logo

Advance Security Techniques : Echrs Ltd

   

Added on  2022-09-02

15 Pages3951 Words16 Views
Running head: REPORT ON ADVANCE SECURITY TECHNIQUES
REPORT
ON
ADVANCE SECURITY TECHNIQUES
Name of the Student
Name of the University
Author Note:

ADVANCE SECURITY TECHNIQUES1
Introduction:
ECHRS Ltd is one of the telephone and web portal service provider that provides the
portal outsourcing services to its clients for enhancing the services of human resource
management as well as the payroll management throughout various sectors in Bradford. While
analyzing the organizational infrastructure it is identified that this organization consists of the
devices like desktop PCs with Windows XP to 101. Remote access to the devices and VoIP
telephony server as well. Along with this the data backup process is done with tape.
Followed by this investigation it has been noticed that in the organization performs there
activities based on the analysis of the large data which includes the several personal data of their
customers. Considering this concern they the organization has realized that they might attract any
intrusion thus, the have decided to analyze the organizational infrastructure, identified the
intrusion and mitigate them with possible actions2.
In order to support the investigation and the implementation of the appropriate mitigation
strategy this paper will help to identified that possible threats present in the organizational
structure and will also elaborate the impact of the identified threats related to the data breach.
Followed by the above identification it will then help to mitigate the identified threats with
immediate action3. Along with this identification it will further discuss about the possible threats
in which it will identify the vulnerabilities, the significance of exploitation as well as the tools of
demonstration.
1 Morgan, S., 2018. Preparing for the Canadian Data Breach Reporting Requirements. Int'l J. Data Protection
Officer, Privacy Officer & Privacy Couns., 2, p.8.
2 Rai, K., Devi, M.S. and Guleria, A., 2016. Decision tree based algorithm for intrusion detection. International
Journal of Advanced Networking and Applications, 7(4), p.2828.
3 Liu, L., Han, M., Wang, Y. and Zhou, Y., 2018, June. Understanding data breach: a visualization aspect.
In International Conference on Wireless Algorithms, Systems, and Applications (pp. 883-892). Springer, Cham.

ADVANCE SECURITY TECHNIQUES2
In consort with the above elaboration it will further discuss about the possible attack
vectors in which it will include an attack tree that consists of attack surface and attack vectors.
And after identifying the above vectors it will suggest effective mitigation strategies for those
vectors with methodologies and security principles. Lastly, this paper will consists an ICA
reflection where it will describe how these application may help in future.
Consequences & Impact of data breach:
After analyzing the organizational infrastructure of the nominated organization it has
been identified that it has faced a significant data breach which has effectively harmed that data
privacy of their clients. While analyzing the damage it is also identified that since, the primary
operation of the organization is being done with processing the client’s data thus, a major threat
of data breach has been identified in this scope4. The investigation has mentioned that in the
major impact of the data breach has mostly impacted the financial, legal as well as the business
of the nominated organization. Followed by this discussion the identified data breach
consequences and their impacts are mentioned below:-
Financial Impact-
While analyzing the organizational infrastructure of ECHRS Ltd., it is noticed that the
significance of the data breach has majorly impacted the field of accounts of the services
provider. Considering this aspect it is identified that due to the occurrence of data breach the
company has loses their accounts as the occurrence of data breach has cases a huge loss of data
which also consists the personal data of their customers and their many operational data thus, it
has significantly impacted their operations5. From this investigation it has been identified that
4 Khan, F.S., Kim, J.H., Moore, R.L. and Mathiassen, L., 2019. Data Breach Risks and Resolutions: A Literature
Synthesis.
5 Goode, S., Hoehle, H., Venkatesh, V. and Brown, S.A., 2017. User compensation as a data breach recovery action:
An investigation of the Sony PlayStation Network breach. MIS Quarterly, 41(3).

ADVANCE SECURITY TECHNIQUES3
due to the loss of these data and their operational strategy the company has failed to fulfill their
commitments which has caused a major loss in the business that has directly impacted the
financial aspect of ECHRS Ltd.
Legal Impact-
Along with the above considerations, since the organization is primarily based on
supporting their clients with telecommunication and web portal services thus, it consists as large
set of user data. It is very essential to protect those data for the organization with proper data
protection strategy. However, the organization does not seems to have any collaboration with the
GDPR that has influences the data breach incidence6. Hence, after analyzing this scenario it can
be stated that the occurrence of data breach has significantly violated the legal procedure of data
protection. As the organization has not incorporated with effective data protection strategy which
has caused major data breach.
Business Reputation-
Along with the above mentioned aspects it is identified that due to the occurrence of data
breach the organizational reputation will be significantly affected7. As for any organization it is
very essential to keep their information safe however which helps them to provide protection to
its organizational data. Considering this aspect it is identified that in data breach has majorly
taken the access of the personal data of the organization that has impacted the data privacy of its
users. Hence, it can be stated that it holds a major impact on the business reputation by losing the
customer trust.
6 SEissa, I.G., Ibrahim, J. and Yahaya, N., 2017. Cyberterrorism Definition Patterns and Mitigation Strategies: A
Literature Review. International Journal of Science and Research (IJSR), 6(1), pp.180-186.
7 Goliwale, P., Gupta, V., Johre, A. and Bendale, S., 2018. Intrusion detection system using data
mining. management, 5(03).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Corporate Security Management Report 2022
|10
|2173
|15

Network Forensics Assignment - Real Time Analysis
|8
|1506
|265

Next-Generation Cybertap For Corporate Intrusion Detection
|10
|4380
|172

IT Risk Assessment and Cyber Security Lead Consultant for Gigantic Corporation
|10
|3551
|91

Report on IT Governance | Study
|5
|780
|25

Report on Risk Management and Mitigation Plan
|6
|1401
|65