logo

Network Security and Types of Security Threats and Attacks in Information Technology

Write short answer questions on Information Security, analyze a data breach article using the Vulnerability-Threat-Control framework.

8 Pages2577 Words274 Views
   

Added on  2023-06-15

About This Document

This report provides an overview of information security, cryptography, types of security threats and attacks, and network security. It discusses the importance of securing web servers and provides advice on how to protect them from cyberattacks. The report also covers different types of firewalls used for network security.

Network Security and Types of Security Threats and Attacks in Information Technology

Write short answer questions on Information Security, analyze a data breach article using the Vulnerability-Threat-Control framework.

   Added on 2023-06-15

ShareRelated Documents
Information Tech
Network Security and Types of Security Threats and Attacks in Information Technology_1
Contents
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
Question 3 Types of security threats and attacks..............................................................1
Question 4 Network security...............................................................................................3
CONCLUSION................................................................................................................................5
References:.......................................................................................................................................6
Network Security and Types of Security Threats and Attacks in Information Technology_2
INTRODUCTION
The networking is specific branch of information technology and fastest growing in area
of IT. This includes the procedure of developing, using and maintaining of computer networks
that involves hardware, software and protocols for sharing data from multiple computing
devices. The networking may involve home or business network of computers or wireless
computer networks. Information technology is development, maintenance or use of systems - in
particular computer systems, software and networks- for storing, retrieving and sending
information (Brophy, J.M., 2018). Computer networks are the process of electronically
connecting two or more technology devices to exchange information over data links. The main
goal of the information technology system is to help people carry out the work in a simple and
quick way so that goals can be achieved help staff troubleshoot issues with their mobile devices
and computers, and do the job to ensure the security and efficiency of business information is
maintained. This report covers overview of information security, cryptography, types of security
threats and attacks. Further it discusses about network security.
MAIN BODY
Question 3 Types of security threats and attacks
The cyberattack defines to an attempt to disable computers, steal data, or use a damaged
computer system for launching additional attacks. The Cyber security threat defines to any
malicious attack which seeks to unlawfully accessing data, damage information. Different
methods are used cybercriminals foe launching cyber-attack that involves malware, phishing,
ransomware and other methods. The web server defines to a computer software which accepts
through HTTP. It is a computer which helps in running websites (Christodoulou, D., 2020). To
run the web server a hardware is used which varies according to volume of requests that is
needed to handle. In the organisation the server has an important role as they hold the
confidential data and information of organisation. The insecure server is vulnerable to all kinds
of security threats and cyber-attacks. It has been seen that cyber-attacks hits business and private
systems every day which are increasing day-by-day. The motives of cyber-attacks are many as
one is money. The cyber attackers take offline systems and demand payments for restoring its
functionality. The followings are the cybersecurity threats which is been discussed below-
1
Network Security and Types of Security Threats and Attacks in Information Technology_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity Threat Name of the Student
|11
|2321
|49

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Security threats Assignment PDF
|17
|5254
|133

Information Governance And Cyber Security
|11
|3243
|86

Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227

Understanding Access Control in Cyber Security
|24
|9360
|80