Cybersecurity: The Significance of Physical Security and Branches

Verified

Added on  2022/12/03

|3
|368
|54
Report
AI Summary
This report discusses the significance of various security branches within cybersecurity, with a particular emphasis on physical security. It highlights the importance of protecting confidential information, company assets, and network software. The report emphasizes the potential threats from both natural causes and malicious actors, such as data breaches and theft. It stresses the need for strong password practices, the implementation of AAA (authentication, authorization, and accounting), and the monitoring of networks to secure sensitive information and prevent unauthorized access. The report also touches upon the potential risks associated with internal threats, such as IT personnel installing malware. Overall, the report underscores the importance of a comprehensive approach to cybersecurity that includes both technical and physical security measures.
Document Page
Running head: CYBER SECURITY
Topic: Explain the importance of understanding the various branches of
security
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
CYBER SECURITY
For the information security the physical security is often considered as the second
thought for most of the organization and personnel’s. Due to the presence of administrative and
technical elements in physical security most of the organization focuses on “technology-oriented
countermeasures of security” for the prevention of different attacks. The physical security is
about protecting the confidential information, company’s or personnel assets, network software
and other important data (Laudon & Laudon, 2016). The security can be affected by two factors
i.e. by nature in which the information is not misused but it can cause loss of data permanently
and secondly by malicious third part that can cause misuse of data, vandalism and theft.
Paying no attention and using similar password for different website can give chances to
the attacker to provide a chance to exploit data and other sensitive information. The attacker can
remotely access the computer system for installing malware and rootkit for gaining access of the
system for stealing assets with ease (Beckman, 2016). Securing the servers and workplace area is
also not enough because the It service personnel can install malware in the organizational server
for gaining access and steal the organizational information.
For improving the security and eliminating the threats it is essential to use unique
stronger password with alpha numeric combination for the different account. The sensitive
information is needed to be password protected and the network of the organization is needed to
be monitored. The access of the files and information on the servers are needed to be secured
with the implementation of AAA (authorization, accounting and authentication).
Document Page
2
CYBER SECURITY
Reference
Beckman, J. (2016). Comparative legal approaches to homeland security and anti-terrorism.
Routledge.
Laudon, K. C., & Laudon, J. P. (2016). Management information system. Pearson Education
India.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]