Cyber Security Report: IBM Security Services and Cyber Threats
VerifiedAdded on 2021/12/03
|9
|1807
|63
Report
AI Summary
This report delves into the crucial realm of cyber security, emphasizing the services provided by IBM to safeguard organizations in the digital age. It highlights the importance of cyber security in the current technological landscape, particularly for businesses reliant on information technology. The report examines various aspects of IBM's security offerings, including data privacy, network security, website security, email security, and mobile application security. It discusses the application of Artificial Intelligence and Machine Learning in cyber security, IBM's role in securing financial data, fraud analysis, and payroll system security. The report also touches upon the importance of incident response, policy development, and the use of tools like IBM Watson for regulatory compliance and risk analysis. It emphasizes the need for comprehensive security measures to protect against data breaches, ransomware attacks, and other cyber threats. Furthermore, it covers network, website, email, and mobile device security, along with employee data protection. The report concludes with a summary of IBM's cyber security services and the importance of government regulations and ethical frameworks in maintaining a secure digital environment.

Ruining Head: CYBER SECURITY 0 | P a g e
12/10/2018
Report | Student name
Cyber Security
12/10/2018
Report | Student name
Cyber Security
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cyber Security 1 | P a g e
Table of Contents
Introduction......................................................................................................................................2
Cyber security advantages...............................................................................................................2
Conclusion.......................................................................................................................................4
References........................................................................................................................................6
Table of Contents
Introduction......................................................................................................................................2
Cyber security advantages...............................................................................................................2
Conclusion.......................................................................................................................................4
References........................................................................................................................................6

Cyber Security 2 | P a g e
Introduction
Cyber security is must for maximum organization in this technological era. IBM security
is part of IBM for providing security services. IBM is using Cognitive-computing approaches for
cyber security. Cyber security is the most popular thing in the world in present era. It is highly
required for the organization, which are using information technology in their operations and
services. This report will discuss about the different things of the cyber security provided by
IBM security, such as privacy, and data security. It is also include network, website, Email, and
mobile applications security in this report. In next parts of this report, Cyber Security Glossary,
Cyber Security Links will mention in the later section of this report.
Cyber security benefits
Artificial Intelligence and Machine Learning are the best approaches for research and
development I the field of cyber security. IBM is working for securing accounting data of an
organization, as financial data are so confidential for an organization. IBM also provides fraud
analysis from their services. It detects fraud and assure about it from the help of tools. IBM is
also providing payroll system security for different organization. IBM security is a small
company of IBM for providing security from cyber-attacks to an organization. IBM works for
many organizations for their security from cyber-attacks, such as Boeing Airplane Company,
General Electric, and Gulf Oil Corporation. There are more than 600 hundreds clients for cyber
security. IBM works for different sectors for securing their research, products, and services, such
as business, scientific and technical organizations.
General electric is tie-up with the IBM for finding solutions of cyber-attacks. IBM is
providing Procurement for the buying contracts, inventory controls, and security for supply chain
insights. IBM Watson is use for the regulatory compliance. It is a best solution for the risk
analysis. Privacy of data is a main concern in the organization. Many organizations are having so
many Data of their customers as well as employees. So it should secure and safe at their end,
Because of cyber-attacks that information may be leak from their server, such as data breaches.
There are so many ways to secure data from these types of attacks, such as Cyber security.
Frauds in the organization are happened because of outside person hack their systems and made
Introduction
Cyber security is must for maximum organization in this technological era. IBM security
is part of IBM for providing security services. IBM is using Cognitive-computing approaches for
cyber security. Cyber security is the most popular thing in the world in present era. It is highly
required for the organization, which are using information technology in their operations and
services. This report will discuss about the different things of the cyber security provided by
IBM security, such as privacy, and data security. It is also include network, website, Email, and
mobile applications security in this report. In next parts of this report, Cyber Security Glossary,
Cyber Security Links will mention in the later section of this report.
Cyber security benefits
Artificial Intelligence and Machine Learning are the best approaches for research and
development I the field of cyber security. IBM is working for securing accounting data of an
organization, as financial data are so confidential for an organization. IBM also provides fraud
analysis from their services. It detects fraud and assure about it from the help of tools. IBM is
also providing payroll system security for different organization. IBM security is a small
company of IBM for providing security from cyber-attacks to an organization. IBM works for
many organizations for their security from cyber-attacks, such as Boeing Airplane Company,
General Electric, and Gulf Oil Corporation. There are more than 600 hundreds clients for cyber
security. IBM works for different sectors for securing their research, products, and services, such
as business, scientific and technical organizations.
