Comprehensive Analysis of Information and Cyber Security Report
VerifiedAdded on 2022/09/05
|13
|622
|27
Report
AI Summary
This report provides an analysis of information security, cyber security, and computer security. It defines each term and highlights the differences between them. The report further discusses the importance of mobile security, and the strategies to improve it. It also covers the concepts of cyberwarfare and cyberterrorism, offering real-world examples of their implications. References are provided from various research papers and journals to support the information. The report aims to provide a comprehensive understanding of the current security landscape and the measures required to safeguard data and systems.

Analysis of information
security
security
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Information security
It refers to procedures and policies for
ensuring security and privacy of
information from illegal access.
It refers to procedures and policies for
ensuring security and privacy of
information from illegal access.

Information security example
When authentication is applied for
system that stores data, it does not
allows anyone to access data if they do
not have required permission to access
data as well.
When authentication is applied for
system that stores data, it does not
allows anyone to access data if they do
not have required permission to access
data as well.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Cyber security
It refers to process to secure network,
hardware, electronic system and data
from illegal access or techniques that
exploits security of a system as well.
It refers to process to secure network,
hardware, electronic system and data
from illegal access or techniques that
exploits security of a system as well.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cyber security
Protecting data against
ransomeware is an example of
cyber-security.
Protecting data against
ransomeware is an example of
cyber-security.

Computer security
Computer security refers to process of
enhancing security of computer
systems and computer networks from
security issues related to hardware,
software along with electronic data
which might be accessed illegally by
hackers as well.
Computer security refers to process of
enhancing security of computer
systems and computer networks from
security issues related to hardware,
software along with electronic data
which might be accessed illegally by
hackers as well.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Computer security example
Keeping backup of data is an
example of computer security as it
provides access to data when
storage device gets corrupted as
well.
Keeping backup of data is an
example of computer security as it
provides access to data when
storage device gets corrupted as
well.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Differences between information
security, cyber security and
computer security
Information security is about securing
information while considering confidentiality,
integrity and availability. cyber security is
about protecting things from ICT related issues
and computer security refers to security of
information stored in computer systems.
security, cyber security and
computer security
Information security is about securing
information while considering confidentiality,
integrity and availability. cyber security is
about protecting things from ICT related issues
and computer security refers to security of
information stored in computer systems.

Analysis of the mobile security plan
Review of policy for example identify if any
modification in policy regarding data access
is required or not
analysis of existing security strategies for
example identify if access control is effective
or not and if any modification is required
Review of policy for example identify if any
modification in policy regarding data access
is required or not
analysis of existing security strategies for
example identify if access control is effective
or not and if any modification is required
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Analysis of the mobile security plan
Integrating new security solutions with existing
security strategies for example if any security
software is integrated with existing IT infrastructure
then identify if it is properly working or not
Increase employee awareness for example provide
training to employees for implementing security
strategies
Integrating new security solutions with existing
security strategies for example if any security
software is integrated with existing IT infrastructure
then identify if it is properly working or not
Increase employee awareness for example provide
training to employees for implementing security
strategies
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cyberwarfare and cyberterrorism
Cyberwarfare refers to attempt of a nation-state to hack computers
or networks of another nation for creating damage or disruption as
well.
For example, causing disruption to intelligent service of an country
by hacking their intelligent systems.
Cyberterrorism refers to attempt of a group of hackers to do
something to create terror among people.
For example, stealing credit cards of many consumers to create
terror among bank and it consumers as well.
Cyberwarfare refers to attempt of a nation-state to hack computers
or networks of another nation for creating damage or disruption as
well.
For example, causing disruption to intelligent service of an country
by hacking their intelligent systems.
Cyberterrorism refers to attempt of a group of hackers to do
something to create terror among people.
For example, stealing credit cards of many consumers to create
terror among bank and it consumers as well.

References
Awan, J. H., Memon, S., Khan, R. A., Noonari, A. Q., Hussain, Z., & Usman, M. (2017). Security
strategies to overcome cyber measures, factors and barriers. Eng. Sci. Technol. Int. Res. J, 1(1), 51-58.
Friis, K., & Ringsmose, J. (Eds.). (2016). Conflict in Cyber Space: Theoretical, Strategic and Legal
Pespectives. Routledge.
Galinec, D., & Steingartner, W. (2017, November). Combining cybersecurity and cyber defense to
achieve cyber resilience. In 2017 IEEE 14th International Scientific Conference on Informatics (pp. 87-
93). IEEE.
Muronga, K., Herselman, M., Botha, A., & Da Veiga, A. (2019, September). An analysis of assessment
approaches and maturity scales used for evaluation of information security and cybersecurity user
awareness and training programs: A scoping review. In 2019 Conference on Next Generation
Computing Applications (NextComp) (pp. 1-6). IEEE.
Safa, N. S., & Von Solms, R. (2016). An information security knowledge sharing model in
organizations. Computers in Human Behavior, 57, 442-451.
Awan, J. H., Memon, S., Khan, R. A., Noonari, A. Q., Hussain, Z., & Usman, M. (2017). Security
strategies to overcome cyber measures, factors and barriers. Eng. Sci. Technol. Int. Res. J, 1(1), 51-58.
Friis, K., & Ringsmose, J. (Eds.). (2016). Conflict in Cyber Space: Theoretical, Strategic and Legal
Pespectives. Routledge.
Galinec, D., & Steingartner, W. (2017, November). Combining cybersecurity and cyber defense to
achieve cyber resilience. In 2017 IEEE 14th International Scientific Conference on Informatics (pp. 87-
93). IEEE.
Muronga, K., Herselman, M., Botha, A., & Da Veiga, A. (2019, September). An analysis of assessment
approaches and maturity scales used for evaluation of information security and cybersecurity user
awareness and training programs: A scoping review. In 2019 Conference on Next Generation
Computing Applications (NextComp) (pp. 1-6). IEEE.
Safa, N. S., & Von Solms, R. (2016). An information security knowledge sharing model in
organizations. Computers in Human Behavior, 57, 442-451.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.