logo

Managing Cyber Security Challenges

   

Added on  2020-02-24

12 Pages2039 Words43 Views
Cyber Security Report 1
MANAGING CYBER SECURITY CHALLENGES
By: Student name:
Subject code:
Tutor:
School:
City:
Date:

Cyber Security Report 2
Executive Summary
Technology advances are rapidly developing, and so are the prospects and challenges that
come along with this developments. The society today is filled with interconnected computer
networks with the growth of the Internet including techniques such as the Internet of Things
(IoT) and big data automation. Because of the challenges brought about by technology
advances, it is important to ensure we defend and implement measures to stop them through
the practice of cyber security.
This report states the problem brought about by cyber-attacks by discussing cybercrime using
four steps of thinking. It also discusses cyber security an outlines the benefits of cyber
security to business organizations. In addition, the paper expounds on factors that influence
cyber security policies and procedures and provides solutions that can be implemented in
business organizations to enhance cyber security and minimize the impact of cybercrime and
finally, a conclusion on enhancing cyber security.

Cyber Security Report 3
Table of Contents
Introduction................................................................................................................................4
Problem statement......................................................................................................................4
Justification................................................................................................................................4
Cybercrime: four levels of thinking..........................................................................................5
Recent cybercrime trends and events.....................................................................................5
Underlying cybercrime structures..........................................................................................6
Mental mode...........................................................................................................................7
Cyber security............................................................................................................................7
Benefits of embracing cyber security.....................................................................................7
Factors that influence cyber security......................................................................................8
Impacts of ineffective cyber security procedures...................................................................9
Solutions to traditional cyber security measures....................................................................9
Conclusion................................................................................................................................10
References................................................................................................................................11

Cyber Security Report 4
Introduction
Technological advances have, and continues to positively affect our societies and everyday
lives. However, they also have led to cybercrime, which comprises criminal actions done on
the World Wide Web. Cybercrime has made a lot of effects in our communities including
our individual lives, businesses, and governmental systems. Progressively our lives are
strongly tied to the Internet through the growing web technology. Our personal details
comprising monetary, medical, spending activities, photographs, and emails are stored on the
web. We have adopted cloud computing which involves storing sensitive data and
information on the Internet. Yet we can’t really tell whether such technologies are completely
safe. Emerging technologies are constantly developing as the world remains and becomes
more and more coupled every single day, which leads to increasing complexity with
hardware and software systems. As a result, this has presented more chances for hackers to
exploit new vulnerabilities. Companies are nowadays forced to adopt cyber security
procedures, and continue to spend a lot resources in order to defend themselves against
cyber-attacks. This report investigates cyber security by understanding current existing cyber
security procedures, factors that influence it, effects of not implementing it and initiatives that
can be taken to minimize and manage cyber-security risks more effectively.
Problem statement
The rate at which cyber-crime is occurring keeps increasing. Cyber security policies and
procedures are also increasingly being set up. However, even with cyber security processes in
place, cyber-attacks are on the rise. The problem this report solves are the challenges in cyber
security procedures and the reasons they are yet to yield the anticipated results, as well as
propose innovative processes of handling cyber security threats.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: Importance, Vulnerabilities, Threats and Protection
|13
|3131
|388

Project Dissertation | Next-Generation Cybertrap
|57
|12770
|276

Project Dissertation: Next Generation Cybertrap
|56
|12775
|162

Challenges in Cyber Security for Business
|12
|3469
|36

HI6008 - Business Research on Cyber Security
|19
|3876
|330

Digital Forensics Challenges Assignment
|21
|6018
|412