Skip main navigation

Feedback to scenarios

Having considered the risks and motives in previous steps, as well as your own experiences of cyber crime and cyber attacks, have a read of the following four case studies: …

Cyber threats & Responsibilities

Organisations should understand that cyber risks are inevitable and hence have to adopt a holistic approach to managing them. In addition to developing a robust IT infrastructure, care has to …

Risks

Most organisations and businesses today rely on IT systems for storing company and client information. They invest heavily in secure IT infrastructure to protect these data assets. While there are …

How are companies affected?

Continuing our look into the impact of cyber crime the report by the Centre for Strategic and International Studies (CSIS) (Lewis 2018) gives a rather concerning insight into the rise …

How big is the problem?

So, how big a problem is this? In July 2019 the UK governmental Department for Digital, Culture, Media & Sport released its Cyber security breaches survey 2019 report, a report …

Types of attackers

As the world embraces more digital and hyperconnected components, opportunities and paths become more numerous for attackers to gain access to our most sensitive information. Data breaches have become commonplace, …

Cyber threat: ransomware

So what is ransomware? For £5,000 I’ll tell you… That’s the key principle – it’s about holding information of value to you and only releasing this information in exchange for …

Cyber threat: malware

A cyber threat, or cyber security threat, is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats are a big deal. …

Data breaches

“Nearly 9 out of 10 large organisations surveyed now suffer some form of security breach – suggesting that these incidents are now a near certainty. Businesses should ensure they are …

Cyber security and your responsibilities

A growing number of entities that we interact with online collect and process our personal data, including online retailers, internet service providers, employers, banks, credit card companies, etc. Organisations use …

The cyber security landscape

Welcome to our course on the cyber security landscape, where we will explore cyber security management and look at the risks facing individuals and organisations. Cyber attacks and threats are …

Getting the most out of your learning

Coventry University believes that a good student experience is central to learning at a world class standard. To reflect our success we were recently awarded the title of University of …