Chapter 5 Activity 1 The following chapter summarizes Protecting information resources and the impacts . Understand cybercrime and its impact on the global economy. First we need to comprehend the word cybercrime to comprehend this idea what is cybercrime alludes to term for criminal offenses including wholesale fraud, web misrepresentation, and hacking that incorporate the utilization of computerized innovation. It significantly affects the world economy, with. Cyberattacks can possibly stop tasks, hurting an organization's image and losing clients. Protected innovation burglary: Delicate information is taken by cybercriminals, sabotaging rivalry and development. Threats to the nation's security: Cyberattacks have the potential to compromise government and essential infrastructure systems. Because of its dependence on computerized innovation, the worldwide economy is defenseless to cybercrime. Cybersecurity must be given top priority by individuals, organizations, and governments in order to reduce cybercrime. Describe information technologies that could be used in computer crimes. There are different data advancements which can be utilized in PC wrongdoing presently let notice this data innovations Networks: Hackers use networks to steal data, spread malware, and gain unauthorized access. Internet: Fraud, the spread of malware, and illegal content are all carried out via the internet by cybercriminals. Software: Systems are compromised, data is stolen, and operations are disrupted by malicious software (malware). Data sets: Hoodlums target data sets to take delicate data, like monetary information or individual recognizable data. Cloud Computing: It is possible to compromise cloud services, which can result in data breaches and unauthorized access. Cell phones: Cell phones are defenseless against hacking, snoopping, and malware assaults. Encryption: Hoodlums use encryption to hide criminal operations, like information burglary and blackmail. Describe basic safeguards in computer and network security Firewalls use security rules to regulate both incoming and outgoing network traffic. Strong Passwords: Use multi-factor authentication and complex, one-of-a-kind passwords. Software Updates: Patch vulnerabilities by regularly updating software, firmware, and operating systems. Antivirus Programming: Introduce and routinely update antivirus projects to distinguish and eliminate malware. Encryption: Encryption safeguards data, particularly sensitive information. Network Division: Gap networks into more modest portions to lessen assault surfaces. Observing: Consistently screen frameworks and organizations for dubious action. Client Instruction: Train clients on security best practices and strategies Identify the nine most common intentional security levels The nine most common intentional levels which play an important role 1. 2. 3. 4. 5. 6. 7. 8. 9. Data Encryption Authentication Authorization Intrusion Detection and Prevention Firewall Configuration Access Control Lists (ACLs) Secure Communication Protocols Regular Security Updates and Patching Identity and Access Management (IAM) Describe the nine security measures and enforcement that a comprehensive security system should include short explanation 1. Access Control: Limiting admittance to delicate regions, information, and frameworks to approved staff. 2. Passwords, biometrics, or smart cards are used to verify user identities in authentication. 3. Approval: Giving admittance to assets in view of client jobs, honors, or consents. 4. Encryption: Using safe encryption algorithms to safeguard data while it is in motion and at rest. 5. Interruption Recognition and Counteraction: Checking for and impeding potential security dangers progressively. 6. Firewall Setup: Arranging firewalls to control approaching and active organization traffic. 7. Occurrence Response: Having an arrangement set up to answer rapidly and really in the event of a security break. 8. Normal Security Reviews and Chance Appraisals: Recognizing weaknesses and evaluating dangers to focus on security endeavors. 9. Security Mindfulness Preparing: Teaching clients on security best practices and approaches to forestall human-blunder breaks. Requirement incorporates: Carrying out security strategies and methods .Performing regular vulnerability assessments and security testing .Enforcing password policies and account management .Observing framework logs and organization traffic .Answering security occurrences and breaks Summarize the guidelines for a comprehensive security system including business continuity planning. Security precautions: 1. Access Control 2. Authentication 3. Authorization 4. Encryption 5. Prevention and Detection of Intrusions 6. Firewall Setup 7. Response to an Event 8. Risk assessments and regular security inspections 9. Training in Security Awareness Business Coherence Arranging (BCP): 1. Identify Processes and Critical Assets 2. Survey Dangers and Dangers 3. Foster Recuperation Procedures 4. Plan for Disaster Recovery 5. Establish Methods of Communication 6. Train Workers and Test the Arrangement 7. Constantly Survey and Update the Arrangement Guidelines: 1. Execute a layered security approach 2. Test and conduct security checks on a regular basis. 3. Foster occurrence reaction and catastrophe recuperation plans 4. Train workers on security best practices 5. Ceaselessly screen and update safety efforts 6. Incorporate business coherence arranging in by and large security system 7. Guarantee consistence with applicable guidelines and norms