logo

Cyber Security - Network Security in the Cyber Cafe

   

Added on  2022-08-14

11 Pages2254 Words14 Views
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the University
Author Note

1CYBER SECURITY
Executive Summary
Due to the rising concern over the security of information, information assurance and the
concerns of the security of network of the cyber cafe needs to be examined. The cyber cafe
has been subjected to cyber attacks and viruses. Therefore, the report focuses on the
evaluation of threats of the cyber cafe and the mitigation strategies that needs to be developed
for the company. The report also focuses on the security awareness and the training of the
employees so that they can take sufficient measures during any of the cyber attacks and data
breach.

2CYBER SECURITY
Table of Contents
Introduction:...............................................................................................................................3
Identification of the Employees of Organization.......................................................................3
Identification of Organizational holdings at Risk......................................................................5
The Other Possible Threats........................................................................................................5
Security Plan for Cyber Cafe.....................................................................................................6
Security Training Programme....................................................................................................7
Conclusion..................................................................................................................................7
References..................................................................................................................................9

3CYBER SECURITY
Introduction:
Cyber security is the practice of safeguarding the networks, systems and programs
from the digital attacks. These cyber attacks are aimed in order to access, change or destroy
the sensitive information, extortion of money from the user or interrupting the normal
business procedures. Implementation of effective measures of cyber security is specifically
challenging today as there are more devices than the people and the hackers are becoming
more distinctive.
The report deals with a cyber cafe whose director was concerned about the network
security in the systems of the cafe. The report focuses on the employees of the organization
that will conduct the interviews in order to gather information about the complaints. The
report focuses on the holdings of the organization that are at risk. The report provides an
overview of the risks of the organization and a security plan in order to address the threats of
the organization. Lastly, the report discusses about a information security training program
for the employees of the organization.
Identification of the Employees of Organization
Few employees of the cyber cafe can be recognised and interviews can be conducted
in order to gather information regarding the major complaints and the threats in the cyber
cafe (Pham et al 2019). The employees of the organization include the director of the cyber
cafe and the network manager of the cyber cafe. These two are the main person of the cyber
cafe that can be interviewed in order to gather information.
Interview Questions for the Director
What are threats that the cyber cafe is facing right now?
Does your cyber cafe have a proper security policy?

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375

Assignment on Cyber Security pdf
|10
|1812
|84

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Cyber Cafe Case Study Assessment
|13
|2585
|16

Applications of Cyber-Security in Higher Education
|28
|7698
|11

Security Plan And Security Management
|11
|1883
|12