Electronic Document Preparation& Management SBA
Electronic Document Preparation& Management SBA
Electronic Document Preparation& Management SBA
Management SBA
1
\
INTRODUCTION
This ELECTRONIC DOCUMENT PREPARATION &MANAGEMENT, SCHOOL BASED ASSIGNMENT is
done as a part of the CSES examination and is based on the topic cyber security.
2
Acknowledgement
This school based assignment would not have been complete or concluded without the obligation
and the mutual support of my cousin Anastasia Persaud.
The researcher wishes to thank all family members for understanding and cooperation with her
also for released her household chores and assistance psychologically and financially,
The researcher would like to pass out a special thanks to her subject teacher who guided her in
every step until at the conclusion of this school based assignment.
3
Aim
To protect the computer, network and software programs from such cyber-attacks most
of these digital attacks are aimed at accessing, altering or deleting sensitive information
extorting money from victims or interrupting normal business operations.
4
Objective
The purpose of cyber security is to help prevent cyber-attacks, data breaches and identify
theft and can aid in risk management.
5
T Application Security- is much more accessible over networks, causing the adoption of
security measures during the development phrase to be an imperative phrase of the
project.
Network Security- ensures that internal networks are secure by protecting the
infrastructure and inhibiting access to it.
Cloud Security- is a software base security tool that protects and monitors the data in
your cloud resources.
Internet of Thing Security- refers to or wide variety of critical and non-critical cyber
physical systems.
L SECURITY-
INFRASTRUCTURE
7
ADVANTAGES & DISADVANTAGES OF CYBER SECURITY
ADVATAGES
It provides protection against worms, viruses, spyware and other unwanted
programs.
It provides protection from data theft as with the implementation high-security
protocol malicious user cannot break the network architecture.
Protect the system from hacking.
Provide data and system privacy. This can be achieved with the good
implementation of security policies and protocols in the network.
DISADVANTAGES
Rulers of the firewall are difficult to configure correctly.
Makes the system week sometimes too much security can backfire.
Criminals
Hackers
Disgruntled employees
9
PLACES THAT ARE AFFECTED BY CYBER SECURITY
China
Brazil
India
Germany
Russia
Vietnam
Japan
France
10
Chart showing cyber security
11