at the Thirtieth AAAI Conference on Artificial
Intelligence.
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.