Comprehensive Analysis of Information and Cyber Security Report

Verified

Added on  2022/09/05

|13
|622
|27
Report
AI Summary
This report provides an analysis of information security, cyber security, and computer security. It defines each term and highlights the differences between them. The report further discusses the importance of mobile security, and the strategies to improve it. It also covers the concepts of cyberwarfare and cyberterrorism, offering real-world examples of their implications. References are provided from various research papers and journals to support the information. The report aims to provide a comprehensive understanding of the current security landscape and the measures required to safeguard data and systems.
Document Page
Analysis of information
security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Information security
It refers to procedures and policies for
ensuring security and privacy of
information from illegal access.
Document Page
Information security example
When authentication is applied for
system that stores data, it does not
allows anyone to access data if they do
not have required permission to access
data as well.
Document Page
Cyber security
It refers to process to secure network,
hardware, electronic system and data
from illegal access or techniques that
exploits security of a system as well.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber security
Protecting data against
ransomeware is an example of
cyber-security.
Document Page
Computer security
Computer security refers to process of
enhancing security of computer
systems and computer networks from
security issues related to hardware,
software along with electronic data
which might be accessed illegally by
hackers as well.
Document Page
Computer security example
Keeping backup of data is an
example of computer security as it
provides access to data when
storage device gets corrupted as
well.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Differences between information
security, cyber security and
computer security
Information security is about securing
information while considering confidentiality,
integrity and availability. cyber security is
about protecting things from ICT related issues
and computer security refers to security of
information stored in computer systems.
Document Page
Analysis of the mobile security plan
Review of policy for example identify if any
modification in policy regarding data access
is required or not
analysis of existing security strategies for
example identify if access control is effective
or not and if any modification is required
Document Page
Analysis of the mobile security plan
Integrating new security solutions with existing
security strategies for example if any security
software is integrated with existing IT infrastructure
then identify if it is properly working or not
Increase employee awareness for example provide
training to employees for implementing security
strategies
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyberwarfare and cyberterrorism
Cyberwarfare refers to attempt of a nation-state to hack computers
or networks of another nation for creating damage or disruption as
well.
For example, causing disruption to intelligent service of an country
by hacking their intelligent systems.
Cyberterrorism refers to attempt of a group of hackers to do
something to create terror among people.
For example, stealing credit cards of many consumers to create
terror among bank and it consumers as well.
Document Page
References
Awan, J. H., Memon, S., Khan, R. A., Noonari, A. Q., Hussain, Z., & Usman, M. (2017). Security
strategies to overcome cyber measures, factors and barriers. Eng. Sci. Technol. Int. Res. J, 1(1), 51-58.
Friis, K., & Ringsmose, J. (Eds.). (2016). Conflict in Cyber Space: Theoretical, Strategic and Legal
Pespectives. Routledge.
Galinec, D., & Steingartner, W. (2017, November). Combining cybersecurity and cyber defense to
achieve cyber resilience. In 2017 IEEE 14th International Scientific Conference on Informatics (pp. 87-
93). IEEE.
Muronga, K., Herselman, M., Botha, A., & Da Veiga, A. (2019, September). An analysis of assessment
approaches and maturity scales used for evaluation of information security and cybersecurity user
awareness and training programs: A scoping review. In 2019 Conference on Next Generation
Computing Applications (NextComp) (pp. 1-6). IEEE.
Safa, N. S., & Von Solms, R. (2016). An information security knowledge sharing model in
organizations. Computers in Human Behavior, 57, 442-451.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]