Cyber Security Report: TITP 105, Group Report on Cyber Security Issues

Verified

Added on  2022/08/19

|4
|402
|16
Report
AI Summary
This report, created for the IT Professional course, provides a comprehensive overview of cyber security. It begins by outlining the historical evolution of cyber security, detailing the progression from basic virus protection to advanced network security and current complex cyber threats. The report also emphasizes the importance of cyber security in various sectors, especially within the IT industry, and stresses the need for dedicated departments to handle cyber security issues. Furthermore, the report discusses the importance of protecting sensitive data and the necessity for organizations to invest in robust cyber security infrastructure. It also includes references to support the arguments made in the report. The report addresses the ethical and legal impacts of IT professionals' work, assesses the relationship between IT professionals and ethics, and provides recommendations to address the identified problems.
Document Page
Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the university
Author note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBER SECURITY
Background
Industrial revolutions have been considered as the key milestones that have had a
significant effect on the course of human history. The industry of cyber security was never as
sophisticated as it has become in recent times. With the complexities in the cyber landscape,
the industry has become more complicated. The three different phases of cyber security are as
follows:
1. Virus protection- This was the initial step in cyber security which mainly focused on
protection of individual computer systems from the VIRUS attacks (Ben-Asher and Gonzalez
2015). Anti-VIRUS software were developed which could be installed in the computer
systems to protect them from the virus attacks.
2. IT and Network Security- Second phase of this evolution was IT and Network Security.
The phase came into existence when people realized that when individual computers were
being attacked, it affected the whole network to which they were connected (Buczak and
Guven 2015). Thus firewalls and other network security software emerged.
3. Cyber Security- In this particular phase threats are more complicated and necessities have
increased. Cyber security along with information assistance forms a comprehensive system.
Conclusion
Cyber security has a lot of importance in every sector and in IT industry as well. It
includes many spheres such as protection of sensitive information, personal information and
many more. In every IT industry there needs to be a specific department to deal with the
cyber security related issues. The organizations should understand the importance of sensitive
data and its protection. They should understand that protecting their data is important in this
Document Page
2CYBER SECURITY
world of data breaches. Data stolen can be misused in many ways and keeping this in mind
organizations should invest a good amount on their cyber security infrastructure.
Document Page
3CYBER SECURITY
References
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber security knowledge on attack
detection. Computers in Human Behavior, 48, pp.51-61.
Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2),
pp.1153-1176.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]