Abstract

In the Digital World cyber-attack has become a routine activity, and prudence lies in how to manage this without losing focus on prime business activities. On one side technologies and competition is atempting business to try new things to develop effectiveness on the other side data is becoming a threat at various levels. Threat perception has really created stress on systems, and considerable investment is forced to make on IT infrastructure and policy making. In this system whole system is strong in terms of operations and fragile in terms of maintaining the sanctity of the data. Keywords: Cyber Attacks, Cyber Security, IT Infrastructure and IT Policy.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.