Question

ASSIGNMENT Pick one of the topics below and discuss: 1: Cyber security 2: IT Security

ASSIGNMENT

Pick one of the topics below and discuss:

1: Cyber security

2: IT Security

Homework Answers

Answer #1

I'm going to discuss about cyber security here

As it's a vast area ,going to write some points about it.

Contents

I)Introduction

II)Major security problems

III)Challenges of cyber security

IV)People

V) Processes

VI) Conclusion

Lets discuss each point briefly

I)Introduction:

-->Cyber security is the protecting of the systems,networks and programs from digital attacks. These cyber securities are aimed at accessing,changing and destroying sensitive information : extorting money from the users or interrupting normal business processes.

--> The cyber security is used to refer to the security offered through online services protect your online information. With an increasing amount of people getting to the internet the security threats causes massive harm are increasing also.

-->Cyber means it's combing form relating to information technology, the internet and virtual reality.

-->Cyber security is necessary since it helps in securing data from threats such as data theft or misuse also also safeguards your system from viruses.

II)Major security problems

i) Virus: A virus is a program that loaded onto your computer without your knowledge and runs against on your system. For avoiding virus the solution is to install any anti virus software like AVG, MCAfee etc.. and need to scan the system frequently.

ii) Hackers: A hacker is person who breaks into computers, usually by gaining access to the admin controls. Again in hackers there are 3 types i.e.white hat hacker, grey hat hacker and black hat hacker. The solution for getting rid of hacking is using strong passwords and usage of firewalls

iii)Malware: Malware means malicious software where it'll infect or damages the computer system without the own knowledge. The solution is to download the anti malware programs and firewalls.

iv)Trojan horse: These are the email viruses that can duplicate themselves,steal information or harm the system. These viruses are the most serious threats to computers. For getting avoid from Trojan horse need to download security suites like Avast.

V) password cracking

vi) Securing password

III)Challenges of cyber security

i) Network security

ii) Application security

iii)End point security

iv) Data security

v) Cloud security

vi) Mobile security

vi) End user education

The most difficult challenge in cyber security is the eve evolving nature o the security risks themselves. Traditionally organizations and govt have focused of their one of the most and crucial components,defend against defend known threats. Today this approach is insufficient ,as threats advance and change more quickly than organizations can keep up with.

IV)People

Users must understand and comply with the basic data security principles like choosing strong password, being wary of attachments in email and backing up data

V) Processes

organizations must have a framework how they deal with both attempted and successful attacks. One well respected framework can guide you. Everyone is able to identify which is correct url adn which is fishing page then only can get avoid of the these type of threats.

VI) Conclusion

As these days security attacks are getting more and threats are happening frequently. So only way to be safe is need to be aware of the website getting hacked, before entering anything need to checked , pay attention and Act smart

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Cyber security in nursing 1. Introduction 2. background 3. history
Cyber security in nursing 1. Introduction 2. background 3. history
Using the internet, find Canadian examples. Pick tow topics below? 1) Outsourcing Jobs 2) Trade deficit
Using the internet, find Canadian examples. Pick tow topics below? 1) Outsourcing Jobs 2) Trade deficit
Pick ONE of these 2 topics: (1) Predicting Dangerousness or (2) The Duty to Warn and...
Pick ONE of these 2 topics: (1) Predicting Dangerousness or (2) The Duty to Warn and create a Presentation to teach the class what you have learned. You may choose between the following formats: (Narrative 300 words), PowerPoint (5 slides) Video that you create (90 minutes), or song that you write and sing (90 minutes).
Choose one topic from the three topics below to discuss: 250+ words 1. What are the...
Choose one topic from the three topics below to discuss: 250+ words 1. What are the interesting differences you can think of between DNA, RNA and protein biosynthesis? 2. Discuss the mechanisms of Lac operon or Trp operon, what do you think are impressive? 3. What interests you the most about genetic code?
Topics: pick one ~ Sleep ~ Problem Solving Q1. what informations that you learned about the...
Topics: pick one ~ Sleep ~ Problem Solving Q1. what informations that you learned about the topic you chose will be useful for you in your personal life.? Discuss how and why that information will be useful. include specific example from your life.
.Universities are constantly facing a variety of cyber security threats, including disruption to the functioning of...
.Universities are constantly facing a variety of cyber security threats, including disruption to the functioning of their networks, targeted attempts to obtain valuable and personal information, and advanced threats that aim to exploit the sector’s place in economic development. Digital information is at the core of a university’s diverse network of departments and activities. The main challenge a university faces, in terms of cyber security, is defending its critical data from potential corruption caused by modern cyber threats. The current...
Pick one of the following topics (or choose one of your own) and explain what you...
Pick one of the following topics (or choose one of your own) and explain what you learned about it this week. Please be very specific. This should be in your own words, with information properly cited. Please see the directions above as well. 1. Mitosis and Meiosis 2. Cell Cycle and Cancer 3. Abnormal Chromosomal Inheritance 4. Patterns of Inheritance 150 WORDS
Cyber Security question: Describe one wireless vulnerability. Explain why this vulnerability exist. Also describe how its...
Cyber Security question: Describe one wireless vulnerability. Explain why this vulnerability exist. Also describe how its exploited and how to mitigate it.
Which type of cyber-attack involves IP theft? 1. Cyber-attack against identities and access. 2. Cyber-attack against...
Which type of cyber-attack involves IP theft? 1. Cyber-attack against identities and access. 2. Cyber-attack against applications. 3. Cyber-attack against critical infrastructure. 4. Cyber-attack against confidential data.
Select TWO of the following topics to discuss: 1. Discuss the purposes of Statement of the...
Select TWO of the following topics to discuss: 1. Discuss the purposes of Statement of the Cash Flow, and what makes SCF different from other financial reports (e.g., Balance Sheet & Income Statement). 2. Discuss differences between Direct and Indirect methods to prepare a Statement of Cash Flow. 3. Discuss the Indirect method in more detail.
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT