logo

ITC596 IT Risk Management Assignment: Cyber Security

10 Pages4162 Words133 Views
   

IT Risk Management (ITC596)

   

Added on  2020-05-28

ITC596 IT Risk Management Assignment: Cyber Security

   

IT Risk Management (ITC596)

   Added on 2020-05-28

ShareRelated Documents
Running head: IT RISK MANAGEMENT- CYBER SECURITYIT risk management-Cyber SecurityName of StudentName of UniversityAuthor Note
ITC596 IT Risk Management Assignment: Cyber Security_1
1IT RISK MANAGEMENT- CYBER SECURITYExecutive Summary :This report addresses the process of the IT security management. With the rising risk themanagement of these risk is of primary importance for the healthy functioning of theorganization. There are various processes that have been developed for handling the risks. Theprocess that is discussed in this report is cyber security. Cyber security consist of thetechnologies that are used or are responsible for the protection of the important data or programsfrom attack. The report discusses the various threats that is present in organizations. Thesolutions has been given with regards to cyber security and how these threats affect the differentorganization. At each point of the report a scenario how the various threats are overcome inGigantic Corporations is presented to give a better view about the real time scenario. A literaryreview stating what changes can be made in the field of cyber security is also presented toprovide a better security facility. Lastly, the report concludes by stating the various threats andhow they are overcome. Various recommendations are provided to better the security issues inthe field of cyber security.
ITC596 IT Risk Management Assignment: Cyber Security_2
2IT RISK MANAGEMENT- CYBER SECURITYTable of ContentsIntroduction:....................................................................................................................................2Discussion:.......................................................................................................................................2Threats And Solutions To The Threats By Use Of Cyber Security:..........................................2Application Security:...............................................................................................................2Information Security:...............................................................................................................3Network Security:....................................................................................................................3Operation Security:..................................................................................................................4Literary Review:..........................................................................................................................5Conclusion:......................................................................................................................................6Recommendations:..........................................................................................................................6References:......................................................................................................................................7
ITC596 IT Risk Management Assignment: Cyber Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security of Zoom Printing Company Assignment
|16
|3609
|44

Cyber Security and Decision Making
|6
|1259
|99

IT Risk Management: Threats, Vulnerabilities and Prevention Methods
|21
|4785
|434

Network Security Management
|12
|3039
|83

Cyber Security.
|13
|2534
|2

Information System Control and Auditing | Report
|5
|712
|21