Cybersecurity Fundamentals – Assignment Sample

This assignment sample discusses basic cybersecurity principles, threats, and prevention methods in modern computing environments.

  • 72780+ Project Delivered
  • 500+ Experts 24x7 Online Help
  • No AI Generated Content
Merry Christmas Sale up to 60% off on all services
- +
55% Off
£ 9.67
Estimated Cost
£ 4.35
Prices Start From
GBP 4.00GBP 9.00
20 Pages 4918 Words

1.1: Top five cyber security best practice

The main focus of cyber security continues to be on the trending threat and therefore it is a field that has to be evolving continuously. Five of the many best practices are effective in mitigating risk and ensuring the security of digital systems. Mixed methods are any practices that involve strong password management, multi-factor authentication, (MFA), up-to-date software, data encryption, and employee security awareness.

1. Strong Password Management

It is the first line of defense against unauthorized access and passwords. Cyber-attacks such as brute force and credential-stuffing attacks are more likely against your system if you use a weak or reused password. Reducing the likelihood of breaches includes implementing complex passwords, avoiding reuse, and using a password manager (Berkley, 2020). A good password policy makes it hard to crack credentials and so contributes to increased security.

2. Multi-factor authentication (MFA)

Phishing or data breaches may give cyber criminals access to do so unless they have strong passwords. MFA is an extra layer of security in which an extra method of authentication is required, e.g. one-time password (OTP), biometric authentication, or security token. It’s a lot harder for attackers to exploit accounts if they manage to get their hands on login credentials.

3. Regular Software Updates and Patch Management

Cyber-attacks often start from unpatched software. Malware, ransomware, and remote code are deployed on outdated systems by exploiting vulnerabilities to do so. According to the organization’s security strategy, the organization should make automatic updates, vulnerability assessments, etc (CIS, 2020).

Figure 1: Top Practices of cyber security

Figure 1: Top Practices of cyber security

(Source: www.psmpartners.com)

Assignment Help Online in the UK helps students achieve academic success with expert-written, plagiarism-free assignments delivered on time.

4. Data Encryption

In different scenarios, encrypting data ensures both confidentiality and integrity for data at rest and in transit respectively. With robust security like strong encryption algorithms like AES for data storage and TLS for online communications, there is better protection for stolen data in the cloud and remote work environments.

5. Employee Security Awareness Training

Security breaches continue to be a result of human error. Phishing, social engineering, and other deceptive tactics make cyber criminals exploit unsuspecting employees. Regular cyber security training helps your employees recognize threats, avoid malicious links, and follow good security practices (CNBC, 2016). A well-informed workforce is a very powerful shield to fight cyber threats.

Resources:

  1. CNBC (2016) Security Experts Talk Future of Cyber Security, YouTube. [Online]. [Retrieved on 29.01.2025].
  2. CIS (2020), Cybersecurity Best Practices, [Online]. Available at: https://www.cisecurity.org/cybersecurity-best-practices [Retrieved on 29.01.2025].
  3. Berkley (2020), Top 10 Secure Computing Tips, Berkley Information Security Office, [Online]. Available at: https://security.berkeley.edu/resources/best-practices-how-to-articles/top-10-secure-computingtips [Retrieved on 29.01.2025].
  4. com (2025). Top Practices of cyber security, Retrieved from:https://www.psmpartners.com/blog/cybersecurity-best-practices-for-small-businesses/ [Retrieved on 29.01.2025].

1.2: Radio Frequency Identification Device (RFID) cards

Denial of Service (DoS) attacks are generally aimed at making services unavailable for consumers. This threat is brutally worse in the case of Distributed Denial of Service (DDoS) attacks which amplify these threats by making use of multiple compromised devices. Such attacks are possible in critical infrastructures like power grids, communication networks, nuclear plants, etc., and are carried out through remote terminal units (RTUs) and programmable logic controllers (PLCs) (Naveen et al., 2013). An overloaded RTU can cause an operation to stop and that failure is catastrophic. Attack methods include brute force attacks, continuous staring of a system in the face until it surrenders, buffer overflow or system crashing due to an unwelcome load of data, and rootkits that exploit application vulnerabilities to break in.

