logo

Cyber Security Assignment (Solved)

   

Added on  2020-05-16

10 Pages4262 Words85 Views
 | 
 | 
 | 
Running head: INFORMATION SECURITY TECHNOLOGIES
Information Security Technologies
Name of the Student
Name of the University
Author’s Note
Cyber Security Assignment (Solved)_1

1
INFORMATION SECURITY TECHNOLOGIES
Executive Summary
The paper reflects on the organization “Gigantic Corporation” that faces number of
Cybersecurity related issues. The main aim of the organization is to provide proper
understanding as well as knowledge about Cybersecurity risks to the stakeholders as well as to
the technologists of the organization so that they can be able to facilitate effective decision
making system within the organization. It is identified in this report that the organization
“Gigantic Corporation” faces number of threats as well as vulnerabilities that are mainly
associated with Cybersecurity. The threats as well as issues that the organization mainly faces
due to Cybersecurity includes cyber attack, hacking, Dos attack and more. It is identified that
the report illustrates various key agents due to which the Cybersecurity issues occur within the
organization. The paper also illustrates proper methods as well as steps that are helpful in
resolving the issues as well as challenges that the company generally faces due to the issue of
Cybersecurity. The steps that are mainly highlighted in this report in order to resolve the issues
as well as challenges of Cybersecurity generally includes adaptation of proper security methods,
use of firewall, development as well as implementation of proper risk reduction strategies as well
as use of proper security controls. It is analyzed from the report that all this methods or steps are
quite effective in resolving the challenges that the company generally faces due to Cybersecurity
threats. In addition to this, the paper undertakes a literature review by reviewing various articles
as well as journals in order to analyze the methods that needs to be employed for the security of
the company’s website from various Cybersecurity threats. It is identified that website generally
faces number of threats as well as challenges that are must be resolved by adopting proper
strategies or methods. The methods that are generally employed by the company in order to
resolve the issues that are related with the security of website includes keeping proper updates
about Cybersecurity issues, use of stronger passwords, installation of security applications,
utilization of robots txt file and an encrypted SSL protocol as well as use proper web application
firewall. The methods or steps that are employed are helpful in resolving the Cybersecurity
issues that the website is facing. In addition to this, it can be analyzed that the proper analysis of
Cybersecurity risks, its key agents as well as steps of mitigating issues are quite helpful in
providing proper understanding as well as information to both the technologist as well as
stakeholders of the company so that they can be able to provide effective decision making
system to the organization.
Cyber Security Assignment (Solved)_2

2
INFORMATION SECURITY TECHNOLOGIES
Table of Contents
1. Risk assessment based on threat, vulnerabilities and consequences with mitigation Strategies. 3
1.1 Risk assessment based on threat, vulnerabilities and consequences.....................................3
1.2. Risk Mitigation and its Impact.............................................................................................5
2. Literature Review........................................................................................................................6
References........................................................................................................................................8
Cyber Security Assignment (Solved)_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Gigantic Corporation: Risk Assessment - Internet of Things (IoT)
|19
|6971
|265

IT Risk Assessment of the Internet of Things (IoT) for Gigantic Corporation
|22
|7533
|450

Network Security Analysis: Cyber Security
|10
|1925
|30

Artificial Intelligence - Assignment Sample
|7
|1530
|114

Cybersecurity Risk Assessment for Gigantic Corporation: Threats, Vulnerabilities, and Mitigation Measures
|22
|6941
|382

IT Risk Management for Internet of Things (IoT) Applications in Gigantic Corporation
|20
|6776
|405