logo

Report on the Cyber Security 2022

   

Added on  2022-10-18

14 Pages3027 Words5 Views
Running head: CYBER SECURITY
Cyber Security
Name of the Student:
Name of the University:
Author note:

1
CYBER SECURITY
Executive Summary
This report deals with the role cybersecurity plays in order to protect the vital information
from potential security threats, and all the steps are mentioned which are undertaken for
information security management of the organisation. It is required to build a strong security
team for the organisation, which play a vital role in administrating the confidentiality of data
from accidental or deliberate threats. It helps to avoid potential security risks, and it is
essential to design a safety policy for the organisation along with the necessary
countermeasure, which identifies and manage the threats. Also, provide the implantation of
an awareness program and the comprehensive data confidentiality training for all the staffs of
the organisation.

2
CYBER SECURITY
Table of Contents
Introduction................................................................................................................................4
The organizational security plan................................................................................................5
Security Countermeasures..........................................................................................................6
Physical countermeasures......................................................................................................7
Electronic countermeasures...................................................................................................7
The security-awareness training program in an organisation....................................................9
The organizational security policy...........................................................................................10
Conclusion................................................................................................................................12
References................................................................................................................................13

3
CYBER SECURITY
Introduction
Information is the most sensitive organisational assets. In an organisation, information
is the most valuable thing, and it should be protected appropriately. Security ensures the
confidentiality and integrity of data security for an organisation. Data security is necessary so
that it can protect the information form deliberate attacks or prevent the information from
data theft. The internet is an open-source platform which enables businesses and organisation
to adopt the new technologies quickly. An organisation stores various types of data. This can
lead to a loss for the organisation . This allows users to access the information, share that
information through the use of the internet. This can prove a significant weakness in the
scenario of information security. Since the internet is simultaneously accessed by various
people, therefore, there is a chance of numerous security attacks from worms, viruses and
malicious software. Also, there is a different cyber attacker who keeps their eye on the
sensitive data and the financial information to steal the data. Today most of the organisation
faces various problem regarding data security, and they lost their crucial information,
financial information (Hettiarachchi & Wickramasinghe, 2016). Therefore, it is required to
build a strong security team to monitor the data security of the organisation. However,
security awareness regarding the data has been effective increases. Most the organisations are
developing security guidelines and a robust training program to protect the information. This
case study deals with the possible threat that corrupt or destroy the data, the functionality of
the security management team who keeps monitoring in order to prevent accidental threats.
This issues required to be urgently removed and for this, it is necessary to implement a
technical system which is reasonably competent and efficient in maintaining document and
database management security.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Plan and Training Program
|13
|3113
|315

Cyber Security Awareness Training for Widget Inc Dot Com
|11
|855
|364

Cyber Security: Threats, Plan, Countermeasures, Training, and Policy
|13
|2868
|361

Internet Security Report | Cyber Security
|12
|2590
|11

Network Security Analysis: Cyber Security
|10
|1925
|30

Cyber Security: Threats, Challenges, and Mitigation Strategies
|12
|3967
|307