Cyber Security Report: Threats, Solutions, and Implementations

Verified

Added on  2021/04/17

|5
|883
|29
Report
AI Summary
This report provides a comprehensive literature review of cyber security, examining the evolving landscape of cyber threats and the corresponding advancements in security measures. It begins by highlighting the increasing need for cyber security due to the growth of digital communication and the rise of cybercrime. The report delves into specific areas, including the effectiveness of one-time passwords, the importance of firewall installation, and the detection of malicious attacks within networking systems. It emphasizes the essentiality of cyber security in today's interconnected world, with the literature review focusing on the implementation of security measures and the advantages they provide. The report concludes by acknowledging the continuous emergence of new threats and the ongoing need for robust cyber security tools and methodologies to protect against attacks from viruses, hackers, and other malicious actors.
Document Page
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
CYBER SECURITY
Abstract
The growth of cyber security is in a stage of growth. With the increase in usage of the
digital communication the threats possessed because of the attacks caused on cyber criminals is
also been increasing as the data available in the digital platform increases which helps in
gathering information of the organization and attacking the organization gets easier when the
data is available. The cyber attackers pirates the data and uses the organization’s information
against them and earns huge amount of revenue on returning back the incorrupt data of the
organization. To stay protected from these kinds of attacks cyber security tools are being used.
These tools keep the organization free from unauthorized access of imposters. Cyber security as
a field of technology is facing a lot of changes as the technology is emerging at a very fast rate.
The report discusses about the reasons that enhances the needs of Cyber Security. This report
will provide the literature review of the topic Cyber Security. This report will give a literature
review on the topic of one time password process to keep the computing system secured from the
crimes. This discourse will also give a literature review on the malicious attack detection on the
networking system. This report will further provide a literature review on the importance of
firewall installation in the networking systems. This report will also discuss about the essentiality
of the cyber security in today’s networking system with the help of literature review. This report
will provide a literature review on the field of implementations of cyber securities in the
networking systems. The literature review of the advantages of cyber security is also provided it
the discourse. The report concludes by acknowledging the constant emergence and the need of
cyber security against cyber terrorism. The cyber security tools also helps in blocking harmful
websites that are harmful in nature and prevents access of the ransomare to the computing
system.
Document Page
3
CYBER SECURITY
Summary
Cyber Security is the technology that has gained global acceptance in the last decade.
This technology has been ever evolving and the emergence cyber crime has force caused the
emergence the cyber security. One time password is an efficientway of handling the cyber crime
with proper efficiency. Installing firewall is also another way of protecting the computing device
from the cyber attacks; Installation of firewall protects the computing system as well as the
networking system from unauthorized access of the imposters that possess threat of cyber attack
on the network system. The cyber security technology finds its usage in tracking against the
viruses that cause harm to the computing devices. Virus has the potential to harm the networking
system as well. The cyber security process also protects the computing system from thehackers
that intend on get access to the private set of data without the concern of the genuine data owner.
The data that the hackers gain access to moulds them and uses the same data against the genuine
data owners to gain a huge amount of profit from the genuine customers by accessing the data of
the client. A Cyber security process also keeps the computing device safe from the Trojan
viruses.
Conclusion
The literature review concludes by stating that the growth of cyber security is in a state of
growth as with increase in the cyber space cyber warfare has come along in disguise. Hence the
security relate to cyber space has gained global acceptance leading to the increase in cyber
security. To stay protected from the cyber attacks namely the viruses, the hackers and the Trojan
virus the cyber security tools and the methodology is being used. The cyber attackers intend on
getting the access of the data for which he is not permitted. After gaining the access to the data
the cyber criminals modulate the data to harm the genuine client.
Document Page
4
CYBER SECURITY
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
CYBER SECURITY
Reference
Dark, M., & Mirkovic, J. (2015). Evaluation theory and practice applied to cybersecurity
education. IEEE Security & Privacy, 13(2), 75-80.
Mármol, F. G., Pérez, M. G., & Pérez, G. M. (2016, July). I don’t trust ICT: Research challenges
in cyber security. In IFIP International Conference on Trust Management (pp. 129-136).
Springer, Cham.
Shoemaker, D., Davidson, D., & Conklin, A. (2017). Toward a Discipline of Cyber Security:
Some Parallels with the Development of Software Engineering
Education. EDPACS, 56(5-6), 12-20.
Siegel, E., Rota, G. C., Poincare, J. H., & Young, F. (2018). GOLDBACH-CONJECTURE-(IN
NUMBER (#)-THEORY) IS ANTI-COOPER-PAIRING (IN NON-SC) GapFUL
Fermion/PAIR-BREAKING SC-TO-NORMAL PHASE-TRANSITION CRITICAL-
PHENOMENON: Primes N-BEC-Factorization/DEncryption-Cyber-THREATS
(IBM/BlockChain) Are MANDATORY!!!. Bulletin of the American Physical Society.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]