topic - cybersecurity This task aims for students to write a business-style report on their research topic -~1500 words. Further discussions on the report's writing will be carried out in the webinars...

1 answer below »

topic - cybersecurity


This task aims for students to write a business-style report on their research topic -~1500 words.


Further discussions on the report's writing will be carried out in the webinars and lectures in weeks 9 to 12.



Students should write a business report that provides:


· The introduction to the topic;


· The background and scope (e.g. the main problem and issues);


· The aim of the report;


· An overview of benefits and challenges;


· A set of conclusions; and


· A reference list (minimum 6 sources)


The report must also provide information in a table and/or figure.





Answered 3 days AfterOct 01, 2022

Answer To: topic - cybersecurity This task aims for students to write a business-style report on their research...

Shubham answered on Oct 04 2022
57 Votes
CYBER SECURITY
Table of Contents
Introduction    2
Background and scope    2
Aim of the report    4
Overview of benefits and challenges    5
Conclusion    8
References    9
Introduction
Cyber security is the practice for protecting networks, programs and systems from digital attacks. Cyber attacks are used for changing, accessing and destroying sensit
ive information and interrupting business processes. It is a successful approach for setting multiple layers for providing protection across networks and systems for providing safety. It is considered as a threat management system that can automate integration for accelerating key security operation functions that includes detection, investigation and remediation for the attack. The study describes about use of cyber security along with advantage and disadvantage of cyber security in the business.
Background and scope
Cyber attacker uses sensitive data for stealing the information for gaining the access to financial accounts and it can include potential damaging action. Malware is the major issue as it is malicious software like ransomware, worms, spyware and viruses. This is activated with the click of the user on the malicious attachment or link that results in installation of dangerous software. After activation this results in blocking the access to network components and installation of harmful software. It can covertly obtain the information by transmitting data from the hardware and it can make the system inoperable (Sarker et al. 2020). Emotet is the advanced trojan that includes its primary function as downloader and it continues among the most destructive and costly malware. DDoS attacks are the type of attacks that can flood the network or computer with unwanted requests. DDoS attacks the computer network and cyber attackers use a flood attack for attacking and the network and computer system cannot respond to requests. It disrupts the handshake process and a DDoS is carried out. It uses techniques that can be used and cyber attackers use time so that the network can be disabled for disabling the network. DDoS can infect millions of systems and it can easily be controlled by hackers.
Figure 1: Types of Malware
Man in the middle attack occurs when the hacker can insert into a two-party transaction. It can interrupt traffic and hackers can filter and steal the data. This attack can occur when visitors use an unsecured network and this situation is used by attacks for inserting the malware along with using the data maliciously. Phishing is the type of attacks that uses false communication like email that can trick receivers for opening and carrying out instructions. The goal is to steal sensitive data and login information by installing malware on the victim machine. SQL injection is the way that is used by attackers for accessing the wealth of information (Lezzi, Lazoi & Corallo, 2018). It is a kind of password attack that can be defined as the strategy that is used by cyber attackers that relies on human interaction and involves tricking people for breaking security practices. Hackers are successfully compromising with connected home devices by gaining Wi-Fi credentials and it can also help in gaining access to sensitive data.
Aim of the report
The aim of the report is to understand the importance of cybersecurity that is important for protecting all categories of data from damage and theft. Without cybersecurity, the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here