Radio Frequency Identification Device

Figure 2: Radio Frequency Identification Device

However, such attacks are protected by intrusion detection systems (IDS), rate-limiting mechanisms, firewalls, and other AI-driven monitoring tools that can recognize malicious traffic. Radio Frequency Identification (RFID) technology, which is ubiquitous for access control and payment systems, is also vulnerable to cloning, skimming, and eavesdropping (Siani Pearson and George, 2013). Elliptic Curve Cryptography (ECC) is strongly suited for low-power RFID tags, leading to the use of ECC for identity verification and similar RFC decks. Secrete requirements, power constraints, and application sensitivity determine which encryption method to select.

Resources:

  1. Siani Pearson and George Yee (2013), Privacy and security for cloud computing -. London, [Retrieved on 29.01.2025].
  2. Naveen Chilamkurti, Sherali Zeadally, and Hakima Chaouchi (2013), Next -generation wireless technologies . London: Springer, [Retrieved on 29.01.2025].
  3. com (2024). Radio Frequency Identification Device, Retrieved from: https://cyberhoot.com/cybrary/radio-frequency-identification-rfid/ [Retrieved on 29.01.2025].

1.3: DoS attack

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks threaten digital systems greatly, leaving the services unavailable to legitimate users. Because these attacks can distort system integrity and reliability, they can support unauthorized access, financial loss, and operational failures. The different ways that cyber attackers get control over targeted systems involve methods like phishing, SQL injection, and web cross-site scripting.

Example: Mirai Botnet Attack

In 2016 the Mirai botnet launched a large-scale DDoS against Dyn, one of the largest DNS providers. IoT devices harboring malware were used in an attack that created a botnet of malware vehicles all to flood Dyn’s servers with traffic, making a majority of their websites inaccessible across the internet (Prajapati et al., 2014). The flashpoint here lies in the fact that the attack took advantage of weak passwords in IoT devices which shows how sloppy and dangerous positively insecure security practices can be in connected systems.

Threats Associated with DoS and DDoS Attacks

DoS and DDoS attacks exploit system vulnerabilities using various techniques:

  1. By sending extra data to an application, attackers make it crash, this is called Buffer Overflow.
  2. Unauthorized Duplication of Credentials (RFID tags) – Cloning and Replication can compromise the use of secure access due to duplication of credentials.
  3. Attackers: Backdoor Exploitation – Backdoor Exploitation is when attackers put in the backdoors bypassing authentication.
  4. A network of compromised devices (bots) used to spew out massive amounts of traffic to take down a target system is called the botnet.

Impact on Critical Infrastructure

Remote terminal units (RTUs) and programmable logic controllers (PLCs) are excellent targets for denial of service (DoS) attacks and can have devastating consequences for power grids, communication networks, and nuclear plants. Preventing access to RTUs may result in physical damage, and interruption to critical services, as dangerous to public safety (Puri and Dukatz, 2015). An attack against financial institutions could also cause unauthorized use of bank transfers, data breaches, or compromise of financial integrity.

Preventive Measures and Solutions

Security Measure Description
Strong Access Controls and Authentication

Multi-factor authentication (MFA) prevents brute-force attacks. Strong password policies reduce unauthorized access risks (Omotunde and Ahmed, 2023).

Traffic Filtering and Rate Limiting Intrusion Prevention Systems (IPS) and firewalls block malicious traffic. Rate limiting restricts excessive requests from a single IP (El et al., 2022).
Secure Software Development Practices Regular updates fix vulnerabilities. Input validation prevents SQL injection and buffer overflow (Rindell et al., 2021).
DDoS Mitigation Services Cloud-based services (Cloudflare, AWS Shield) absorb attacks. Load balancing distributes traffic to reduce impact (Karnani and Shakya, 2023).
IoT Security Enhancements Changing default IoT credentials prevents botnet attacks. RFID encryption secures access control systems (Pandey et al., 2022).

Table 1: Preventive Measures and Solutions

Specifically, the table describes five essential security measures that can help prevent and mitigate cyber-attacks, including Denial of Service (DoS) and Distributed Denial of Service (DDoS). Multi-factor authentication (MFA) and strong password policies along with strong access controls (that prevent unauthorized access) are strong controls. Cloudflare and AWS Shield are DDoS mitigation services that take on attack traffic, and IoT security enhancements include changing default credentials and encrypting RFID-based systems so that no one can gain unauthorized access or infect the system with a botnet.

