You are on page 1of 3

Restricted

Contents
Page

Acknowledgement 3

Unit 1 Introduction 4

1.1 Aim and Objective 5

Unit 2 Literature Review 6

2.1 Cyberthreat 7

2.2 Cybersecurity 7

2.3 Cyber Insurance 9

2.3.1 Types of Cyber Insurance 9

Unit 3 Threats Associated With Information 8 Technology Infrastructure 11

3.1 Attack On It As An Amplifier Of A Physical Attack 12

3.2 Other Possibilities For Attack Involving IT 12

3.2.1 Attacks on the Internet 13

2.3.2 Attacks on the Public Switched Network 15

Unit 4 Types of Cybersecurity Threats 17

4.1 Most Common Types of Cyber Threats 17

Unit 5 Emerging Cybersecurity Threats 20

5.1 Sources of Cybersecurity Threats 20

5.2 Cyber Defense Best Practices For Businesses 22

5.3 Best Tools For Enterprise Cyber Defense 22

5.3.1 Outsourced Security Services 23


Restricted
Restricted

5.3.2 Threat Detection Services 23

5.3.3 Crowdsourced Attack Simulation/Vulnerability Testing Tools 23

5.3.4 Point Solutions For Device Management 23

5.3.5 Cyber Defense For Individuals 24

5.3.6 Takeaways 24

5.3.7 But Don’t Be Afraid 25

6. Findings 26

7. Recommendations 27

8. Conclusion 29

9. References 31

Restricted
Restricted

Reference

1. http://www.computerworld.com/storyba/0,4125,NAV47_STO66665,00.html.

2. http://www.computerworld.com/storyba/0,4125,NAV47_STO66665,00.html.

3. http://www.computerworld.com/news/1999/story/0,11280,27617,00.html

4. https://www.knowitallninja.com/lessons/the-impact-of-threats/

5. https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-

trends/enisa-threat-landscape/

6. https://www.thegfce.com/initiatives/r/responsible-disclosure-initiat iveethical-

hacking/

7. https://www.techtarget.com/searchsecurity/feature/Top-10-types-of-information-

security-threats-for-IT-teams

8. https://www.symantec.com/security-center/threat-report.

9. https://documents.trendmicro.com/assets/rpt/rpt2017-midyear-security-roundup-

the-cost-of-compromise.pdf.

https://scsonline.georgetown.edu/programs/masters-technology-
management/resources/top-threats-to-information-technology

Restricted

You might also like