logo

Research in Advanced E-Security

   

Added on  2023-06-07

7 Pages1628 Words206 Views
Running head: RESEARCH IN ADVANCED E-SECURITY
Research in Advanced E-Security
Name of the University
Name of the Student
Author Note

1RESEARCH IN ADVANCED E-SECURITY
Table of Contents
Introduction................................................................................................................................2
Importance of cyber security..................................................................................................2
Purpose of the Research.........................................................................................................2
Methods used for the research................................................................................................3
Challenges..............................................................................................................................4
Conclusion..................................................................................................................................4
References..................................................................................................................................6

2RESEARCH IN ADVANCED E-SECURITY
Introduction
The research topic that has been chosen for the research is taken as cyber security.
The body of practices, processes and technologies that are used for the design are made to
protect the data, programs, devices and networks from unauthorized access, damages or
attacks. The security consists of both the physical security and the cyber security, which are
used by multinational companies to protect their computerized systems and data centres from
unauthorized access (Knapp & Samani, 2013).
In the following report, a detailed research methodology would be put forward in
order to find the feasibility behind the need of mitigating the cyber-attacks. The consequences
and effects of the cyber-attacks have been mentioned and assessed in the discussion section
of the report. Thus the report would enlighten what impact the cyber-attacks has on the
organizations and the institutions, and on which basis researches should be conducted on
them with a proper methodology to help eradicating the problems further.
Importance of cyber security
Cyber security is essential for modern society as huge amount of sensitive and critical
data that are present in several connecting devices as well as computers needs to be protected
from malicious users and the data are spread across medical, corporate, financial, and military
and government institutions (Collins, 2016). With time, the complexity of the cyber-attacks
increases, which makes the institutions, bolster their security responses. This is done by
creating new methods for checking the security of the infrastructure and properly checking
the financial records that will maintain the integrity of their business. The information that is
generated every day with the utilization of networks contains a huge load of data that are
spread over a number of devices as well as networking systems. These networking systems
are present to properly check frameworks and data security for the protection of the security
infrastructure. In 2013, Intelligence Officials from the country forewarned that there are huge
chances of digital spying and digital attacks forming a huge threat to the national security
even more than terrorist attacks (Taylor, Fritsch & Liederbach, 2014).
Purpose of the Research
Digital attacks can change and result in a lot of budgetary and reputational harm to
even the strongest institutions. In the event that a user endures a digital attack, one can lose
business, reputation and assets. There are even huge chances of confronting regulatory
litigations and fines including the expenses of remediation. An effective attack can make real

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
HI6008 - Business Research on Cyber Security
|19
|3876
|330

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Cyber security Assignment PDF
|9
|1468
|145

Assignment on Cyber Secuirty
|5
|883
|29

Assignment on Cyber Security pdf
|10
|1812
|84

Network Security Management
|12
|3039
|83