SlideShare a Scribd company logo
What are the essential outcomes of secure system retirement? Justify your position.
(Cybersecurity)
Solution
Computer security , also known as cybersecurity or IT security , is the protection of
information systems from theft or damage to thehardware, the software, and to the information
on them, as well as from disruption ormisdirection of the services they provide.
It includes controlling physical access to the hardware, as well as protecting against harm that
may come via network access, data and code injection, and due to malpractice by operators,
whether intentional,accidental, or due to thembeing tricked into deviating from secure
procedures.
The field is of growing importance due to the increasing reliance on computer systems in most
societies [4]
and the growth of"smart" devices, includingsmartphones, televisions and tiny
devices as part of theInternet of Things – and of the Internet and wireless network such as
Bluetoothand Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data
accessibility and machine learning to detect advanced persistent threats.

More Related Content

PPTX
Cyber security presentation by Mr Navneet baboo, RN College Hajipur.pptx
PDF
Cyber security
PPT
CS_Tuto.ppt
PPTX
Network Security Basics in networking to learn
PDF
information security introduction for campus students.pdf
PPT
Intro to Cyber Security Final in the field of CS
PPTX
SumitSingh51.pptx
PPTX
Information Security Bachelor in Information technology unit 1
Cyber security presentation by Mr Navneet baboo, RN College Hajipur.pptx
Cyber security
CS_Tuto.ppt
Network Security Basics in networking to learn
information security introduction for campus students.pdf
Intro to Cyber Security Final in the field of CS
SumitSingh51.pptx
Information Security Bachelor in Information technology unit 1

Similar to What are the essential outcomes of secure system retirement- Justify y.docx (20)

PDF
fundamental of IT Security and what is IT security
PPTX
Cyber security.pptx
PPTX
cybersecurity and its importance in digital era
PPTX
Information security FundameFundamentals.pptx
PDF
20210629_104540Information Security L1.pdf
PPTX
Cyber-Security-Unit-1.pptx
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
PPTX
Module 1Introduction to cyber security.pptx
PPTX
UNIT_1_-_Introduction_to_Cyber_Security_Updated.pptx
PPTX
CYBER SECURITY.pptx
PPT
cryptography and nwtwork security concepts.ppt
PPT
Module1_Intro to Security_Final.pptsssss
PPT
Module1_Intro to Security_Final.psfsdfsdpt
PPT
Cyber Security For Computer Science & Engineering.ppt
PPT
Module1_Intro to Security1111111_Final.ppt
PPT
Module1_Intro to Security_Final.ppt power point
PDF
IRJET- Cybersecurity: The Agenda for the Decade
PDF
I0516064
PDF
Ijcatr04061002
PPTX
Intro to cybersecurity concepts 20210813
fundamental of IT Security and what is IT security
Cyber security.pptx
cybersecurity and its importance in digital era
Information security FundameFundamentals.pptx
20210629_104540Information Security L1.pdf
Cyber-Security-Unit-1.pptx
Computer Securityyyyyyyy - Chapter 1.ppt
Module 1Introduction to cyber security.pptx
UNIT_1_-_Introduction_to_Cyber_Security_Updated.pptx
CYBER SECURITY.pptx
cryptography and nwtwork security concepts.ppt
Module1_Intro to Security_Final.pptsssss
Module1_Intro to Security_Final.psfsdfsdpt
Cyber Security For Computer Science & Engineering.ppt
Module1_Intro to Security1111111_Final.ppt
Module1_Intro to Security_Final.ppt power point
IRJET- Cybersecurity: The Agenda for the Decade
I0516064
Ijcatr04061002
Intro to cybersecurity concepts 20210813
Ad

More from loisj1 (20)

DOCX
What are the three reasons that the environment matters- Which of thos.docx
DOCX
What are the software security activities in the life cycle-SolutionTh.docx
DOCX
What are the ps command line options to view information about threads.docx
DOCX
What are the steps a company cant take to protext itself against the s.docx
DOCX
What are the risks common to financial institutions- liquidity- exchan.docx
DOCX
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
DOCX
What are the primary keys of the following table- Explain why the foll.docx
DOCX
What are the major differences between capitalism- communism- and soci.docx
DOCX
What are the issues involved in measurement in organizational developm.docx
DOCX
What are the key differences between Windows- Apple- and Linux-Solutio.docx
DOCX
What are the implications of unstructured data to database design- Sup.docx
DOCX
What are the income levels and infrastructure development of Mobius SL.docx
DOCX
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docx
DOCX
What are the equilibrium concentrations- And how do you solve it- What.docx
DOCX
What are the Disadvantages of IFRS (International Financial Reporting.docx
DOCX
What are the differences between a linked list and a stack-SolutionA S.docx
DOCX
what are the con-'s of virtual reality in specificSolutionDisadvantage.docx
DOCX
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
DOCX
What are some tax consequences related to a qualified pension plan- (P.docx
DOCX
What are some primary reasons why an embedded system developer would u.docx
What are the three reasons that the environment matters- Which of thos.docx
What are the software security activities in the life cycle-SolutionTh.docx
What are the ps command line options to view information about threads.docx
What are the steps a company cant take to protext itself against the s.docx
What are the risks common to financial institutions- liquidity- exchan.docx
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
What are the primary keys of the following table- Explain why the foll.docx
What are the major differences between capitalism- communism- and soci.docx
What are the issues involved in measurement in organizational developm.docx
What are the key differences between Windows- Apple- and Linux-Solutio.docx
What are the implications of unstructured data to database design- Sup.docx
What are the income levels and infrastructure development of Mobius SL.docx
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docx
What are the equilibrium concentrations- And how do you solve it- What.docx
What are the Disadvantages of IFRS (International Financial Reporting.docx
What are the differences between a linked list and a stack-SolutionA S.docx
what are the con-'s of virtual reality in specificSolutionDisadvantage.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are some tax consequences related to a qualified pension plan- (P.docx
What are some primary reasons why an embedded system developer would u.docx
Ad

Recently uploaded (20)

PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Hazard Identification & Risk Assessment .pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Cell Types and Its function , kingdom of life
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
Paper A Mock Exam 9_ Attempt review.pdf.
Hazard Identification & Risk Assessment .pdf
What if we spent less time fighting change, and more time building what’s rig...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
History, Philosophy and sociology of education (1).pptx
Chinmaya Tiranga quiz Grand Finale.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Cell Types and Its function , kingdom of life
LDMMIA Reiki Yoga Finals Review Spring Summer
Computing-Curriculum for Schools in Ghana
Orientation - ARALprogram of Deped to the Parents.pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Unit 4 Skeletal System.ppt.pptxopresentatiom

What are the essential outcomes of secure system retirement- Justify y.docx

  • 1. What are the essential outcomes of secure system retirement? Justify your position. (Cybersecurity) Solution Computer security , also known as cybersecurity or IT security , is the protection of information systems from theft or damage to thehardware, the software, and to the information on them, as well as from disruption ormisdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional,accidental, or due to thembeing tricked into deviating from secure procedures. The field is of growing importance due to the increasing reliance on computer systems in most societies [4] and the growth of"smart" devices, includingsmartphones, televisions and tiny devices as part of theInternet of Things – and of the Internet and wireless network such as Bluetoothand Wi-Fi. Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.