DDos Attack

Figure 3: DDos Attack

A Distributed Denial-of-Service (DDoS) attack is shown in the above figure which uses many bot-controlled devices against a web application or service. The attack starts at the top, an entity we call 'Attacker' does not directly interact with the target. Instead, the attacker directs a network of compromised bots, displayed as red robotic icons, to regularly and repeatedly make malicious requests at a central target, pictured as 'index.php'. It was likely a script running a web app on a server that started overflowing with incoming traffic and overloading it, causing the performance to drop or the app to be inaccessible entirely. 

The result of this attack was a legitimate user, a human figure labeled Targeted Victim could not access a web service (Mittal et al., 2023). The botnet generates an excessive number of requests which effectively block or slow legitimate access to online services, causing disruptions to the online services. The above image well illustrates how DDoS attacks typically operate to attack a company, websites, and all other online platforms. There are traffic filtering, rate limiting, botnet detection, and DDoS protection services such as Cloudflare or AWS Shield which help absorb and distribute attack traffic, but keep service available for legitimate users.

Resources:

  1. Prajapati, N.M., & Mishra, A. and, Bhanodia, P. (2014) Literature survey - ids for ddos attacks . Available from: IT in Business, Industry and Government (CSIBIG) online. https://ieeexplore.ieee.org/document/7056943?arnumber=7056943[Retrieved on 29.01.2025].
  2. Puri, C. and& Dukatz, C. (2015) Analyzing and Predicting Security Event Anomalies: Lessons Learned from a Large Enterprise Big Data Streaming Analytics Deployment, pp. 152-158. Ain Proceedings of IEEE 26th International Workshop on Database and Expert Systems Applications (DEXA), [Retrieved on 29.01.2025].
  3. Omotunde, H. and Ahmed, M., 2023. A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond. Mesopotamian Journal of CySecurity, 2023, pp.115-133.https://www.iasj.net/iasj/download/9ac0ae2ed78bc24c [Retrieved on 29.01.2025].
  4. El Kamel, A., Eltaief, H. and Youssef, H., 2022. On-the-fly (D) DoS attack mitigation in SDN using Deep Neural Network-based rate limiting. Computer Communications, 182, pp.153-169.https://www.sciencedirect.com/science/article/pii/S0140366421004308[Retrieved on 29.01.2025].
  5. Karnani, S. and Shakya, H.K., 2023. Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy. Information Security Journal: A Global Perspective, 32(6), pp.444-468.https://www.tandfonline.com/doi/abs/10.1080/19393555.2022.2111004[Retrieved on 29.01.2025].
  6. Pandey, J.K., Jain, R., Dilip, R., Kumbhkar, M., Jaiswal, S., Pandey, B.K., Gupta, A. and Pandey, D., 2022. Investigating role of iot in the development of smart application for security enhancement. In IoT Based Smart Applications (pp. 219-243). Cham: Springer International Publishing.https://link.springer.com/chapter/10.1007/978-3-031-04524-0_13[Retrieved on 29.01.2025].
  7. Mittal, M., Kumar, K. and Behal, S., 2023. Deep learning approaches for detecting DDoS attacks: A systematic review. Soft computing, 27(18), pp.13039-13075.https://link.springer.com/article/10.1007/s00500-021-06608-1[Retrieved on 29.01.2025].
  8. Rindell, K., Ruohonen, J., Holvitie, J., Hyrynsalmi, S. and Leppänen, V., 2021. Security in agile software development: A practitioner survey. Information and Software Technology, 131, p.106488.https://www.sciencedirect.com/science/article/pii/S0950584920302305 [Retrieved on 29.01.2025].

1.4: Cloud vs local

At this time, cloud storage vs local storage is a choice that we have to consider especially about the issue of cybersecurity. Scalability, ease of use, and remote accessibility are all things that cloud platforms provide, whereas local storage also has more control and security advantages. Recent cyber-attacks on cloud-based services, however, have raised fears over their reliability and security. In this discussion, we discuss the pros and cons of cloud storage versus local storage and the cybersecurity implications.

Advantages of Cloud Storage in Cybersecurity

Scalability and Accessibility

Cloud services also enable people to view or use their data from anywhere and at any time. This is ideal for working with remote people and a global team. Yet, cloud platforms are a lot better than local storage as they allow seamless integration with several devices that do not necessarily need physical access or network-dependent solutions.

Security Measures by Cloud Providers

Cloud services such as AWS, Google Cloud, and Microsoft Azure put a lot of work into security infrastructure like encryption, firewalls, AI-driven threat detection, and multi-factor authentication (MFA). The latest in advanced defences offers a level of security that may prove challenging to replicate from non-premises local storage solutions.

