Network and Cybersecurity: Threats and Control Measures

   

Added on  2023-06-03

13 Pages1909 Words314 Views
Running head: NETWORK AND CYBERSECURITY
NETWORK AND CYBERSECURITY
Name of the student:
Name of the university:
Author note:
Network and Cybersecurity: Threats and Control Measures_1
1NETWORK AND CYBERSECURITY
Executive Summary:
Cyber security of the networks as well as the information is one of the most important
concerns of the organizations today, all across the world. There are different kinds \of data
security related issues which the organizations are facing now a days. There has been cases in the
recent past where in which big organizations were reported to have faced security and data
breaches I their work places, which have had a global impact for the employees as well as the
customers of the organization.
This report will highlight the different categories of threats, which are common across the
organizations in today’s world, and the associated control measures and what those control
measures aim to do. By the end of the report, the reader will have a detailed knowledge about the
control measures, which the organizations can implement internally in order to secure their data
and the other important information.
Network and Cybersecurity: Threats and Control Measures_2
2NETWORK AND CYBERSECURITY
Table of Contents
Introduction:....................................................................................................................................5
Accidental corruption of information:.........................................................................................5
Control measures:....................................................................................................................5
Description of the issue:..........................................................................................................5
Classification and type:............................................................................................................5
Loss of intellectual property:.......................................................................................................6
Control measures:....................................................................................................................6
Description of the issue:..........................................................................................................6
Classification and type:............................................................................................................6
Software piracy:...........................................................................................................................6
Control measures:....................................................................................................................6
Description of the issue:..........................................................................................................6
Classification and type:............................................................................................................7
Theft of information (hacker):.....................................................................................................7
Control measures:....................................................................................................................7
Description of the issue:..........................................................................................................7
Classification and type:............................................................................................................7
Theft of information (employee).................................................................................................7
Network and Cybersecurity: Threats and Control Measures_3
3NETWORK AND CYBERSECURITY
Control measures:....................................................................................................................7
Description of the issue:..........................................................................................................8
Classification and type:............................................................................................................8
Website defacement:....................................................................................................................8
Control measures:....................................................................................................................8
Description of the issue:..........................................................................................................8
Classification and type:............................................................................................................8
Fire and flood:..............................................................................................................................8
Control measures:....................................................................................................................8
Description of the issue:..........................................................................................................9
Classification and type:............................................................................................................9
Elevation of privilege:.................................................................................................................9
Control measures:....................................................................................................................9
Description of the issue:..........................................................................................................9
Classification and type:............................................................................................................9
Theft of equipment:.....................................................................................................................9
Control measures:....................................................................................................................9
Description of the issue:........................................................................................................10
Classification and type:..........................................................................................................10
Viruses, worms and Trojan horses:...........................................................................................10
Network and Cybersecurity: Threats and Control Measures_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Networks and Cybersecurity: Threats and Controls
|13
|1739
|446

Network and Security: Threats and Controls
|10
|1781
|75

Threat Categories for Information Security: Prevention and Detection Techniques
|13
|1796
|257

Network and Security: Threat Control
|14
|1775
|486

Secure Computer Networks
|13
|2163
|176

Network and Security - Threats and Controls
|14
|1843
|104