General electric is tie-up with the IBM for finding solutions of cyber-attacks. IBM is
providing Procurement for the buying contracts, inventory controls, and security for supply chain
insights. IBM Watson is use for the regulatory compliance. It is a best solution for the risk
analysis. Privacy of data is a main concern in the organization. Many organizations are having so
many Data of their customers as well as employees. So it should secure and safe at their end,
Because of cyber-attacks that information may be leak from their server, such as data breaches.
There are so many ways to secure data from these types of attacks, such as Cyber security.
Frauds in the organization are happened because of outside person hack their systems and made
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Cyber Security 3 | P a g e
changes in their data. There are so many ransom attack form the online networks, such as Petya
ransomware (Andrijcic & Horowitz, 2016).
Source: (BWISE, 2018)
General electric is tie-up with the IBM for finding solutions of cyber-attacks. IBM is
providing Procurement for the buying contracts, inventory controls, and security for supply chain
insights. IBM Watson is use for the regulatory compliance. It is a best solution for the risk
analysis. Privacy of data is a main concern in the organization. Many organizations are having so
many Data of their customers as well as employees. So it should secure and safe at their end,
Because of cyber-attacks that information may be leak from their server, such as data breaches.
There are so many ways to secure data from these types of attacks, such as Cyber security.
Frauds in the organization are happened because of outside person hack their systems and made
changes in their data. There are so many ransom attack form the online networks, such as Petya
ransomware (Andrijcic & Horowitz, 2016).
changes in their data. There are so many ransom attack form the online networks, such as Petya
ransomware (Andrijcic & Horowitz, 2016).
Source: (BWISE, 2018)
General electric is tie-up with the IBM for finding solutions of cyber-attacks. IBM is
providing Procurement for the buying contracts, inventory controls, and security for supply chain
insights. IBM Watson is use for the regulatory compliance. It is a best solution for the risk
analysis. Privacy of data is a main concern in the organization. Many organizations are having so
many Data of their customers as well as employees. So it should secure and safe at their end,
Because of cyber-attacks that information may be leak from their server, such as data breaches.
There are so many ways to secure data from these types of attacks, such as Cyber security.
Frauds in the organization are happened because of outside person hack their systems and made
changes in their data. There are so many ransom attack form the online networks, such as Petya
ransomware (Andrijcic & Horowitz, 2016).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cyber Security 4 | P a g e
IBM is using their supercomputer ‘Watson’ for providing security essentials to their
clients. Network Security is also necessary for an organization, as every person have
authentication to entry in the system, but there are few loopholes in the systems, which are
helping attackers. Website Security is also must in the current environment of business
processes. These are some tools, which are helping for website security, such as LoadComplete.
Emails are the best way to communication from different people within the organization as well
as outside of organization (Arlitsch & Edelman, 2014).
IBM is providing security for the different devices. Mobile Devices are mostly uses for
the accessing systems. So they are also requires security. There are so many personal data on the
mobile, so they also required security from attackers. Employees are assets of an organization.
There person data and different activities in the organization are also requires security form the
cyber security (Barkly, 2018). Cyber security is a most common thing in present situation. There
are many examples in the world in which many loses happened due to less security, cyber-
attacks was happened. There are huge loss of money and many things for organization because
of cyber-attacks (Bhagat, 2012). Operational Security is also a part of organization security.
Every operation of an organization is based on the strategies of an organization. Therefore, it is
must to secure operations of an organization. There are lot of options for securing innovations of
an organization, such as Patents, copy-writes, and trade- secrets (Cherdantseva, Burnap, Blyth,
Eden, & Jones, 2016).
In present era, the online banking and cards are uses for all the payments. Credit cards
and debit cards are mostly uses by the person for the fund transfer. Therefore, it is also a
necessary thing to secure information about the payment cards (Gordon & Loeb, 2006). IBM is
providing quick response on the different cyber security incidents. Incident Response and
Reporting is also required to found out the attackers. Policy Development is a procedure to
prevent from those cyber-attacks. Although, so many rules and regulations are created for the
avoidance and prevention of cyber-attacks, still it is going on in a huge quality. Every person
should follow ethical and legal framework (Lipton, 2005). Cyber Security Links are available for
response about the incident, such as www.us-cert.gov. There so many organizations are
providing cyber security, but government of US is also taking actions on the incidents quickly
(Von Solms & Van Niekerk, 2013).
