logo

Identifying and Combating Emerging Threats in Information Systems

   

Added on  2023-06-13

9 Pages1758 Words300 Views
Running head: IDENTIFYING AND COMBATING EMERGING THREATS IN INFORMATION SYSTEMS
Identifying and combating emerging threats in Information Systems
Name of the Student
Name of the University
Author’s note:

1IDENTIFYING AND COMBATING EMERGING THREATS IN INFORMATION SYSTEMS
Executive Summary
Information technology or cyber security could be defined as the techniques in order to protect the
networks, computer, data and programs from unauthorized access of various attacks, which are meant
for exploitation. The cyber security comprises of processes, controls and various kind of technologies,
which are mainly designed in order to secure different systems, data and network from cyber related
attacks. In the recent times, there is a high need for the security of the devices, which are connected
with the internet and are able to share vital information. This report focusses on the different kinds of
attacks and threats that might be posed on the internet networks.

2IDENTIFYING AND COMBATING EMERGING THREATS IN INFORMATION SYSTEMS
Table of Contents
1. Identification of Threats and Attacks.......................................................................................................3
2. Potential Damages...................................................................................................................................3
3. Challenges/Issues....................................................................................................................................4
4. Mitigation and Countermeasure Strategies.............................................................................................5
5. Conclusion...............................................................................................................................................6
6. References...............................................................................................................................................7

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Issues In IoT
|12
|4945
|61

IoT Threats to Database Security
|5
|1145
|364

IoT Security: Risks and Mitigation Techniques
|10
|865
|302

Leading Communication Technology
|5
|2088
|16

Introduction to Cyber Security
|14
|3209
|388

Cybersecurity Threat Name of the Student
|11
|2321
|49