Professional Documents
Culture Documents
School of Commerce and Management
School of Commerce and Management
Management
Department of MBA
ROLL NO- 29
SESSION- 2023-2025
SUBJECT- COMPUTER APPLICATIONS FOR BUSINESS
1: Basics of Cybersecurity and its Importance
Consequences of a Cybersecurity
Breach: A breach can lead to
financial losses, reputational
damage, legal penalties, and loss of
customer trust. It can disrupt
business operations and expose
companies to liability.
Critical Industries/Sectors: Cybersecurity is particularly critical in
industries like finance, healthcare, government, and critical
infrastructure (e.g., energy, water). In these sectors, a breach can have
severe consequences for both the organization and the public.
1. Phishing:
- Description: Phishing is a
form of social engineering
where attackers send deceptive
emails or messages to trick
individuals into revealing
sensitive information, such as
login credentials or financial
details.
- Impact: Phishing can lead to identity theft, financial fraud, and data
breaches. It compromises company networks and puts sensitive data
at risk.
- Exploitation: Cybercriminals create fake websites and emails that
resemble legitimate sources to deceive users.
2. Malware:
- Description: Malware is malicious software designed to damage
or disrupt systems, steal data, or gain unauthorized access. Types of
malware include viruses, worms, and ransomware.
- Impact: Malware can cause data loss, financial damage, and
operational disruptions. Ransomware encrypts data and demands
payment for its release.
- Exploitation: Malware often spreads through infected email
attachments, downloads, or compromised websites.
3. Insider Threats:
- Description: Insider threats occur when current or former
employees misuse their access to data and systems to harm the
organization. This includes data theft and sabotage.
- Impact: Insider threats can lead to data breaches, financial losses,
and reputational harm. They can also disrupt business operations.
- Exploitation: Insiders may exploit their knowledge of the
company’s systems to bypass security measures and access sensitive
information.
1. Data Encryption:
- Strategy: Encrypting data
both in transit and at rest
ensures that even if intercepted,
the data remains unreadable
without the appropriate decryption key.
- Example: Many online banking platforms use encryption to
protect customer transactions.