IBM is using their supercomputer ‘Watson’ for providing security essentials to their
clients. Network Security is also necessary for an organization, as every person have
authentication to entry in the system, but there are few loopholes in the systems, which are
helping attackers. Website Security is also must in the current environment of business
processes. These are some tools, which are helping for website security, such as LoadComplete.
Emails are the best way to communication from different people within the organization as well
as outside of organization (Arlitsch & Edelman, 2014).
IBM is providing security for the different devices. Mobile Devices are mostly uses for
the accessing systems. So they are also requires security. There are so many personal data on the
mobile, so they also required security from attackers. Employees are assets of an organization.
There person data and different activities in the organization are also requires security form the
cyber security (Barkly, 2018). Cyber security is a most common thing in present situation. There
are many examples in the world in which many loses happened due to less security, cyber-
attacks was happened. There are huge loss of money and many things for organization because
of cyber-attacks (Bhagat, 2012). Operational Security is also a part of organization security.
Every operation of an organization is based on the strategies of an organization. Therefore, it is
must to secure operations of an organization. There are lot of options for securing innovations of
an organization, such as Patents, copy-writes, and trade- secrets (Cherdantseva, Burnap, Blyth,
Eden, & Jones, 2016).
In present era, the online banking and cards are uses for all the payments. Credit cards
and debit cards are mostly uses by the person for the fund transfer. Therefore, it is also a
necessary thing to secure information about the payment cards (Gordon & Loeb, 2006). IBM is
providing quick response on the different cyber security incidents. Incident Response and
Reporting is also required to found out the attackers. Policy Development is a procedure to
prevent from those cyber-attacks. Although, so many rules and regulations are created for the
avoidance and prevention of cyber-attacks, still it is going on in a huge quality. Every person
should follow ethical and legal framework (Lipton, 2005). Cyber Security Links are available for
response about the incident, such as www.us-cert.gov. There so many organizations are
providing cyber security, but government of US is also taking actions on the incidents quickly
(Von Solms & Van Niekerk, 2013).

Cyber Security 5 | P a g e
Cyber security Engineer template
S. N. Activity IBM Reponses
1. Privacy and Data Security IBM provides Cloud object data storage for more
secure and privacy of the users data.
2. Scams IBM is having specific policies for the frauds.
3. Network Security IBM is using safe and secure network for their
data transfer and different activities.
4. Website Security IBM is having different facilities for the website
security, such as URL filtering for web.
5. Email IBM is having antivirus for email scanning. It
also have image control, content control, and
antispam for email protection
6. Mobile Devices IBM is using AI for endpoint and mobile security
7. Employees IBM is having employee’s data security system
for privacy of employee’s data.
8. Facility Security IBM is providing total security solution for
different organization
9. Operational Security IBM is having UEM for operational security
10. Payment Cards IBM is having SWIFT security system for secure
card payments
11. Incident Response and Reporting IBM is having Orchestrate for response of cyber
security. There is quick response, reporting of
such types on incidents by online, or phone.
There is a log of all the incidents, so those
incidents are not happen in the future.
12. Policy Development, Management IBM is having strict policies for the cyber
security systems.
13. Cyber Security Glossary IBM is having their personal glossary for the bad
stuff in the field of cyber security
14. Cyber Security Links These are the following links for cyber security:
https://www.ibm.com/security/products/
Cyber security Engineer template
S. N. Activity IBM Reponses
1. Privacy and Data Security IBM provides Cloud object data storage for more
secure and privacy of the users data.
2. Scams IBM is having specific policies for the frauds.
3. Network Security IBM is using safe and secure network for their
data transfer and different activities.
4. Website Security IBM is having different facilities for the website
security, such as URL filtering for web.
5. Email IBM is having antivirus for email scanning. It
also have image control, content control, and
antispam for email protection
6. Mobile Devices IBM is using AI for endpoint and mobile security
7. Employees IBM is having employee’s data security system
for privacy of employee’s data.
8. Facility Security IBM is providing total security solution for
different organization
9. Operational Security IBM is having UEM for operational security
10. Payment Cards IBM is having SWIFT security system for secure
card payments
11. Incident Response and Reporting IBM is having Orchestrate for response of cyber
security. There is quick response, reporting of
such types on incidents by online, or phone.
There is a log of all the incidents, so those
incidents are not happen in the future.
