IT Risk Management Assignment: Cyber Security

Added on - 28 May 2020

  • 10

    pages

  • 4162

    words

  • 1

    views

  • 0

    downloads

Showing pages 1 to 3 of 10 pages
Running head: IT RISK MANAGEMENT- CYBER SECURITYIT risk management-Cyber SecurityName of StudentName of UniversityAuthor Note
1IT RISK MANAGEMENT- CYBER SECURITYExecutive Summary :This report addresses the process of the IT security management. With the rising risk themanagement of these risk is of primary importance for the healthy functioning of theorganization. There are various processes that have been developed for handling the risks. Theprocess that is discussed in this report is cyber security. Cyber security consist of thetechnologies that are used or are responsible for the protection of the important data or programsfrom attack. The report discusses the various threats that is present in organizations. Thesolutions has been given with regards to cyber security and how these threats affect the differentorganization. At each point of the report a scenario how the various threats are overcome inGigantic Corporations is presented to give a better view about the real time scenario. A literaryreview stating what changes can be made in the field of cyber security is also presented toprovide a better security facility. Lastly, the report concludes by stating the various threats andhow they are overcome. Various recommendations are provided to better the security issues inthe field of cyber security.
2IT RISK MANAGEMENT- CYBER SECURITYTable of ContentsIntroduction:....................................................................................................................................2Discussion:.......................................................................................................................................2Threats And Solutions To The Threats By Use Of Cyber Security:..........................................2Application Security:...............................................................................................................2Information Security:...............................................................................................................3Network Security:....................................................................................................................3Operation Security:..................................................................................................................4Literary Review:..........................................................................................................................5Conclusion:......................................................................................................................................6Recommendations:..........................................................................................................................6References:......................................................................................................................................7
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Unlock This Document