Title Executive Summary Abstract 100 – 150 words Contents Executive Summaryi 1.Introduction1 2.Background Literature2 2.1Theme 1 (normally definitions)2 2.2Theme 2 (normally history)2...

1 answer below »
Cyber secutity


Title Executive Summary Abstract 100 – 150 words Contents Executive Summaryi 1.Introduction1 2.Background Literature2 2.1Theme 1 (normally definitions)2 2.2Theme 2 (normally history)2 2.3Theme 3 (normally new trends)2 3Benefits of Topic3 4Challenges of Topic4 5Discussion of Topic5 6Conclusion and Recommendations6 References7 NameICT103 Assessment 3 Student ID 2 1. Introduction Paragraph 1: Orientation (100 – 120 words) Paragraph 2: Background and Scope (100 – 120 words) Paragraph 3: Statement of purpose and outline (main points) (100 – 120 words) 2. Background Literature Section overview (80 – 100 words) 2.1 Theme 1 (normally definitions) Paragraph goes here (150 – 200 words) 2.2 Theme 2 (normally history) Paragraph goes here (150 – 200 words) 2.3 Theme 3 (normally new trends) Paragraph goes here (150 – 200 words) 3 Benefits of Topic Outline key benefits (150 – 200 words) 4 Challenges of Topic Outline key challenges, problems, and/or issues (150 – 200 words) 5 Discussion of Topic Compare and contrast benefits and challenges. Look at key trends. 200 words 6 Conclusion and Recommendations Summarise main points and state recommendation (100 – 150 words) References Kimble, C and Milolidakis, G. (2015) “Big Data and Business Intelligence: Debunking the Myths”, Global Business and Organizational Excellence, 35, pp. 23-34 English, L.P. (1999) “Improving Data Warehouse and Business Information Quality”, New York, USA: Wiley Computer Publishing. Manyika, J., Chui, M., and Brown, B (2011) “Defining Big Data”, New York, USA: McKinsey Global Institute. SAS Insights (2020) “Big Data Analytics: What it is and why it matters”, SAS Insights. Retrieved from: https://www.sas.com/en_us/insights/analytics/big-data-analytics.html Wang, R.Y., Strong, D.M., and Guarascio, L.M. (1994) “Data Consumers’ Perspective on Data Quality”, Beyond Accuracy: What Data Quality Means to Data Consumers TDQM-94-01 MIT, 2
Answered 2 days AfterJan 20, 2022

Answer To: Title Executive Summary Abstract 100 – 150 words Contents Executive Summaryi 1.Introduction1...

Neha answered on Jan 23 2022
117 Votes
Title
Executive Summary
The cyber security can be defined as the set of principles and the practices which is designed for protecting the computing resources and some online information against any type of threat. The cyber security can be divided into two parts in which one is cyber and the other one is security. The security community has provided a triangle of the basic three related principles which can help us to protect t
he data from any type of cyber-attacks. This principle is known as CIA triad. It discusses about the challenges and benefits of having cyber security in the organization and the current trends of cyber security.
Contents
Executive Summary    i
1.    Introduction    1
2.    Background Literature    2
2.1    Theme 1 (normally definitions)    2
2.2    Theme 2 (normally history)    2
2.3    Theme 3 (normally new trends)    3
3    Benefits of Cyber Security    3
4    Challenges of Cyber Security    4
5    Discussion of Cyber Security    4
6    Conclusion and Recommendations    5
References    6
Name        ICT103 Assessment 3
Student ID
2
1. Introduction
A technique which can be used to protect the Internet connected systems like the servers, computers, networks, data, mobile devices and the electronic systems from any type of malicious attack can be defined as the cyber security. The cyber security can be divided into two parts in which one is cyber and the other one is security. The cyber can be defined as the technology which includes network, programs, systems and the data while the security is related with the protection of networks, information, applications and the systems. It is also known as the electronic information security or the information technology security in some cases. The cyber security can be defined as the set of principles and the practices which is designed for protecting the computing resources and some online information against any type of threat. The cyber security in another definition can be defined as the body of technologies, practices and processes which are designed so that they can protect the data, devices, networks or the programs from theft, attack, modification, damage or any type of unauthorized access.
Currently we are living in the digital era in which all the aspects of the lives are depending over the network, computer systems and related electronic devices and the software applications. The critical infrastructures like the health here, banking system, manufacturing industries, financial institutions and the governments are using devices connected with the Internet as the major part to complete their processes and operations. The information like intellectual property, personal data and the financial data are some sensitive parts in which if they are exposed or have unauthorized access then it can create negative consequences. The cyber-attack is the international concern in which the attacker can hack the system and other security attacks can create issue for the global economy hence it is very important to have the excellent cyber security strategy which can protect sensitive information from any type of security breach.
The objective of the cyber security is to make sure that we are protecting our data. The security community has provided a triangle of the basic three related principles which can help us to protect the data from any type of cyber-attacks. This principle is known as CIA triad. This model is designed to help the organization in creating policies for their information security infrastructure and if there is security breach then one or more principles have been violated. This model has the confidentiality, integrity and availability as its parts. This model will help the people to think about different aspects of the IT security. There has been a growth in volume of cyberattacks for the companies who are dealing with the information related with financial records, national security or health and they need to use strong cyber security processes and measures to protect the sensitive information.
2. Background Literature
In this section we will discuss about the basic definitions of the cyber security. It is the literature review of the whole report which provides the user basic idea about the content of this report. It includes the basic definitions of cyber security, history of the cyber security and current new...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here