12. Policy Development, Management IBM is having strict policies for the cyber
security systems.
13. Cyber Security Glossary IBM is having their personal glossary for the bad
stuff in the field of cyber security
14. Cyber Security Links These are the following links for cyber security:
https://www.ibm.com/security/products/
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Cyber Security 6 | P a g e
https://www.ibm.com/security
https://www.ibm.com/security/services/managed-
security-services
Conclusion
It is concluded from the last parts of this report that, cyber security is must for all the
organizations, which are using information technologies for their operations and services. IBM is
providing complete solutions for an enterprise department of an organization. It is also
concluded that privacy of data is compulsory for all the organization as well as every employees
of an organization.
Finally, it is concluded that government is helping for these things and there are few
policies added in the laws for securing systems and infrastructures of an organization. IBM
follows all the rule and regulations according to guidelines of government for providing security
to a Client.
https://www.ibm.com/security
https://www.ibm.com/security/services/managed-
security-services
Conclusion
It is concluded from the last parts of this report that, cyber security is must for all the
organizations, which are using information technologies for their operations and services. IBM is
providing complete solutions for an enterprise department of an organization. It is also
concluded that privacy of data is compulsory for all the organization as well as every employees
of an organization.
Finally, it is concluded that government is helping for these things and there are few
policies added in the laws for securing systems and infrastructures of an organization. IBM
follows all the rule and regulations according to guidelines of government for providing security
to a Client.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cyber Security 7 | P a g e
References
Andrijcic, E., & Horowitz, B. (2016). A Macro‐Economic Framework for Evaluation of Cyber
Security Risks Related to Protection of Intellectual Property. Risk analysis, 26(4), 907-
923.
Arlitsch, K., & Edelman, A. (2014). Staying safe: Cyber security for people and organizations.
Journal of Library Administration, 54(1), 46-56. Retrieved from
https://www.tandfonline.com/doi/abs/10.1080/01930826.2014.893116?
journalCode=wjla20
Barkly. (2018, May 6). 5 Cybersecurity Statistics Every Small Business Should Know in 2018.
Retrieved from Barkly: https://blog.barkly.com/small-business-cybersecurity-statistics-
2018
Bhagat, B. (2012). Patent No. 13/016,999. U. S.
BWISE. (2018, December 10). nist cyber security framework . Retrieved from bwise:
https://www.bwise.com/solutions/frameworks/nist-framework
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., & Jones, K. (2016). A review of cyber
security risk assessment methods for SCADA systems. Computers & security, 56, 1-27.
Gordon, L. A., & Loeb, M. (2006). Managing cybersecurity resources: a cost-benefit analysis
(Vol. 1). New York: McGraw-Hill.
Lipton, J. D. (2005). Beyond Cybersquatting: Taking Domain Name Disputes Past Trademark
Policy. Wake Forest L. Rev., 40(1), 1361.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security.
computers & security, 38, 97-102.
References
Andrijcic, E., & Horowitz, B. (2016). A Macro‐Economic Framework for Evaluation of Cyber
Security Risks Related to Protection of Intellectual Property. Risk analysis, 26(4), 907-
923.
Arlitsch, K., & Edelman, A. (2014). Staying safe: Cyber security for people and organizations.
Journal of Library Administration, 54(1), 46-56. Retrieved from
https://www.tandfonline.com/doi/abs/10.1080/01930826.2014.893116?
journalCode=wjla20
Barkly. (2018, May 6). 5 Cybersecurity Statistics Every Small Business Should Know in 2018.
Retrieved from Barkly: https://blog.barkly.com/small-business-cybersecurity-statistics-
2018
Bhagat, B. (2012). Patent No. 13/016,999. U. S.
BWISE. (2018, December 10). nist cyber security framework . Retrieved from bwise:
https://www.bwise.com/solutions/frameworks/nist-framework
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., & Jones, K. (2016). A review of cyber
security risk assessment methods for SCADA systems. Computers & security, 56, 1-27.
Gordon, L. A., & Loeb, M. (2006). Managing cybersecurity resources: a cost-benefit analysis
(Vol. 1). New York: McGraw-Hill.
Lipton, J. D. (2005). Beyond Cybersquatting: Taking Domain Name Disputes Past Trademark
Policy. Wake Forest L. Rev., 40(1), 1361.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security.
computers & security, 38, 97-102.

Cyber Security 8 | P a g e
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





