INTRODUCTION Cyber security techniques are considered as the opposing force to the cyber attacks that are imposed by the imposters. This ensures the fact that with the help of the implementation of the cyber security robustness of the platform is increased.
CYBER ATTACK The cyber attacks due to which the cyber security methide are required are as follows: - •Ransomware •Trojan Horses •Virus •Data breach
TYPES OF METHODS The methods that are used in the cyber security process are as follows: - •Firewalls •Antivirus •Content filtering •Intrusion detection system
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
METHODS Firewall Firewall is implemented in the networking system for avoiding unnecessary interference of the imposters. This help in securing the network via which the data is being transacted. With the help of increasing the robustness, data breaching process gets performed.
METHODS Antivirus Antivirus is used for dealing with the malware and ransomware attacks. As in the processing of the antivirus the main advantage that is gained is that the antivirus prevents entry of virus via platforms that will affect the functioning of the system
METHODS Content Filtering Content filtering is based on the processing of eliminating the data that is unwanted and causing harm in the regular living process. This ensures that unauthorized and unethical fata will not pop up on the screen.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
METHODS Intrusion detected system With the help of the Intrusion detected system, the main aspect that is taken into consideration is that the cyber security management is performed as per the detection of the malware and ransomware and gets treated
SUMMARY Digital platform is one of the latest technologies that are in trend. Due to this aspect a lot of security issues are caused. For mitigating these security issues, cyber security is introduced. With the help of the cyber security proper processing the daily tasks that requires security in the system
RESEARCH METHODS The research method used in this study is secondary data collection and both qualitative data analysis as well as the quantitative data analysis. With the help of the qualitative and quantitative data analysis process the research method gets easy. Proper management of the business arrangement is to be performed.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CONCLUSION From the above ppt it can be stated that importance of cyber security has been ever increasing. With the help of the cyber security system, it is expected is that the robustness of the entire platform increases.
REFERENCES Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks.Journal of Cyber Security and Mobility,4(1), 65-88. Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors.Computers in Human Behavior,69, 437-443. Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection.Computers in Human Behavior,48, 51-61. Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods forcybersecurityintrusiondetection.IEEECommunicationsSurveys& Tutorials,18(2), 1153-1176. Carr, M. (2016). Public–private partnerships in national cyber-security strategies.International Affairs,92(1), 43-62. Kent, A. D. (2016). Cybersecurity data sources for dynamic network research. InDynamic Networks and Cyber-Security(pp. 37-65). Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems.International journal of critical infrastructure protection,9, 52-80. Syed, Z., Padia, A., Finin, T., Mathews, L., & Joshi, A. (2016, March). UCO: A unified cybersecurity ontology. InWorkshops at the Thirtieth AAAI Conference on Artificial Intelligence.