logo

Cyber Risk Issues for the Charitable Operation

   

Added on  2022-08-15

6 Pages1100 Words15 Views
 | 
 | 
 | 
Running head: BREACH SCENARIO
Chapter 6 Breach Scenario
Name of the Student
Name of the University
Author’s Note:
Cyber Risk Issues for the Charitable Operation_1

1
BREACH SCENARIO
Cyber Risk Issues for the Charitable Operation
The organization of Aliceo Inc. has faced a major breakdown in communications
within one of the corporate lines of business and the cyber security team. Cyber security
could be referred to as the core practice to secure networks, programs and systems from
different digital attacks. Such distinct attacks are majorly aimed at accessing, destroying or
changing the sensitive information for coercion of money from distinct users and interrupting
usual business processes (Buczak & Guven, 2015). A proper deloyment of an effective
measure of cyber security is quite challenging, since there exists no devices than individual
and the attacks are turning extremely innovative.
Konovsky have checked the credentials of Bob Fake and discovers that the credentials
are false and he is not a real individual, but a computer generated ID, which was being
created by a specific website designing organization. Moreover, after quick scanning of the
website, several unencrypted usernames and passwords were found out for the Buenos Aires
based Aliceo Inc. employees, who have taken participation within the charitable initiative.
This came into account, when Konovsky searched about the scope of the breach and it
was found out that there was a new alert from the exfiltration from the respective Compliant
Resolution Group (Ben-Asher & Gonzalez, 2015). There are some of the most important and
significant techniques that can easily diminish the issues related to cyber security and these
techniques are provided in the following paragraphs:
i) Implementation of Firewalls: The first and the foremost effective measure for
mitigation of the cyber security risk within the charitable operations for Aliceo Inc. would be
successful implementation of firewalls. It is referred to as the most significant and
noteworthy protection of systems and networks from any type of unauthorized accessibility.
It is the specific system of network security, which monitors as well as controls the incoming
Cyber Risk Issues for the Charitable Operation_2

2
BREACH SCENARIO
and outgoing traffic on the basis of different previously determined security rules (Gupta,
Agrawal & Yamaguchi, 2016).
The firewall can easily establish a distinct barrier within any trusted internal network
as well as any untrusted external network like the Internet. These district firewalls could be
eventually categorize as either the network firewall or certain host based firewall. The
network firewall filters the traffic within 2 or more networks and then run on the respective
network hardware. Different host based firewall can also run over the host systems and then
manage the network traffic within the machines. As a result, it is referred to as one of the
most effective and efficient solution to the issue of communication breakdown and fake
identity.
Figure 1: Implementation of Firewall
(Source: Cherdantseva et al., 2016)
Cyber Risk Issues for the Charitable Operation_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mitigation Strategies for Distributed Denial of Service (DDoS) Attack
|7
|1857
|53

CYBER SECURITY.
|2
|312
|84

Implementation of Different Firewall Technologies: Advantages and Disadvantages
|6
|2344
|50

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61

Contemporary Cyber Security Issues
|11
|2056
|79