Wednesday, August 14, 2019

Cyber security is said to be a big issue for business costing not only Essay

Cyber security is said to be a big issue for business costing not only lost revenue but damaged reputations and lost custom. Yo - Essay Example Any cyber security program strives to ensure these four fundamental cyber security components. Information confidentiality enables the organization’s sensitive information to be a secret so that it does not fall into the hands of unauthorized persons for example the competitors. Information integrity ensures that the data that is stored is accurate and serves the purpose and is always up to date. Data availability enables information to be present any time the organization required. This is by preventing any vulnerability for example denial of service. This can give the competitor firm an avenue of bringing down the company by capitalizing on the weakness of the other company and at the same time enhancing its strength. The investigation was conducted by administering questionnaire to cyber security experts of various organizations. Interviews were also conducted with CISO of both business and non profit organizations. In addition, a thorough review of the existing literature on cyber threats and cyber security was conducted. Table of Contents Cyber security is said to be a big issue for business costing not only lost revenue but damaged reputations and lost custom. Your task is to investigate the need for cyber security and analyze the threats from which it protects business. ... A cyber security is a basis or the foundation of organization’s security for its information assets. Cyber attacks are a deliberate or unintentional unauthorized task, which cannot be avoided or is in avoidable that that is capable of causing a vagary on the cyberspace resources. The scope of cyber attack is expands from hardware, software, data that is stored, data in transit, people, documents and other hardware needed like printer cartridges. Findings and Analysis The organization information system is a critical asset that calls for utmost security. For instance, employee’s personal identification information, development plan and financial data are very critical to an organization. This information can fall into two broad categories. There are information that are secured or protected by the state and federal law and those that are based on contractual obligation (Jue 2012). The deliberate or accidental exposure of this information to illegal personnel can be detri mental to the university. The different types of attack that are detriment to cyber security are Threats targeting infrastructure (Invalidated input) Problem and situation The most prevalent threat to client computers is Keylogging and spyware. This is a malware that is built to illegally obtain, track and block the right of a user to get access to the system. An example of this attack is where someone or an individual tries to log on to the system or a website like an email account but the system or the site fails to authenticate the user. This threat is related to backdoor attack command. These are weapons that give remote access that are created to divert the functionality of the system.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.