Abstract

Cyber security is the most important part of our technologically dependent lives today. Government institutions, financial firms, public and private services, nuclear power stations, power grid providers, water supplies or wastewater disposal corporations use information technology in their day-to-day activities. Anything that uses technology is focused on connectivity and computer networks, which ensures that it relies on cyber security. Every year, the public and private sectors spend millions of dollars on technology, protection tools and hardware that can improve cyber security within their businesses, but are still vulnerable. The key problem with this situation is that data defense is now generally viewed as a technological component or technology that can be quickly introduced within the enterprise, and this application would ensure cyber protection. This mentality needs to change, because cyber security is more than mere technology nowadays. This post presents the taxonomy of critical infrastructure threats, analyses attack vectors and attack tactics used to destroy critical infrastructure, as well as the most frequent cyber security failures that companies create in the area of cyber security while attempting to make themselves safer from vulnerabilities. The main purpose of this article is to include technical elements of the cyber security management model that can be used to ensure the protection of sensitive infrastructure in an enterprise or business. The network protection management model discussed in this article is examined from a management viewpoint and does not discuss the technical issues and products used to secure sensitive infrastructure from cyber security threats and vulnerabilities.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call