Cyber Security: Threats, Challenges, and Mitigation Strategies

   

Added on  2023-06-10

12 Pages3967 Words307 Views
Running Head: cyber security
Cyber Security
Cyber Security: Threats, Challenges, and Mitigation Strategies_1
Cyber Security 1
Table of Contents
Introduction................................................................................................................................2
Cyber security............................................................................................................................3
Objective of cyber security.....................................................................................................3
Cyber Compliance..................................................................................................................4
Possible threats and attacks....................................................................................................4
Challenges faced in cyber security.............................................................................................5
Cyber security policies and protections..................................................................................6
Countermeasures and mitigation strategies............................................................................7
Reason for cyber crime.......................................................................................................7
Cyber security techniques.......................................................................................................7
Conclusion..................................................................................................................................9
References................................................................................................................................10
Cyber Security: Threats, Challenges, and Mitigation Strategies_2
Cyber Security 2
Introduction
Cyber security is a defence that is used to safeguard the information stored on wide networks.
Cyber security is used to ensure that the data is shielded from the hackers. Cyber security shields the
information from unauthorized user and make sure that secrecy is maintained. Cyber security is
fundamental for every organisation as it uses set of techniques to keep up the protection of data. In
this report the threats and attacks along with challenges that are faced are discussed. The count
measures and mitigation strategies that are used to maintain security over the network are listed. It
promises that private information which is stored on the network is secure and integrity,
confidentiality and availability of data are met. Cyber security is very significant as it protects digital
data from hackers and avoid that the data do not get modifies by unauthorized user. It uses set of
strategies to maintain the privacy of information. Cyber is related to group of computers that are
connected to form a network via internet these computers store important data and files that need to be
secured.
Cyber Security: Threats, Challenges, and Mitigation Strategies_3
Cyber Security 3
Cyber security
In today’s time all the sensitive information of businesses are stored internet and people
complete rely that their data is secured and it will not be leaked. Thus it is essential to assure that the
network through which communication take place is secure and is free from all the possible attacks.
For such cases cyber security plays an important role as it safeguards the information and system from
all the malicious activities (Abomhara, 2015). Thus business and organisation contribute much of
the efforts in securing the system and making sure that web is protected from all the attacks. This is
done by securing all asserts, resources and data (Gupta, Agrawal & Yamaguchi, 2016). Cyber
security works on the principal to gain confidentiality, integrity and availability of all the data packets.
Cyber security can be seen as a protecting agent that protects all the hardware’s, software’s,
applications and data of an organisation. The work cyber related to the network of computers that are
linked over a network by the medium of internet. The network contains sensitive information that
need to be secured thus cyber security assures that data will be protected against all the hackers.
Security of cyber network can be stated as cyber security. They disallow all the invalid users to access
the data or modify it without any modification (Gupta, Agrawal & Yamaguchi, 2016). This make
sure that only valid user can access the data and a proper access control is provided regarding who can
read, write and modify the sensitive data. This can be treated as a security shield from all the
unauthorized users. It can be referred as information technology security that focuses on safeguarding
the network, computers and data from all the unauthorized access. The aim of cyber security is to
protect the information from all the criminals and measures need to be taken to achieve protection.
Cyber security is the collection of tools, policies, guidelines, risk management approaches, assurance
and technologies that are used to protect the cyber background, business, asserts and the users. It
strives to ensure the attainment and maintenance of the security properties of the organization and
user’s assets against relevant security risks in the cyber environment. It is a protecting agent that
protects all the hardware’s, software’s, applications and data of an organisation. The aim of cyber
security is maintain secrecy of all the information. It not only protects the sensitive data but take care
that digital data is also not accessed by hackers.
Objective of cyber security
The main aim an objective of cyber security is to assure that three factors are met. The three
factors that assure that information are secure and are free from all the attacks (Knowles, et. al,
2015). The features that are used for cyber security are:
Confidentiality- this helps in maintaining the privacy of information. This makes sure that
only authorized user can access the data and sensitive data is protected from reaching towards
Cyber Security: Threats, Challenges, and Mitigation Strategies_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Cyber Security pdf
|10
|1812
|84

Cyber security : Assignment PDF
|5
|1139
|160

Cyber Security Issues and Solutions for Small Accounting Company JL
|11
|3082
|122

Cyber security.
|3
|390
|36

Cyber Security Assignment 2022
|12
|2845
|22

Cyber security Assignment PDF
|9
|1468
|145