CASE STUDY Cyber Security Of An Organization 1 Provide a cri
CASE STUDY: Cyber Security Of An Organization
(1) Provide a critique of an existing process within an enterprise, and how it should be done as opposed to how it is done within an enterprise setting.
(2) This should be in the format of:
• Before and after
• Why the changes were made
For example, if you were in charge of security, how would you change the process in place in your organization and why?
Solution
Cyber security is a security that we give to the computer in order to protect it from third person or any intruder which harm you system without being an authorised person. Cyber security is very essential need that we require now days in order to keep our system protected from being hacked from third user. We know that there are several types of attacks in our system. Let’s talk about some attacks here for which we required protection of our system that’s cyber security.
Active attack, in this type of attack a malicious person sniffs a data or information from one end of computer that is being sent to the other end of computes, and hackers will modify that data on his own and sends modified data to the other user and keeps original. In this way the systems in an organization may get affected and decreases the through put of the systems due to lacking of the data.
Passive attack is similarly like active attack, in this case the attacker only sniff the data and uses it for further communications.
See there can be several type of attacks like mentioned above, so for that matter we require potent security so that no one can harm computers though remotely or direct login. Our motive is that to have strong credentials while we turn On our computers. We should always keep authentication is hash form which are not readably easily. We should give limited access to the other users who are in same organization. Every 15 days or 1 month interval of time we should change our login credentials. Every last days pop-up should generate automatically in order to change username and password. Firewall should be well configured to every system so that computers may not get chance to access invalid or harm websites. Each password should be invisible to every person not even in dotted notations.