Cost-Effectiveness

It saves money on hardware maintenance, power consumption, and IT personnel. For organizations using solutions on the cloud, they can adjust their storage needs on the fly, paying only for what they use, instead of investing in large infrastructure (Wheeler, 2015).

Security Risks of Cloud Storage

Data Breaches and Unauthorized Access

Being Internet-accessible, cloud storage is a favourite target for cybercriminals, hackers, and insider threats. Even a major cloud provider can’t be invincible, as evidenced by high-profile cloud breaches, such as the Capital One data breach in 2019, where even a major cloud provider can’t be invincible (Siciliano, 2019).

Dependence on Third-Party Security

Organizations that place trusted data in the hands of cloud providers require additional security on the external side. One example is a massive data leak in the cloud through a small misconfiguration in cloud settings (e.g., publicly exposed S3 buckets) of which the organization might not even be aware.

Regulatory Compliance Issues

Finances, healthcare, legal, government agencies … the industries that deal with sensitive data have to abide by rules such as GDPR, HIPAA, and PCI-DSS. For such sectors that have to deal with specific regulations, cloud storage might not always be the best choice, and local storage remains a preferable choice (Wu and Irwin, 2013).

Downtime and Service Outages

So, from time to time, the outages at cloud providers make data temporarily inaccessible. Cloud platforms are dependent upon internet connectivity, and the uptime of their provider, and unlike local storage, are not always operational unless physically damaged.

Resources:

  1. Wheeler, A. (2015), Cloud storage security: a practical guide . Amsterdam: Elsevier, [Retrieved on 29.01.2025].
  2. Wu, C. and& Irwin, D. (2013) Introduction to Computer Networks and Cybersecurity : CRC Press, [Retrieved on 29.01.2025].
  3. Siciliano, Robert (2019), Cybersecurity Best Practices for Protecting Your Company's Data, Small Business, [Online]. Available at: https://www.thebalancesmb.com/best-cyber-security-practices-for-your-company-4158800 [Retrieved on 29.01.2025].

1.5: WannaCry

In 2017 the WannaCry ransomware attack exploited vulnerabilities in outdated Windows systems which encrypted files and demanded ransom. To prevent such attacks, the following security measures should be taken: 

With Software Updates Available:

  • You should update and patch OS as required and applications regularly.
  • Keep your network updated automatically for any security fixes as they happen. 

Without Software Updates Available:

  • Don’t enable SMBv1 protocol which was exploited by WannaCry.
  • Separate the network and isolate the vulnerable systems (Algarni,2021).
  • Perform offline backups to restore data should an attacker attack your server.
  • Remove admin privileges and limit internet exposure.

These strategies are combined and mitigate ransomware risks greatly.

Resources:

  1. Algarni, S., 2021. Cybersecurity attacks: Analysis of “wannacry” attack and proposing methods for reducing or preventing such attacks in future. In ICT Systems and Sustainability: Proceedings of ICT4SD 2020, Volume 1 (pp. 763-770). Springer Singapore.https://link.springer.com/chapter/10.1007/978-981-15-8289-9_73

at: https://www.youtube.com/watch?v=lftSPF7bQOI [Retrieved on 29.01.2025].

1.6: Backup

The Importance of Backup Systems in Cybersecurity

In cybersecurity, the backup system is the things which are important to cyber threats of ransomware, failure of hardware, and accidental deletion which is the availability, integrity, and recovery of it in this situation. As part of risk management and disaster recovery planning, all cybersecurity frameworks such as NIST, ISO 27001, and CIS Controls include a backup strategy (Little, 2007). A good backup system reduces downtime, keeps your data safe, and guarantees your business goes on during a cyber incident. 

For a large organization with multiple offices, an enterprise-level backup strategy should include: 

  • 3-2-1 Backup Rule Maintain three copies of data one on each of two different storage types and two offsite/cloud-based.
  • Geo Redundant Cloud Storage is storing backups in multiple locations for you in case of a disaster in the region.
  • Isolated Backups cannot encrypt these isolated backups, called Air-Gapped Backups.
  • Immediate recovery options within cybersecurity response plans: Incident response integration.

Integrating backup strategies with cybersecurity frameworks allows organizations to reduce cyber threats, regain from attacks quickly, and safeguard critical business operations as a way to be resilient against the changing cyber risks.

