Cyber Security and IT Infrastructure: A Comprehensive Analysis Report

Verified

Added on  2023/05/29

|4
|723
|396
Report
AI Summary
This report provides an overview of cyber security and IT infrastructure. It defines cyber security as a process that protects digital data and devices. The report emphasizes the growing importance of cyber security due to the increasing use of information technology. It analyzes the challenges faced, particularly privacy concerns arising from unauthentic servers. The report explores the key elements of cyber security, including information, network, data, and application security. The report also examines IT infrastructure, including hardware, software, and networks, and how cyber security protects these systems. It identifies common cyber threats like ransomware, malware, and phishing. The conclusion highlights the importance of authorized networks, security tools like firewalls and encryption, and the ongoing need to address cyber-crimes and data breaches.
Document Page
Cyber security and IT infrasrtuctre
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
A cyber security and computer security is defined as a process that protects physical
devices like computers, mobile and other electronic data. The use of cybersecurity is
growing very fast due to increasing information technologies, computer systems and
wireless networks and many organizations use this approach to control cyber-attacks
(Ericsson 1501-1507). In this research paper, the key purpose is to analysis the concept
of cyber security and IT infrastructure and the challenges faced by this technique. The
main problem faced by cybersecurity is privacy which occurs due to unauthentic
servers and most the organizations are facing this issue. This research paper is
explaining the role of cyber security in an organization with their advantages and
disadvantages and cyber-threats or issues of the information system.
Cyber security and IT infrastructure
Today, security of data is a very crucial problem which is growing rapidly because many
consumers use third-party applications and unauthentic networks that are developed
by hackers. To improve the security of computer networks information technology
established a new method that is cyber-security (Ralston, Graham, and Hieb, 583-594).
It provides a platform to handle and protect Internet-connected devices, computer
networks, software and other peripheral devices from hackers. The cyber-security
needs the coordination of efforts throughout an information system that involves
following key elements:
Information security
Network security
Data recovery
Application security
End-user education
It is estimated that in the year 2017 the use of cyber-security has increased by 30% that
time the information security devices and services has been reached $83 billion. There
are numbers of cyber security threats identified which are associated with computer
networks and internet connectivity, for example, ransom ware, malware, phishing,
denial of service, and sniffer attack (Von Solms, and Niekerk, 97-102).
Document Page
The term infrastructure in information technology is defined as an enterprise system
that contains software, hardware, computer networks, data links and other peripheral
devices. An organization IT infrastructure involves the physical devices and
equipment’s which are used by employees to transfer data or information (Wang, and
Lu, 1344-1371). It provides a way to transfer information technology services to
consumers and users and cyber security allow protection steps to these IT
infrastructures systems. Generally, IT infrastructure consists of the following devices
and equipment:
Hardware: computer, data centres, hubs, and switches
Software: ERP, consumer relationship management, and productivity applications
Network: internet connectivity, security, firewall and network enablement
Meat ware: network administrators, developers and IT appliance
Conclusion
Cyber security is an advanced technique to address the cyber-crimes and data breach
issues and also protect user’s private information. In the last five years information
technology produced advanced IT infrastructure which is used by many organizations
but these are associated with cyber-attacks. Cyber securities manage the security-
related issues and improve the performance of the computer system. This research
paper provided an overview of cyber security and IT infrastructure and evaluated
numerous devices and components used by IT infrastructure. It is investigated that
there are main three cyber-attacks occur in cyber security, for example, DDOS, malware
and ransom ware attack. People should ensure that they use only authorized networks
and adopt security tools like firewall and encryption to handle cyber-crimes.
Document Page
Works Cited
Ericsson, Go?ran N. 2010. "Cybersecurity and power system communication—essential
parts of a smart grid infrastructure."
IEEE Transactions on Power Delivery 25.3: 1501-
1507.
Ralston, Patricia AS, James H. Graham, and Jefferey L. Hieb. 2007. "Cybersecurity risk
assessment for SCADA and DCS networks."
ISA transactions 46.4: 583-594.
Von Solms, Rossouw, and Johan Van Niekerk. 2013. "From information security to cyber
security."
computers & security38: 97-102.
Wang, Wenye, and Zhuo Lu. 2013. "Cyber security in the smart grid: Survey and
challenges."
Computer Networks 57.5: 1344-1371.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]