Types of cyber security tools edited
pptx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
1974
Subject
Information Systems
Date
Nov 24, 2024
Type
pptx
Pages
11
Uploaded by MateRook1443
Types of cyber security tools
Name
Instructor
Course
Date
Cyber security experts use variety of tools to ensure that their
devices and systems are well protected.
These tools are used to evaluate network data and identify
network based threats.
Network based threats are introduced and controlled remotely
(Zwilling et al., 2022).
An example of network-based threats is denial of service attack
which causes traffic in a system and affects the normal
operations of the system.
Phishing especially through emails is one of the network security
threats where the attacker gains access through the email or
exploits other vulnerabilities in a device.
Network Security Monitoring Tools.
Encryption tools are used to protect data by editing text
to make it complex to unauthorized individuals.
Encrypting data ensures the confidentiality and privacy
of data is protected.
The encrypted data is only understood by the intended
viewer of the content.
Some of the encryption tools include TrueCrypt and
VeraCrypt.
Encryption Tools.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Websites also require thorough scanning to identify
vulnerabilities that are likely to be utilized by hackers.
Websites are mainly used for research, it is important if
the sites remain secure since they contain sensitive data
for users (Zhang-Kennedy & Chiasson, 2021).
Some of the vulnerabilities include SQL injection and
cross-site scripting.
Cyber security experts use tools such as Burp Suite,
Nikto and SQLMap to detect the vulnerabilities.
Web Vulnerability Scanning Tools.
Penetration testing or pen test is a security control tool
that introduces an attack on computer system to
scrutinize the security of the system.
Penetration testing uses various types of attacks on
system to identify the areas that have vulnerabilities in
the system.
This is because attackers exploit different types of
malware to launch in a system until they gain access in
the system.
Penetration testing tools include; kali Linux, Wireshark,
Metasploit and others.
Peniterating Tools.
Antivirus software tools was developed and designed to
identify or detect any kind of virus or malware in a
device.
Antivirus are installed in a computer system to scan all
activities carried out in the system of any viruses.
This software detects all types of viruses or malware such
as malware, worms, spyware, adware and Trojans.
An example of antivirus software is kasperky, MCAfee
total protection.
Antivirus Software.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
A firewall is a computer network security system that
limits internet traffic in and out of the system within a
private network.
The firewall has four components that are built in.
Network
policy,
progressive
authentication,
packet
filtering
and
application
gateways
are
the
main
components.
An example of firewall security is Tufin, FireMon and
Redseal.
Firewall Tools.
Managed detection services
is a security-as –a- service
that evaluates and proactively identifies and eventually
eliminates any cyber threats.
The detected threats are triggered as an alarm that
allows experts to investigate and determine any action if
required before the threat occurs.
Managed detections ensures that the all virus are
handles immediately after detection.
Many organizations outsources this services from third
parties.
Managed detection Services.
Diagram on cyber security
Threats (Malware,
DDoS, Spyware,
SQL injection etc.
…)
Network
security
Monitorin
g
Services
Encrypt
ion
Tools
Web
vulnerabili
ty Scan
Penetrat
ion
Testing
Manage
d
Detecti
on
Service
Antivirus
Software
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber security tools are very important in ensuring that
the safety and privacy of data is maintained.
The security tools ensure that the system is well
equipped with devices or software that can withstand
any attack.
Cyber security tools ensure that the system are protected
to avoid damage incase of an attack.
This also ensures that the normal operations of the
system are fulfilled.
Conclusion.
Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A.
K. (2021). A systematic literature review on the cyber
security. International Journal of scientific research and
management, 9(12), 669-710.
Zhang-Kennedy, L., & Chiasson, S. (2021). A systematic
review of multimedia tools for cybersecurity awareness
and education. ACM Computing Surveys (CSUR), 54(1),
1-39.
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., &
Basim,
H.
N.
(2022).
Cyber
security
awareness,
knowledge and behavior: A comparative study. Journal of
Computer Information Systems, 62(1), 82-97.
References.