Resources:

  1. Little, D.B. (2007) Digital data integrity: the evolution from passive protection to active

management - . Chichester: John Wiley [Retrieved on 29.01.2025].

1.7: Password recovery

Online Service Password Reset Procedure Potential Attack Vectors
Microsoft Outlook Verification via email, SMS, or authenticator app; may require previous passwords or security questions; 2FA adds extra security. Phishing for verification codes, SIM swapping to intercept SMS OTPs, and email hijacking for recovery email access (Sethuraman et al., 2024).
Amazon Password reset via email or SMS; additional verification may include billing details or security questions; 2FA is required for high-risk logins. Email/phone compromise, social engineering to manipulate customer support, brute force on security questions.
Instagram Reset via email, SMS, or linked Facebook account; may require photo verification for unusual logins; trusted devices may skip steps. SIM hijacking to intercept SMS codes, credential stuffing using leaked passwords, and fake recovery requests targeting Facebook accounts (Faircloth et al., 2022).

Table 2: Comparison of Password Recovery Procedures and Security Risks

Comparison of password recovery methods as well as safety risks of Microsoft Outlook, Amazon, and Instagram are made on the table and the way each platform deals with password resets as well as conceivable dangers for extortionists are explained. Password resets via email, SMS, an authenticator app, or questions/successful password verification will be supported via Microsoft Outlook with additional security layers like security questions or previous password verification. Where Two Factor Authentication (2FA) has been enabled, users need to add an OTP for added security. But, as with SIM swapping and email hijacking, this process is susceptible to being attacked using phishing (Zhao et al., 2021). The high-risk accounts need additional verification like their billing information, which means that Amazon uses email or SMS verification for password resets.

This makes security stronger but is still susceptible to email, phone, social engineering, or brute force attacks on security questions. There are also attempts to trick customer support into resetting passwords. There are various reset options available, including email, SMS, and Facebook links. Photo verification is used for suspicious logins as well. With these measures, Instagram remains susceptible to SIM hijacking where attackers intercept SMS codes credential stuffing, where passwords are reused from leaked accounts, and fake recovery requests are sent to your linked accounts. Both 2FA and strong passwords, and secured recovery email add substantially to the protection afforded by the multi-layered authentication employed by all three services.

Resources:

  1. Sethuraman, S.C., VS, D.P., Reddi, T., Reddy, M.S.T. and Khan, M.K., 2024. A comprehensive examination of email spoofing: Issues and prospects for email security. Computers & Security, 137, p.103600.https://www.sciencedirect.com/science/article/pii/S0167404823005102

Springer, [Retrieved on 29.01.2025].

  1. Faircloth, C., Hartzell, G., Callahan, N. and Bhunia, S., 2022, June. A study on brute force attack on T-mobile leading to SIM-hijacking and identity-theft. In 2022 IEEE World AI IoT Congress (AIIoT) (pp. 501-507). IEEE.https://ieeexplore.ieee.org/abstract/document/9817175/ [Retrieved on 29.01.2025].
  2. Zhao, J., Ding, B., Guo, Y., Tan, Z. and Lu, S., 2021, October. SecureSIM: rethinking authentication and access control for SIM/eSIM. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking (pp. 451-464).https://dl.acm.org/doi/abs/10.1145/3447993.3483254 [Retrieved on 29.01.2025].

