logo

ITC571 Assignment – Emerging Technology and Innovations Assignment

   

Added on  2020-03-16

7 Pages2654 Words46 Views
Full Name
Student ID
Subject ITC571 – Emerging Technology and Innovations
Assignment No Final Report
Due Date
Lecturer’s Name Malka N. Halgamuge
Cyber security
- The paper title could be more specific than general.
Your Name
Your Email
School of Computing and Mathematics, Charles Sturt University, Melbourne, Victoria
Abstract- The computer networks and systems have been prone to the attacks from cyber security. Cyber
security safeguards them from the cyber threats. The threats are minimized by the security principles. The
research gas covered the significance, originality and the literature review on the area of cyber security. It
has also provided the material and methods along with the results and discussions.
Key Words— cyber security, security breaches, communication
1. INTRODUCTION
The cyber security involves the techniques and process used for protecting the computer networks and
system and the additional data. Cyber security safeguards them from the cyber threats. The threats are
minimized by the security principles.
Significance of the research:
The research is useful and interesting due to the various reasons. The cyber security has been
denoting the commitment that has been absent otherwise. Moreover, there has been an argument how the
companies could become proactive. The cyber security is not only the principle statements. It has been the
specific goals, decisions and objectives to manage the problems. It has been supplying the accountability to
the business stakeholders. Further is the highest-level contract for making the data safe. It is the first move
to help the companies come together for coordination.

Originality of the approach:
There have been solid lessons to be learnt from the compromises, accidents, mistakes and attack. Like the
personal lives the online activities are needed to grow up. They need to be much mature as per as the
security management is concerned. So eyes are to be kept for the new compromises. It must not be
forgotten to learn from the failures of the security.
Literature review:
("Google leads $100m cybersecurity investment", 2017)
Presently the cyber attacks seem to rise. For reducing these new methods are needed to be adopted. The
Google has initiated and invested a huge capital in the sector of cyber-security for reducing the threats.
("Cyber threats require an ongoing and relentless focus on security - Microsoft Enterprise", 2017)
The digitalization has been rising every day. Many people have been using the cloud for transferring the
data. Cyber security experts ate acquired by them forming groups to monitor the threats. The assimilation
of the machine learning and human vigilance has equaled the entire protection.
("Meeting the cybersecurity challenge", 2017)
The safeguarding of the threats to the entire organization is impossible. Hence the protection of data instead
of any interruption regarding innovation growth has been an important issue. Maximum of the large
companies have been investing huge money for strengthening the methods of Cyber security.
("Windows 10 for government agencies: helping protect, detect and respond to cyber-attacks - Microsoft
Enterprise", 2017)
The average expense of the breaches of security mentioned in the article has been huge. This has been even
after warning about the threat. The loss was about three trillion dollars to produce all the threats.

("Cyber Security | Managed Security Services|TCS", 2017)
More than the security companies, the cybercrimes have been rising very fast. Hence many companies are
found to investigate large amount of data in the risk management and data security. They have been
founding to be work on the controlling of the security services. They have been assessing the threats for the
companies. They have been also delivering the technical support. These challenges could never be
prevented. However the article shows that there are scopes to decrease the threats. Hence focus s=must be
maintained to find the solutions for those threats.
("Commonwealth Bank of Australia years ahead of rivals on cyber security", 2017)
The Commonwealth Bank of Australia has been one of the popular banks in the nation. They are found to
take huge move in the attacks of cyber security and developed a strong wall of defense for the
organizations to access the threats inside. They have been developing the inbuilt features to stop the threats
generated by the hackers. The application has been consistently monitoring the security services and
securing the devices from the malware.
("Strengthening cybersecurity for federal government agencies - Microsoft Enterprise", 2017)
The rise in usage of the IOT devices has raised the digitalization and improving various security breaches
to government. They have been causing the vulnerabilities causing the loss of data. Currently the
waanycrypt has been a finest example of that. For reducing the cyber threats, Microsoft has provided few
cloud security solutions for securing the data. They have been possessing intelligent gaps in security. They
have been making improvements in that to collect the solutions for various kinds of threats regarding cyber
security. The assimilation of the human vigilance and artificial intelligence has been always the resource of
the organizations.
("Security Market Space | Micro Focus", 2017)
The HP has been one the popular providers of security in the market. They have been making latest trends
in the market through creating the security that has been micro focus for reducing the cyber threats. With
the help of that the data gas been focused at. Security is provided to the applications and powerful analytics
is developed to detect the unknown and known facts causing high loss to the organizations. It must be
ensured that every device are protected. Every time the security tests are performed on the services. As the
testing of the tracking of the system is complete, the system configuration changes to guard against those
threats. This Micro focus has been playing an important role in the security.
Research gap:
The limitation of the work is that the actual implementation of the information sharing has not been
the federal law. This has been due to the lack of the executive support. The research indicated that various
executives has been out of the loop as per as the issues of cyber security are concerned. The hole in the
work is the lack of awareness translating into the lack of support for the initiatives like the information
sharing. Though it has seemed that the sharing of the threat information has been effort to help the
competitors, the area that has not been the considered here is the enlightened sense of the needs of self
interest.
Aim of your research:
The aims are:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Assignment 2022
|12
|2845
|22

PfSense: A Comprehensive Cybersecurity Tool for Intrusion Detection System
|20
|3463
|311

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375

Importance of Cybersecurity
|9
|1925
|214

Cybersecurity Assignment 2022
|12
|3058
|22

(Solved) Cyber security challenges Assignment
|8
|2715
|216