logo

Internet Security Report | Cyber Security

   

Added on  2022-08-19

12 Pages2590 Words11 Views
Data Science and Big Data
 | 
 | 
 | 
Running head: REPORT ON CYBER SECURITY
REPORT ON CYBER SECURITY
Name of the Student
Name of the University
Author Note:
Internet Security Report | Cyber Security_1

Cyber Security1
Executive Summary:
Internet security is big topic which is quite essential for communication system of cyber
café, however this is extremely wide and dynamic in scope. It is reason that several organizations
heavily invest in highly trained specialists and dedicated security infrastructure. This paper
provides the security plan, security measures, training and security policies for maintaining a
safe and secure environment for the systems of the cyber café. It is observed that cyber threats
spyware and virus are among big threat of internet for the users of cyber café. This paper
provides security measures and policies to counter measure the threats of cyber café.
Internet Security Report | Cyber Security_2

Cyber Security2
Table of Contents
Executive Summary:............................................................................................................1
Introduction:........................................................................................................................3
Security Plan:.......................................................................................................................3
Security Countermeasures:..................................................................................................4
Training:...............................................................................................................................5
Security Policy:....................................................................................................................6
Conclusion:..........................................................................................................................8
References:........................................................................................................................10
Internet Security Report | Cyber Security_3

Cyber Security3
Introduction:
Considering he rapid growth of technology it is identified that for any IT enabled
organization or any organization connected with internet there is a significance of eth security
threats which needs to be mitigated within the purpose to enhance the organizational services of
the that organization (Kayode et. al. 2016). Followed by this concern it is identified that Cyber
security is such practice which protects the systems, programs or the network from external
digital attacks.
Followed by the above discussion the primary aim of this paper is to discuss about the
cyber security implementation plan for Cyber Café. Which has intended to implement effective
Cyber security policies within the organization with the purpose top protect their user data as
well as the operations (Dhivya and JebaMoses 2016). In order to discuss the implementation plan
this will consist a detail discussion on the necessity of the security plan within the organization,
security countermeasures, awareness program as well as the approached security policies which
will help Cyber café to protect their network, systems as well as their data.
Security Plan:
Followed by a thorough analysis on the organizational infrastructure of Cyber Café it is
identified that the director of Cyber Café is highly concerned with the confidentiality of the
company data as well as network security as they are assuming that the attacks of virus or any
other data breach can cause a huge blunder to their business services (Houmz et. al. 2016).
Making allowance to this concern few employ of this organization has been selected with the
purpose to get a detail idea about the conflicts present within the organization. After completion
of the interview it is identified that Cyber Café has three locations where in total almost of 60
workstation are working. However, the locations are present in the remote area where none of the
Internet Security Report | Cyber Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Executive Summary of Cyber Security
|14
|2768
|9

Cyber Cafe Case Study Assessment
|13
|2585
|16

Assignment | Cyber Security
|23
|2174
|14

HI6008 - Business Research on Cyber Security
|19
|3876
|330

Report on the Cyber Security 2022
|14
|3027
|5

Cyber Security and Its Impact
|4
|672
|15