References

  • Algarni, S., 2021. Cybersecurity attacks: Analysis of “wannacry” attack and proposing methods for reducing or preventing such attacks in future. In ICT Systems and Sustainability: Proceedings of ICT4SD 2020, Volume 1 (pp. 763-770). Springer Singapore.https://link.springer.com/chapter/10.1007/978-981-15-8289-9_73 Available at: https://www.youtube.com/watch?v=lftSPF7bQOI [Retrieved on 29.01.2025].
  • Berkley (2020), Top 10 Secure Computing Tips, Berkley Information Security Office, [Online]. Available at: https://security.berkeley.edu/resources/best-practices-how-to-articles/top-10-secure-computingtips [Retrieved on 29.01.2025].
  • CIS (2020), Cybersecurity Best Practices, [Online]. Available at: https://www.cisecurity.org/cybersecurity-best-practices , [Retrieved on 29.01.2025].
  • CNBC (2016) Security Experts Talk Future of Cyber Security, YouTube. [Online]. Available
  • cyberhoot.com (2024). Radio Frequency Identification Device, Retrieved from: https://cyberhoot.com/cybrary/radio-frequency-identification-rfid/ [Retrieved on 29.01.2025].
  • El Kamel, A., Eltaief, H. and Youssef, H., 2022. On-the-fly (D) DoS attack mitigation in SDN using Deep Neural Network-based rate limiting. Computer Communications, 182, pp.153-169.https://www.sciencedirect.com/science/article/pii/S0140366421004308, [Retrieved on 29.01.2025].
  • Faircloth, C., Hartzell, G., Callahan, N. and Bhunia, S., 2022, June. A study on brute force attack on T-mobile leading to SIM-hijacking and identity-theft. In 2022 IEEE World AI IoT Congress (AIIoT) (pp. 501-507). IEEE.https://ieeexplore.ieee.org/abstract/document/9817175/ [Retrieved on 29.01.2025].
  • Karnani, S. and Shakya, H.K., 2023. Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy. Information Security Journal: A Global Perspective, 32(6), pp.444-468.https://www.tandfonline.com/doi/abs/10.1080/19393555.2022.2111004 [Retrieved on 29.01.2025].
  • Little, D.B. (2007) Digital data integrity: the evolution from passive protection to active
  • management - . Chichester: John Wiley, [Retrieved on 29.01.2025].
  • Mittal, M., Kumar, K. and Behal, S., 2023. Deep learning approaches for detecting DDoS attacks: A systematic review. Soft computing, 27(18), pp.13039-13075.https://link.springer.com/article/10.1007/s00500-021-06608-1 [Retrieved on 29.01.2025].
  • Naveen Chilamkurti, Sherali Zeadally, and Hakima Chaouchi (2013), Next -generation wireless technologies . London: Springer, [Retrieved on 29.01.2025].
  • Omotunde, H. and Ahmed, M., 2023. A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond. Mesopotamian Journal of CyberSecurity, 2023, pp.115-133.https://www.iasj.net/iasj/download/9ac0ae2ed78bc24c [Retrieved on 29.01.2025].
  • Pandey, J.K., Jain, R., Dilip, R., Kumbhkar, M., Jaiswal, S., Pandey, B.K., Gupta, A. and Pandey, D., 2022. Investigating role of iot in the development of smart application for security enhancement. In IoT Based Smart Applications (pp. 219-243). Cham: Springer International Publishing.https://link.springer.com/chapter/10.1007/978-3-031-04524-0_13 [Retrieved on 29.01.2025].
  • Prajapati, N.M., & Mishra, A. and, Bhanodia, P. (2014) Literature survey - ids for ddos attacks . Available from: IT in Business, Industry and Government (CSIBIG) online. https://ieeexplore.ieee.org/document/7056943?arnumber=7056943[Retrieved on 29.01.2025].
  • psmpartners.com (2025). Top Practices of cyber security, Retrieved from:https://www.psmpartners.com/blog/cybersecurity-best-practices-for-small-businesses/ [Retrieved on 29.01.2025].
  • Puri, C. and& Dukatz, C. (2015) Analyzing and Predicting Security Event Anomalies: Lessons Learned from a Large Enterprise Big Data Streaming Analytics Deployment, pp. 152-158. Ain Proceedings of IEEE 26th International Workshop on Database and Expert Systems Applications (DEXA), [Retrieved on 29.01.2025].
  • Rindell, K., Ruohonen, J., Holvitie, J., Hyrynsalmi, S. and Leppänen, V., 2021. Security in agile software development: A practitioner survey. Information and Software Technology, 131, p.106488.https://www.sciencedirect.com/science/article/pii/S0950584920302305 [Retrieved on 29.01.2025].
  • RSA Conference (2019), A View from the Front Lines of Cybersecurity, YouTube [Online]. Available at: https://www.youtube.com/watch?v=7EH7ehAY3_w [Retrieved on 29.01.2025].
