Types of cyber security tools edited

pptx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

1974

Subject

Information Systems

Date

Nov 24, 2024

Type

pptx

Pages

11

Uploaded by MateRook1443

Report
Types of cyber security tools Name Instructor Course Date
Cyber security experts use variety of tools to ensure that their devices and systems are well protected. These tools are used to evaluate network data and identify network based threats. Network based threats are introduced and controlled remotely (Zwilling et al., 2022). An example of network-based threats is denial of service attack which causes traffic in a system and affects the normal operations of the system. Phishing especially through emails is one of the network security threats where the attacker gains access through the email or exploits other vulnerabilities in a device. Network Security Monitoring Tools.
Encryption tools are used to protect data by editing text to make it complex to unauthorized individuals. Encrypting data ensures the confidentiality and privacy of data is protected. The encrypted data is only understood by the intended viewer of the content. Some of the encryption tools include TrueCrypt and VeraCrypt. Encryption Tools.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Websites also require thorough scanning to identify vulnerabilities that are likely to be utilized by hackers. Websites are mainly used for research, it is important if the sites remain secure since they contain sensitive data for users (Zhang-Kennedy & Chiasson, 2021). Some of the vulnerabilities include SQL injection and cross-site scripting. Cyber security experts use tools such as Burp Suite, Nikto and SQLMap to detect the vulnerabilities. Web Vulnerability Scanning Tools.
Penetration testing or pen test is a security control tool that introduces an attack on computer system to scrutinize the security of the system. Penetration testing uses various types of attacks on system to identify the areas that have vulnerabilities in the system. This is because attackers exploit different types of malware to launch in a system until they gain access in the system. Penetration testing tools include; kali Linux, Wireshark, Metasploit and others. Peniterating Tools.
Antivirus software tools was developed and designed to identify or detect any kind of virus or malware in a device. Antivirus are installed in a computer system to scan all activities carried out in the system of any viruses. This software detects all types of viruses or malware such as malware, worms, spyware, adware and Trojans. An example of antivirus software is kasperky, MCAfee total protection. Antivirus Software.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
A firewall is a computer network security system that limits internet traffic in and out of the system within a private network. The firewall has four components that are built in. Network policy, progressive authentication, packet filtering and application gateways are the main components. An example of firewall security is Tufin, FireMon and Redseal. Firewall Tools.
Managed detection services is a security-as –a- service that evaluates and proactively identifies and eventually eliminates any cyber threats. The detected threats are triggered as an alarm that allows experts to investigate and determine any action if required before the threat occurs. Managed detections ensures that the all virus are handles immediately after detection. Many organizations outsources this services from third parties. Managed detection Services.
Diagram on cyber security Threats (Malware, DDoS, Spyware, SQL injection etc. …) Network security Monitorin g Services Encrypt ion Tools Web vulnerabili ty Scan Penetrat ion Testing Manage d Detecti on Service Antivirus Software
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber security tools are very important in ensuring that the safety and privacy of data is maintained. The security tools ensure that the system is well equipped with devices or software that can withstand any attack. Cyber security tools ensure that the system are protected to avoid damage incase of an attack. This also ensures that the normal operations of the system are fulfilled. Conclusion.
Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A systematic literature review on the cyber security. International Journal of scientific research and management, 9(12), 669-710. Zhang-Kennedy, L., & Chiasson, S. (2021). A systematic review of multimedia tools for cybersecurity awareness and education. ACM Computing Surveys (CSUR), 54(1), 1-39. Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. References.