Research in Computing Continuous Assessment 2 (MSCCYB1) Dr Babak Habibnia Administrative Data This second Continuous Assessment (CA) is worth 80% of the nal grade awarded. As published in the...

1 answer below »

View more »
Answered 11 days AfterJul 28, 2021

Answer To: Research in Computing Continuous Assessment 2 (MSCCYB1) Dr Babak Habibnia Administrative Data ...

Shubham answered on Aug 09 2021
145 Votes
Abstract
The network security for computer network and application security focuses on keeping devices and software free of threats. Information security can protect the privacy and integrity of data both in transit and storage. It includes the strategy with the layer for protection for defending against the cyber crime. It includes the practice for protecting the computer system and network that relies upon for ensuring the security. Information security provides the broader category fo
r protecting information assets. It can help in describing the collective methods and process for helping the confidentiality and availability of the computer system.
Introduction
Cybersecurity is the approach that provides multilayer protection across the network, program, network and data for keeping it safe. It uses a threat management system that can automate the integration for accelerating the key security operation function. In the connected work, it provides the benefit for providing advanced cyber defense programs. It includes the protection for the internet connected system and stops unauthorized access to computerized systems and data centers. This is required for providing a good security posture against the malicious attack designed to access, delete and alter the data of the user. It defines the access privileges and roles for every user. The security platform protects the sensitive information across multiple environments and multi cloud environment. It provides a best data security platform along with real-time visibility and automated visibility for data vulnerability.
Research Question
Literature review
Introduction
Cyber security is the application of process, control and technology for protecting system, network and data from cyber attacks. This is the aim for reducing the risk of cyber attack for protecting the unauthorized exploitation of system, technology and network. It focuses on protecting the computer system from unauthorized access. The main purpose for cyber security can help in protecting the asset from internal threat and external threat.
Importance of cyber security
Cyber security is important for pricing all categories of the data from damage and theft. It includes sensitive data, personal information and intellectual property. It includes the process for recovering and protecting the computer system, devices and network. It provides a new method for providing traditional security (Lezzi, Lazoi and Corallo, 2018). It provides the infrastructure that includes multiple layers for protection with computers, networks and programs.
Type of cyber attacks
Malware
It is used for describing the malicious software and it includes spyware, virus and ransomware. This breaches the network through vulnerabilities like clicking on suspicious emails and installing risky applications (Sarker et al. 2020). This is used inside the network and the malware contains the sensitive information and this further produces harmful software throughout the system and it blocks access to the vital business network components.
Phishing
Phishing is the practice for sending malicious communication designed for appearing from a reputable and well known source. The phishing link is clicked and the cyber criminal has access to the sensitive data like login information, social security and credit card.
Social Engineering
Social engineering is the process for manipulating people into divulging personal information. Phishing is the form of social engineering where criminals take advantage of people's natural curiosity (Mahdavifar and Ghorbani, 2019). The criminal can take an individual voice and manipulate relatives and friends by asking for credit card information and personal information.
Man-in-the-Middle Attack
Man-in-the-Middle Attack attacks occur when criminals interrupt the traffic between the two-part transaction (Sun et al. 2018). The cyber criminal can provide some view of all the victim information without ever being caught.
Zero-day attack
Zero-day attacks are common. This attack occurs between network vulnerability announcement and path solution (Xin et al. 2018). This announcement can be a problem with the network safety and some criminals can take the opportunity to unleash attacks before the company.
Types of cyber security
Securing Against Malware
The security against the malware can be the most important issue. Anti-virus software includes the package that can include a tool that provides warning against the suspicious website to flagging potential harmful emails.
Mobile security
Mobile phones are one of the most risk devices for cyber attacks and they can grow easily. The device can lose and this can be the concern (Lu and Da Xu, 2018). The application security can be becoming a major issue. The combat mobile application can be the request that can be provided with the use of a cybersecurity tool.
Web Browser...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30