ABSTRACT

The internet is one of the most widespread and fastest-growing areas of technological development. In today's era, many organizations like business, distributed technologies, cloud computing, and next generation are periodically changing. Cyber security management designs a model to define an organization's policies for information security. The relationship between the goals of information security is as follows: The model is based on three rules, i.e., Confidentiality, Integrity, and Availability commonly known as the CIA triad. The variation of the data using a laptop or a personal computer is shown in Figure 9.1b The graph shows the percentage of PCs estimated to have spyware/adware and the percentage of PCs lacking data protection. Passwords are known as secret words or phrases used by different organizations and multiple sites to identify the users. Passwords are unfortunately an enormous security threat since they are unprotected against being broken or speculated by an individual or program.