logo

Cyber Security Threats and Data Flow Diagrams

   

Added on  2022-12-07

8 Pages2067 Words160 Views
Cyber security

Contents
INTRODUCTION...........................................................................................................................3
TASK...............................................................................................................................................3
Cyber security threat....................................................................................................................3
Data Flow Diagrams....................................................................................................................5
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8

INTRODUCTION
Cyber security is referred as the body of technology, process and practice which is designed to
protect devices, programme and network from any attack, unauthorised access and cyber attack
as well. Cyber security is termed as the information technology security. In this report the chosen
organisation is Business and Communication insurance which is established in 1965 by the Gary
RT.L & family through health insurance commission. Headquarter of respected organisation is in
New York and provide its services in various countries such as Spain, Hong Kong and Australia.
In this report threat type of cyber security and its factors are discussed. Apart from that various
risk component and process to manage cyber-threat is being covered in this project report.
TASK
Cyber security threat
Cyber security threat is determined as the threat of malicious attack or unwanted activities by an
organisation or individual who attempt to gain important information as well as access to
network in order to corrupt data and relative confidential information. Cyber security affects
business operations and functions through breach of data or even by destroying computer
systems as well. in context to Business and Communication insurance organisation received a
mail from unknown that claims they have accessed all strategic plans and its client personal
details of 200. The respective organisation consults to senior managers and forensic computer
specialist in order to investigate about the cyber threat and its impacts on business (Carlton, Levy
and Ramim, 2019). There are different types of threats of cyber-crimes that are identified by the
managers of Business and Communication insurance organisation.
Cyber threat model report: Threat modelling is defined as the structured process through
which IT experts find potential security threats and identify various vulnerabilities, access the
seriousness of each threat as well as prioritise different techniques in order to mitigate attacks
and protect IT resources in efficient manner. Business and Communication insurance
organisation is facing the threat of cyber attacks through which other organisation steals
confidential information of 200 clients and affect business success in efficient manner as well.
When organisation getting know about this unethical activity than managers consult with IT and
computer specialist to investigate about the cyber threat (Kim, 2017). There are different set of

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Threats to Information Security
|10
|1736
|398

Computer Security: Issues, Framework, and Elements
|18
|5184
|368

Deloitte Cyber-Attack: Data Breach and Security Issues
|1
|673
|99

Cyber Security Assignment | Security Breach
|10
|1891
|117

Cyber Security Issues and Challenges - PDF
|6
|1326
|55

Cyber Security in Banking System
|5
|1352
|96