You are on page 1of 7

REPORT

Cyber Security

Emil A.A and Akhmedov A.A

Astana IT University

Information and Communication Technology

October 1, 2022
Table of content
• Introduction

• Literature Review

• Discussion

• Conclusion

• Reflection

• Reference list
INTRODUCTION

Cybersecurity is a method of protecting sensitive data from unauthorized digital attacks on user
data, government data, etc.
That is, cybersecurity is needed in order to protect your bank accounts, passwords, social
networks and personal information. Many large companies use this to protect their data from
hackers. In our digital age, cybersecurity is of particular importance. The number of cyberattacks
is growing every year, and the protection against them is becoming less and less. We can share
statistics about cyber attacks.
According to statistics, Russia is in first place in terms of cyberattacks, with more than 1.5
million cyberattacks per day in this country. This is a very large figure for such a country. The
US is also on this list with 700,000 hacker attacks in the last day. Hacker attacks can be Trojan
viruses and so on.

LITERATURE REVIEW

All these articles talk about the importance and significance of cybersecurity. About what the
GDPR (Global Data Protection Regulation) is and where it is applied. But there are also
differences between these articles. The first difference is that one of the articles describes the
impact of cyber attacks on companies and the community.
For example, after a cyberattack, the company's customers begin to trust this company less and
there are still economic losses, such as the loss of important documents and securities. The
following article describes the approximate losses from cyber attacks and what compensation
insurance companies should pay.
For example, after a cyberattack on Ebay, the accounts of 145 million users were opened. And in
some states of America, for the fact that the company made a mistake in cybersecurity, the
insurance company had to pay compensation in the amount of $ 750 to each client of the
company. Some other articles indicate the types of cyber attacks, they are as follows

Cyberterrorism.

This threat is a politically-based attack on computers and information technology to cause harm
and create widespread social disruption.

Malware.

This threat encompasses ransomware, spyware, viruses, and worms. It can install harmful
software, block access to your computer resources, disrupt the system, or covertly transmit
information from your data storage.
Trojans.

Like the legendary Trojan Horse of mythology, this attack tricks users into thinking they're
opening a harmless file. Instead, once the trojan is in place, it attacks the system, typically
establishing a backdoor that allows access to cybercriminals.

Botnets.

This especially hideous attack involves large-scale cyberattacks conducted by remotely


controlled malware-infected devices. Think of it as a string of computers under the control of
one coordinating cybercriminal. What’s worse, compromised computers become part of the
botnet system

DISCUSSION

It can be argued that the number of cyber attacks is growing every year, and cyber security is
trying to reflect them, but this is not enough. We see that hackers come up with new types of
protection and at the same time break into large companies.
Companies are losing a lot of revenue due to hackers. It is very difficult for cybersecurity to cope
with such methods, because cybersecurity does not have time to improve every year than
hacking.
To do this, we need to invest more in the cybersecurity budget and train excellent, capable
specialists in this profession so that in the future there will be an opportunity to prevent hacker
attacks. Cyber attacks increase by 15% every year, and cybersecurity closes only half of them, so
there are large data leaks from various confidential information, or secret government data. Most
often, cyber attacks occur in banks in different countries, because hackers need money for
personal expenses.
If you want to open your business, and later a digital site for your business, then you need to
install protection on it in order to avoid fatal outcomes, contact the specialists, they will help
you.

CONCLUSION

In this study, we discussed factors such as the consequences after a cyberattack and what actions
companies take after a cyberattack.
We also explained what cybersecurity is and its importance for our developing world, in which
more and more smart device options are appearing every day. And also learned about GDPR and
what actions they are taking.
Now the issue of cybersecurity is still relevant because we do not have enough experienced legal
hackers to repel cyber attacks and the solution to this problem has not yet been fully developed.
Every day the risk of being attacked is increasing every day, based on this, we must train more
and more specialists in the field of cybersecurity. Now everything depends only on ourselves.

Member name Responsibilities


Emil A. Printing text for the project, preparing the
project, checking information for accuracy.
Reads text, articles from different sites,
pretends to be a project

Akhmedov A. Search for information, read different articles,


check for accuracy of information from
different sites, magazines, books. Help with the
project.
Reference List

Why is Cybersecurity Important? | UpGuard. (n.d.). Retrieved October 1, 2022, from

https://www.upguard.com/blog/cybersecurity-important

Why is cyber security important | Cyber security. (n.d.). Visma. Retrieved October 1, 2022, from

https://www.visma.com/cyber-security/why-is-cyber-security-important/

Elphick, E. (2022, May 17). 4 Reasons Why Cybersecurity is Important. Buchanan

Technologies. Retrieved October 1, 2022, from https://www.buchanan.com/why-

cybersecurity-important/

Kaspersky. (2022, May 16). What is Cyber Security? www.kaspersky.com. Retrieved October 1,

2022, from https://www.kaspersky.com/resource-center/definitions/what-is-cyber-

security

NCSC. (n.d.). Retrieved October 1, 2022, from https://www.ncsc.gov.uk/

What is Cyber Security? Definition, Types & Examples. (2022, September 15). Digital Guardian.

Retrieved October 1, 2022, from https://digitalguardian.com/blog/what-cyber-security

A Roundtable Discussion on Cybersecurity. (n.d.). Retrieved October 1, 2022, from

https://www.chicagobusiness.com/custom-media/roundtable-cybersecurity.html
Link: https://cybermap.kaspersky.com/ru/stats#country=213&type=OAS&period=w

You might also like