Computer Report
Computer Report
Computer Report
1. Threat Landscape:
Continuously evolving threats, including malware, phishing attacks, ransomware, and
more, pose risks to systems and data integrity.
8. Insider Threats:
Risks posed by individuals within an organisation, intentionally or unintentionally
compromising security through negligence, malicious intent, or social engineering.
9. Resource Constraints:
Balancing the allocation of resources (financial, human, and technological) to
effectively implement and maintain robust cybersecurity measures.
METHODOLOGIES
Cybersecurity employs various methodologies to ensure the protection of digital systems
and data. Some prominent methodologies include:
2. Defence-in-Depth:
This methodology employs multiple layers of security controls (such as firewalls,
intrusion detection systems, access controls) to create a comprehensive defence strategy. If
one layer fails, others can still provide protection.
4. Vulnerability Management:
This methodology involves continuously identifying, prioritising, and addressing
vulnerabilities in systems and software through processes like vulnerability scanning, patch
management, and regular updates.
ANALYSIS
Cybersecurity is a critical aspect of modern-day digital operations, encompassing various
measures and strategies aimed at safeguarding systems, networks, data, and users from
cyber threats and attacks. An analysis of cybersecurity involves several key aspects: