Importance of Cybersecurity for ABCT

Verified

Added on  2023/03/17

|15
|3960
|94
AI Summary
This report discusses the importance of cybersecurity for ABCT, an Australian technology firm. It explores three security vulnerabilities in ABCT's system and five emerging threats that can affect the organization. Recommendations for protecting against cyberattacks are also provided.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: COIT20249 ASSESSMENT DETAILS
Coit20249 Assessment Details
Name of the Student
Name of the University
Author Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1COIT20249 ASSESSMENT DETAILS
Executive Summary
ABCT is an Australian technology firm that comes up line of business ranges that is available for
various kind of high technology-based products. It is merely inclusive of both that is hardware
and software. ABCT operates its offices on worldwide location, and along with this, it has two
overseas offices. All the given services related to computing is completely provided by the help
of Virtual Private Network (VPN). The report deals with the overall importance of cyber-security
for ABCT. An explanation has been provided concerning three security vulnerabilities in the
system of ABCT. Apart from this, a discussion has been provided concerning five different kinds
of emerging threats which can affect ABCT.
Document Page
2COIT20249 ASSESSMENT DETAILS
Table of Contents
Introduction......................................................................................................................................3
Explain what is cybersecurity and why it is important for ABCT..............................................3
Three security vulnerabilities in ABCT’s system........................................................................5
Detail description of five different types of emerging threats which can affect ABCT..............7
Three recommendation for protecting home and office from cyberattack..................................9
Conclusion.......................................................................................................................................9
References......................................................................................................................................10
Document Page
3COIT20249 ASSESSMENT DETAILS
Introduction
The following report is all about ABCT which is an Australian organization that comes
up with range of different kind of high tech products. There manufacture products are mainly
inclusive of both hardware and software (Buczak & Guven, 2016, pp- 1153-1176). ABCT comes
up with various kind of offices which is available and maintained in head office that is Canberra.
ABCT will allow most of its employees so that they can work from their home location so that
can have VPN connection. It mainly provides Bring Your Own Devices (BYOD) policy for
various employees that work onsite. Each of the given locations aims to provide free kind of
wireless LAN access that can be used by guest and visitors. At present, ABCT needs to add more
than 10,000 customers on regular basis (Gupta, Agrawal & Yamaguchi, 2016). All the required
information related to both customers and product are completely stored on the cloud platform.
As ABCT is the prime victim of various cyber attacks in recent years. This particular
organization might lead to compromise. In most of the cases, hackers might have taken the
overall information of the customers. The point should be taken into account they might lose the
overall trust of the customers. This particular aspect will help in loss of overall revenue. So as a
result, ABCT is focusing the idea of overall improvement of the current security system and
related policies.
In the coming pages of the report, an idea has been provided to cybersecurity and overall
importance in this organization ABCT. After that, three security vulnerabilities in the system of
ABCT has been discussed in brief. Five different kinds of emerging threats which can affect
ABCT along with detail description has been provided.
Explain what is cybersecurity and why it is important for ABCT

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4COIT20249 ASSESSMENT DETAILS
Cyber-security can be stated as the practice which is needed for protecting networks and
programs from any kind of digital attack. The given cyber-attacks mainly focus on certain
number of factors like accessing, destroying and making changes (Bada, Sasse & Nurse, 2019).
It is mainly done concerning destructive information like collecting money from various user
along with interruption of some normal business processes. Implementation of proper
cybersecurity practices can be considered to be very much challenging in nature. It is mainly
done because of result of various devices, people and attacker are becoming very much
innovative. The main notion of effective cybersecurity is all about reducing the overall risk of
cyber-attacks (Carr, 2016, pp- 43-62). It is all about protecting the whole thing from any
unauthorized exploitation of the given system, technologies and given networks. The main
notion of cyber-security is all about implementing proper controls which is completely based on
three important pillars that are people., technology and process (Ben-Asher & Gonzalez, 2015,
pp- 51-61). The given three approaches will help the organization in defending themselves from
organized attacks and internal threats like breach of accident and any kind of human error.
People: Various employee needs to be completely aware of various kind of roles which is
needed for preventing and minimizing any kind of security threats (Knowles et al., 2015, pp- 52-
80). It merely makes use of some of technical staff of cyber-security which is needed for
updating with the skills and qualification for mitigating and responding to cyber-attacks.
Process: Processes are considered to be an important aspect of the fact that given
organization can focus on activities roles and documentation (Lee, Bagheri & Jin, 2016, pp -11-
15). It is mainly needed for mitigating various kind of risk concerning organizational activities.
Cyber threats aim to reduce the various processes that need to be completely reviewed that needs
to be adapted alongside.
Document Page
5COIT20249 ASSESSMENT DETAILS
Technology: Cyber-risk can easily encounter the issues that are being faced by
organization that is being put on control. Proper technology needs to be deployed for preventing
or reducing the overall impact of the given cyber-risk (Syed et al., 2016). It is completely based
on overall risk and is completely based on overall level of risk.
Cyber-Security can play a key in this particular organization that is ABCT like
Cost of data-breaches are soaring: With the enforcement of EU GDPR that is in force,
ABCT can face fines up to a value of 20 million or annual rate of return of 4 %. The global
turnover comes up with certain number of limitation (Anwar et al., 2017, pp- 437-443). Apart
from this, financial loss, reputation damage and overall loss of customer needs to consider.
Cyber-attacks are becoming sophisticated: With time, cyber-attacks are becoming very
much sophisticated (Liu et al., 2015) pp- 1009-1024). Attackers are growing variety of exploit
vulnerabilities like social engineering, ransomware and malware
Cyber-Security is a critical board issue: By the help of regulation and reporting of
requirement the cyber-security risk has become has a major challenge. The given board merely
focus on looking for assurance from the management (Do et al., 2017). The given cyber risk
strategies focus on reducing the overall risk of given attack along with limit of impact of both
financial and operational.
Three security vulnerabilities in ABCT’s system
VPN stands for Virtual Private Networks can be considered to be as one of the emerging
technology in the last few years. It is mainly needed for securing the network from various kind
of cyber-attacks (DiMase et al.,2015, pp- 291-300). By making use of advanced encryption
methods, VPN can easily provide a proper solution against all the present major issues. It can be
easily used by making use of public network. By making use of activity of VPN, the overall
Document Page
6COIT20249 ASSESSMENT DETAILS
parameter needs to be taken into account. VPN can be considered to be best way which is needed
for securing the overall mechanism of transmission of some of the sensitive data. It is mainly
done between two that is server and remote application (Almeshekah & Spafford, 2016), pp. 23-
50). VPN technology is used on global platform and used is implemented in various places of the
world. Some of the security vulnerabilities in ABCT system are
DNS leak: This particular aspect helps the ISP to have an overview by making use of
VPN and making detection in the website (Atat et al., 2017, 49-54). Digital eavesdropping can
be used for analyzing and interpreting the overall traffic which is opposite to VPN that is being
used at present.
WebRTC leaks: It is considered to be very much similar to DNS leaks that come up with
key difference that is being used exclusive of web browser. The point can be concluded that
problem is not itself to VPN but is due to browser more specifically the windows version of both
Chrome and Firefox (Collins, 2016). WebRTC makes use of some special kind of
communication protocol which is known as STUN that allows the user to keep track of visitor of
the website. By making use of VPN, the IP address can be disguised and in doing certain number
of geographical restrictions come into picture.
IPv6 leaks: Overall leaks of IPv6 can create huge number of issues, and they are mainly
common for most common out the given three issues. IPv6 is known to be the successor of IPv4
which is much bigger and safe kind of IP address which will take over the whole internet
(Schoitsch et al., 2016, pp. 251-261). Various VPN aims to provide IPv4 protection of leaks but
many of them are still needed for providing protecting against IPv6.
With time, personal computing is developing at a rapid rate. With overall growth of
mobile industry, both smartphones and tabletshave helped in taking work with us to our home.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7COIT20249 ASSESSMENT DETAILS
By making use of bringing your device (BYOD) strategy, the business of ABCT organization
has become very productive (Iannacone et al., 2015). BYOD can create huge number of security
risk. Some of the common vulnerabilities in BYOD are
Leakage of data: The biggest issues of business is all about implementing BYOD
strategy is that it can leave the data of the organization to various data breaches. Personal devices
are not considered to be a part of IT infrastructure (Hendrix, Al-Sherbaz & Victoria, 2016, pp-
53-61). It merely focuses on the fact that the given devices are not protected by the help of
firewall and security system.
Loss of Devices: The second risk which ABCT needs to deal with is its possibility of the
employees to understanding the loss of personal devices. If some of the important devices of the
employee get lost and fall on the wrong hands, then any individual can have unauthorized access
to the valuable data of ABCT organization (Xu, 2015). All the required data is stored completely
in BYOD.
Possible Hacking: Personal BYOD devices tend to lack some of proper data encryption
techniques for keeping the people to snoop on the given information. Employees of BYOD does
not have updates on regular basis where software devices are completely rendering of devices
(Sun, Hahn & Liu, 2018, pp-45-56). It is all about understanding IT infrastructure which is very
much susceptible to infiltration. Establishment of connection with open Wi-Fi spot in public can
make the organization very much vulnerable and open to hackers. It is mainly done because
hackers can create hotspot by which can be tricked in much easy way.
Detail description of five different types of emerging threats which can affect
ABCT
Document Page
8COIT20249 ASSESSMENT DETAILS
Cybersecurity scenario is developing at a rapid rate where new kind of threats has come
into picture. The overall ability for tracking and preparing tend to encounter huge number of
threats that can help leaders of security and risk management in ABCT (Buczak & Guven, 2016,
pp- 1153-1176). It will ultimately help the organization so understand reliance along with
providing support to the goals of business. In below section, five emerging threats which tend to
impact technology and business leaders of ABCT has been discussed below like
Crypto jacking: Ransomware is known to be as one of the emerging threat that can
impact the overall business of ABCT. Exploiting of some of the basic vulnerabilities is inclusive
of lack of network segmentation and proper backups (Gupta, Agrawal & Yamaguchi, 2016). At
present, threat actors are planning to employ same kind of ransomware in previous way which is
needed for encrypting data. For having ransomware of organization resources and system, the
practice of cryptocurrency comes into picture which is known as Crypto mining (Bada, Sasse &
Nurse, 2019). With the development of crypto jacking the main focus is on SBM leaders that is
used in past so that their business very much small to be attacked.
Threats due to Internet of Things (IoT) devices: Organization like ABTC are adding
more number of devices as a result of their infrastructure. ABCT has number of solution like
security cameras and smart container ship (Carr, 2016, pp- 43-62). The concept of maintenance
comes into picture which is known to be last consideration considering IoT. Organization like
ABTC wants to stay safe which require IoT device so that it can be managed and implemented at
the instance of updating.
Geopolitical Risk: Organization like ABTC have taken into consideration of required
product that needs to be implemented. It is the instance where required data is stored concerning
cyber-security risk and its regulation (Ben-Asher & Gonzalez, 2015, pp- 51-61). If the
Document Page
9COIT20249 ASSESSMENT DETAILS
organization like ABTC does not take into account location and geographical risk, then all the
stolen data will be there in the third party or even nation-state. It is mainly done because
sensitive data will run on threat actors and nation resource that is being used.
Cross-Cite scripting: Organization like ABTC need to avoid various kind of attack like
cross-site scripting attacks (XSS) at every stage of development of life cycle. Most of the
vulnerabilities are found in the areas of XSS making it as the leading vulnerability (Knowles et
al., 2015, pp- 52-80). This particular attack helps the advertises to make use of business of
ABTC for executing some of the untrusted code in the browser of victim. This particular aspect
helps the victim to interact with user and collect all the required information by making use of
authentication hijack site without making use of any credential.
Mobile malware: Mobile malware is known to be an as one of the increasing top targets
which mainly comes into picture due poor management of vulnerability. Various kinds of
organization like ABCT are planning to adopt mobile device management (MDM) solution. It is
mainly needed for limiting the overall concern of adaptation (Lee, Bagheri & Jin, 2016, pp -11-
15). Organization merely focusing on certain number of ways by which can have easy access to
anti-malware solution. If the given access is completely managed by ABTC, then it can result in
huge number of security issues.
Conclusion
From the above pages of the report, the point can be noted that this report is all about
cybersecurity which can be used in office and home system. In the last few years, there has been
overall improvement of system networks and overall growth of interconnected devices by
making use of technology like cloud computing and Internet. Due to development, various kind
of attacks has come into picture like malware attack, phishing, denial of services is considered to

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10COIT20249 ASSESSMENT DETAILS
be as some common kind of attacks. Cybersecurity can be essential practice which is needed for
protecting the required information in the digital age. The main notion is all about preventing the
various kind of risk which is encountered by both organization and individual like damage and
loss of sensitive data. Some of the major issues which are encountered due to cyber-security are
mainly due to effort of the given mobile devices, online mode of payment. In the above pages of
the report, an explanation has been provided concerning cybersecurity and its importance for
ABCT. An identification and explanation have been done concerning three security
vulnerabilities in this given organization that is ABCT. Five different kinds of threats that can
affect the organization has been discussed in details. The discussion mainly comprises of overall
damage of the attack and the technique of attack has been discussed in brief. The last section of
the report deals with list of recommendation for protecting both home and office from any kind
of cyberattack.
Three recommendations for protecting home and office from cyberattack
The whole domain cyber-security is developing at a rapid rate at the similar instance
there is a needfor improvement of technologies has become an important aspect. The taken steps
will ultimately help in assisting both hackers and cyber-criminals for exploiting loopholes due to
data security. Three steps can be easily taken for protecting both home and office from cyber-
attack like
Limiting Data Access: Organization like ABTC provide privilege to have easy access to
some of the vital data. Major number of organization executives are very much unaware of the
details of individual employee that have access to some of the vital data. Any kind of access can
result in huge amount of data, hacking and theft.
Document Page
11COIT20249 ASSESSMENT DETAILS
Tracing sensitive data: Organization like ABTC, it is very important to have some of the
sensitive data that needs to be protected. It merely tends to highlight the fact there is right access
to information along with access to large number of resources. It is all about protecting some of
sensitive data of the organization.
Strong and Unique password for every department: All the required sensitive
information of ABTC can be easily locked by the help of passwords. Strong password is mainly
needed for fighting with password hacking tools.
Document Page
12COIT20249 ASSESSMENT DETAILS
References
Almeshekah, M. H., & Spafford, E. H. (2016). Cyber security deception. In Cyber deception (pp.
23-50). Springer, Cham.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees'
cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.
Atat, R., Liu, L., Chen, H., Wu, J., Li, H., & Yi, Y. (2017). Enabling cyber-physical
communication in 5g cellular networks: challenges, spatial spectrum sensing, and cyber-
security. IET Cyber-Physical Systems: Theory & Applications, 2(1), 49-54.
Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do
they fail to change behaviour?. arXiv preprint arXiv:1901.02672.
Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack
detection. Computers in Human Behavior, 48, 51-61.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2),
1153-1176.
Carr, M. (2016). Public–private partnerships in national cyber-security strategies. International
Affairs, 92(1), 43-62.
Collins, A. (Ed.). (2016). Contemporary security studies. Oxford university press.
DiMase, D., Collier, Z. A., Heffner, K., & Linkov, I. (2015). Systems engineering framework for
cyber physical security and resilience. Environment Systems and Decisions, 35(2), 291-
300.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13COIT20249 ASSESSMENT DETAILS
Do, C. T., Tran, N. H., Hong, C., Kamhoua, C. A., Kwiat, K. A., Blasch, E., ... & Iyengar, S. S.
(2017). Game theory for cyber security and privacy. ACM Computing Surveys
(CSUR), 50(2), 30.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI global.
Hendrix, M., Al-Sherbaz, A., & Victoria, B. (2016). Game based cyber security training: are
serious games suitable for cyber security training?. International Journal of Serious
Games, 3(1), 53-61.
Iannacone, M. D., Bohn, S., Nakamura, G., Gerth, J., Huffer, K. M., Bridges, R. A., ... &
Goodall, J. R. (2015). Developing an Ontology for Cyber Security Knowledge
Graphs. CISR, 15, 12.
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, 52-80.
Lee, J., Bagheri, B., & Jin, C. (2016). Introduction to cyber manufacturing. Manufacturing
Letters, 8, 11-15.
Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M., & Liu, M. (2015). Cloudy
with a chance of breach: Forecasting cyber security incidents. In 24th {USENIX} Security
Symposium ({USENIX} Security 15) (pp. 1009-1024).
Schoitsch, E., Schmittner, C., Ma, Z., & Gruber, T. (2016). The need for safety and cyber-
security co-engineering and standardization for highly automated automotive vehicles.
In Advanced Microsystems for Automotive Applications 2015(pp. 251-261). Springer,
Cham.
Document Page
14COIT20249 ASSESSMENT DETAILS
Sun, C. C., Hahn, A., & Liu, C. C. (2018). Cyber security of a power grid: State-of-the-
art. International Journal of Electrical Power & Energy Systems, 99, 45-56.
Syed, Z., Padia, A., Finin, T., Mathews, L., & Joshi, A. (2016, March). UCO: A unified
cybersecurity ontology. In Workshops at the Thirtieth AAAI Conference on Artificial
Intelligence.
Xu, S. (2015). Cybersecurity dynamics. arXiv preprint arXiv:1502.05100.
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]