  • Sethuraman, S.C., VS, D.P., Reddi, T., Reddy, M.S.T. and Khan, M.K., 2024. A comprehensive examination of email spoofing: Issues and prospects for email security. Computers & Security, 137, p.103600.https://www.sciencedirect.com/science/article/pii/S0167404823005102 [Retrieved on 29.01.2025].
  • Siani Pearson and George Yee (2013), Privacy and security for cloud computing -. London, [Retrieved on 29.01.2025].
  • Siciliano, Robert (2019), Cybersecurity Best Practices for Protecting Your Company's Data, Small Business, [Online]. Available at: https://www.thebalancesmb.com/best-cyber-security-practices-for-your-company-4158800 [Retrieved on 29.01.2025].
  • Wheeler, A. (2015), Cloud storage security: a practical guide . Amsterdam: Elsevier, [Retrieved on 29.01.2025].
  • Wu, C. and& Irwin, D. (2013) Introduction to Computer Networks and Cybersecurity : CRC Press, [Retrieved on 29.01.2025].
  • Zhao, J., Ding, B., Guo, Y., Tan, Z. and Lu, S., 2021, October. SecureSIM: rethinking authentication and access control for SIM/eSIM. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking (pp. 451-464).https://dl.acm.org/doi/abs/10.1145/3447993.3483254 [Retrieved on 29.01.2025].
  • Lorem ipsum dolor sit amet, nonumes voluptatum mel ea, cu case ceteros cum. Novum commodo malorum vix ut. Dolores consequuntur in ius, sale electram dissentiunt quo te. Cu duo omnes invidunt, eos eu mucius fabellas. Stet facilis ius te, quando voluptatibus eos in. Ad vix mundi alterum, integre urbanitas intellegam vix in.
  • Eum facete intellegat ei, ut mazim melius usu. Has elit simul primis ne, regione minimum id cum. Sea deleniti dissentiet ea. Illud mollis moderatius ut per, at qui ubique populo. Eum ad cibo legimus, vim ei quidam fastidii.
  • Quo debet vivendo ex. Qui ut admodum senserit partiendo. Id adipiscing disputando eam, sea id magna pertinax concludaturque. Ex ignota epicurei quo, his ex doctus delenit fabellas, erat timeam cotidieque sit in. Vel eu soleat voluptatibus, cum cu exerci mediocritatem. Malis legere at per, has brute putant animal et, in consul utamur usu.
  • Te has amet modo perfecto, te eum mucius conclusionemque, mel te erat deterruisset. Duo ceteros phaedrum id, ornatus postulant in sea. His at autem inani volutpat. Tollit possit in pri, platonem persecuti ad vix, vel nisl albucius gloriatur no.
  • Ea duo atqui incorrupte, sed rebum regione suscipit ex, mea ex dicant percipit referrentur. Dicat luptatum constituam vix ut. His vide platonem omittantur id, vel quis vocent an. Ad pro inani zril omnesque. Mollis forensibus sea an, vim habeo adipisci contentiones ad, tale autem graecis ne sit.
  • Lorem ipsum dolor sit amet, nonumes voluptatum mel ea, cu case ceteros cum. Novum commodo malorum vix ut. Dolores consequuntur in ius, sale electram dissentiunt quo te. Cu duo omnes invidunt, eos eu mucius fabellas. Stet facilis ius te, quando voluptatibus eos in. Ad vix mundi alterum, integre urbanitas intellegam vix in.
  • Eum facete intellegat ei, ut mazim melius usu. Has elit simul primis ne, regione minimum id cum. Sea deleniti dissentiet ea. Illud mollis moderatius ut per, at qui ubique populo. Eum ad cibo legimus, vim ei quidam fastidii.
  • Quo debet vivendo ex. Qui ut admodum senserit partiendo. Id adipiscing disputando eam, sea id magna pertinax concludaturque. Ex ignota epicurei quo, his ex doctus delenit fabellas, erat timeam cotidieque sit in. Vel eu soleat voluptatibus, cum cu exerci mediocritatem. Malis legere at per, has brute putant animal et, in consul utamur usu.
  • Te has amet modo perfecto, te eum mucius conclusionemque, mel te erat deterruisset. Duo ceteros phaedrum id, ornatus postulant in sea. His at autem inani volutpat. Tollit possit in pri, platonem persecuti ad vix, vel nisl albucius gloriatur no.
  • Ea duo atqui incorrupte, sed rebum regione suscipit ex, mea ex dicant percipit referrentur. Dicat luptatum constituam vix ut. His vide platonem omittantur id, vel quis vocent an. Ad pro inani zril omnesque. Mollis forensibus sea an, vim habeo adipisci contentiones ad, tale autem graecis ne sit.
Merry Christmas Sale up to 60% off on all services

×
Securing Higher Grades Costing Your Pocket? Book Your Assignment At The Lowest Price Now!
X