Network and Cybersecurity: Threats and Control Measures
Added on 2023-06-03
13 Pages1909 Words314 Views
Running head: NETWORK AND CYBERSECURITY
NETWORK AND CYBERSECURITY
Name of the student:
Name of the university:
Author note:
NETWORK AND CYBERSECURITY
Name of the student:
Name of the university:
Author note:
1NETWORK AND CYBERSECURITY
Executive Summary:
Cyber security of the networks as well as the information is one of the most important
concerns of the organizations today, all across the world. There are different kinds \of data
security related issues which the organizations are facing now a days. There has been cases in the
recent past where in which big organizations were reported to have faced security and data
breaches I their work places, which have had a global impact for the employees as well as the
customers of the organization.
This report will highlight the different categories of threats, which are common across the
organizations in today’s world, and the associated control measures and what those control
measures aim to do. By the end of the report, the reader will have a detailed knowledge about the
control measures, which the organizations can implement internally in order to secure their data
and the other important information.
Executive Summary:
Cyber security of the networks as well as the information is one of the most important
concerns of the organizations today, all across the world. There are different kinds \of data
security related issues which the organizations are facing now a days. There has been cases in the
recent past where in which big organizations were reported to have faced security and data
breaches I their work places, which have had a global impact for the employees as well as the
customers of the organization.
This report will highlight the different categories of threats, which are common across the
organizations in today’s world, and the associated control measures and what those control
measures aim to do. By the end of the report, the reader will have a detailed knowledge about the
control measures, which the organizations can implement internally in order to secure their data
and the other important information.
2NETWORK AND CYBERSECURITY
Table of Contents
Introduction:....................................................................................................................................5
Accidental corruption of information:.........................................................................................5
Control measures:....................................................................................................................5
Description of the issue:..........................................................................................................5
Classification and type:............................................................................................................5
Loss of intellectual property:.......................................................................................................6
Control measures:....................................................................................................................6
Description of the issue:..........................................................................................................6
Classification and type:............................................................................................................6
Software piracy:...........................................................................................................................6
Control measures:....................................................................................................................6
Description of the issue:..........................................................................................................6
Classification and type:............................................................................................................7
Theft of information (hacker):.....................................................................................................7
Control measures:....................................................................................................................7
Description of the issue:..........................................................................................................7
Classification and type:............................................................................................................7
Theft of information (employee).................................................................................................7
Table of Contents
Introduction:....................................................................................................................................5
Accidental corruption of information:.........................................................................................5
Control measures:....................................................................................................................5
Description of the issue:..........................................................................................................5
Classification and type:............................................................................................................5
Loss of intellectual property:.......................................................................................................6
Control measures:....................................................................................................................6
Description of the issue:..........................................................................................................6
Classification and type:............................................................................................................6
Software piracy:...........................................................................................................................6
Control measures:....................................................................................................................6
Description of the issue:..........................................................................................................6
Classification and type:............................................................................................................7
Theft of information (hacker):.....................................................................................................7
Control measures:....................................................................................................................7
Description of the issue:..........................................................................................................7
Classification and type:............................................................................................................7
Theft of information (employee).................................................................................................7
3NETWORK AND CYBERSECURITY
Control measures:....................................................................................................................7
Description of the issue:..........................................................................................................8
Classification and type:............................................................................................................8
Website defacement:....................................................................................................................8
Control measures:....................................................................................................................8
Description of the issue:..........................................................................................................8
Classification and type:............................................................................................................8
Fire and flood:..............................................................................................................................8
Control measures:....................................................................................................................8
Description of the issue:..........................................................................................................9
Classification and type:............................................................................................................9
Elevation of privilege:.................................................................................................................9
Control measures:....................................................................................................................9
Description of the issue:..........................................................................................................9
Classification and type:............................................................................................................9
Theft of equipment:.....................................................................................................................9
Control measures:....................................................................................................................9
Description of the issue:........................................................................................................10
Classification and type:..........................................................................................................10
Viruses, worms and Trojan horses:...........................................................................................10
Control measures:....................................................................................................................7
Description of the issue:..........................................................................................................8
Classification and type:............................................................................................................8
Website defacement:....................................................................................................................8
Control measures:....................................................................................................................8
Description of the issue:..........................................................................................................8
Classification and type:............................................................................................................8
Fire and flood:..............................................................................................................................8
Control measures:....................................................................................................................8
Description of the issue:..........................................................................................................9
Classification and type:............................................................................................................9
Elevation of privilege:.................................................................................................................9
Control measures:....................................................................................................................9
Description of the issue:..........................................................................................................9
Classification and type:............................................................................................................9
Theft of equipment:.....................................................................................................................9
Control measures:....................................................................................................................9
Description of the issue:........................................................................................................10
Classification and type:..........................................................................................................10
Viruses, worms and Trojan horses:...........................................................................................10
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Computer Networks and Cybersecurity: Threats and Controlslg...
|13
|1739
|446
Network and Security: Threats and Controlslg...
|10
|1781
|75
Threat Categories for Information Security: Prevention and Detection Techniqueslg...
|13
|1796
|257
Network and Security: Threat Controllg...
|14
|1775
|486
Secure Computer Networkslg...
|13
|2163
|176
Network and Security - Threats and Controlslg...
|14
|1843
|104