logo

Cybersecurity Threats and Vulnerabilities

   

Added on  2020-04-01

16 Pages3679 Words43 Views
 | 
 | 
 | 
Running head: NETWORK AND INFORMATION SECURITY TECHNOLOGIESNetwork and Information Security TechnologiesName of the StudentName of the UniversityAuthor’s note
Cybersecurity Threats and Vulnerabilities_1

1 NETWORK AND INFORMATION SECURITY TECHNOLOGIES
Cybersecurity Threats and Vulnerabilities_2

2 NETWORK AND INFORMATION SECURITY TECHNOLOGIESExecutive SummaryThe main objective of this business report is to discuss about the various methods and proceduresthat can be adopted by the Australian company in order to expand their business by using ICT.This report describes three security applications that can be used by the company in order toprevent the loss and damage of valuable data. The names of the applications are Norton Security,Bitdefender Total Security and Kaspersky Internet Security. These applications can be used bythe company for expanding its business and automating all the business processes. Thelimitations of the applications have also been discussed in this report. This report provides threerecommendations like implementation of firewalls, encrypting valuable data and buying vendorapplications for expanding its business globally.
Cybersecurity Threats and Vulnerabilities_3

3 NETWORK AND INFORMATION SECURITY TECHNOLOGIESTable of ContentsIntroduction..........................................................................................................................4Information and Network Security......................................................................................5Information and Network Security Applications in the Current Market.............................5Expansion of the Organization............................................................................................8Conclusion.........................................................................................................................10Recommendations..............................................................................................................11References..........................................................................................................................13
Cybersecurity Threats and Vulnerabilities_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents