This report discusses the importance of cybersecurity for ABCT, an Australian technology firm. It explores three security vulnerabilities in ABCT's system and five emerging threats that can affect the organization. Recommendations for protecting against cyberattacks are also provided.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:COIT20249 ASSESSMENT DETAILS Coit20249 Assessment Details Name of the Student Name of the University Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1COIT20249 ASSESSMENT DETAILS Executive Summary ABCT is an Australian technology firm that comes up line of business ranges that is available for various kind of high technology-based products. It is merely inclusive of both that is hardware and software. ABCT operates its offices on worldwide location, and along with this, it has two overseas offices. All the given services related to computing is completely provided by the help of Virtual Private Network (VPN). The report deals with the overall importance of cyber-security for ABCT. An explanation has been provided concerning three security vulnerabilities in the system of ABCT. Apart from this, a discussion has been provided concerning five different kinds of emerging threats which can affect ABCT.
2COIT20249 ASSESSMENT DETAILS Table of Contents Introduction......................................................................................................................................3 Explain what is cybersecurity and why it is important for ABCT..............................................3 Three security vulnerabilities in ABCT’s system........................................................................5 Detail description of five different types of emerging threats which can affect ABCT..............7 Three recommendation for protecting home and office from cyberattack..................................9 Conclusion.......................................................................................................................................9 References......................................................................................................................................10
3COIT20249 ASSESSMENT DETAILS Introduction The following report is all about ABCT which is an Australian organization that comes up with range of different kind of high tech products. There manufacture products are mainly inclusive of both hardware and software (Buczak & Guven, 2016, pp- 1153-1176). ABCT comes up with various kind of offices which is available and maintained in head office that is Canberra. ABCT will allow most of its employees so that they can work from their home location so that can have VPN connection. It mainly provides Bring Your Own Devices (BYOD) policy for various employees that work onsite. Each of the given locations aims to provide free kind of wireless LAN access that can be used by guest and visitors. At present, ABCT needs to add more than 10,000 customers on regular basis (Gupta, Agrawal & Yamaguchi, 2016). All the required information related to both customers and product are completely stored on the cloud platform. AsABCTistheprimevictimofvariouscyberattacksinrecentyears.Thisparticular organization might lead to compromise. In most of the cases, hackers might have taken the overall information of the customers. The point should be taken into account they might lose the overall trust of the customers. This particular aspect will help in loss of overall revenue. So as a result, ABCT is focusing the idea of overall improvement of the current security system and related policies. In the coming pages of the report, an idea has been provided to cybersecurity and overall importance in this organization ABCT. After that, three security vulnerabilities in the system of ABCT has been discussed in brief. Five different kinds of emerging threats which can affect ABCT along with detail description has been provided. Explain what is cybersecurity and why it is important for ABCT
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4COIT20249 ASSESSMENT DETAILS Cyber-security can be stated as the practice which is needed for protecting networks and programs from any kind of digital attack. The given cyber-attacks mainly focus on certain number of factors like accessing, destroying and making changes (Bada, Sasse & Nurse, 2019). It is mainly done concerning destructive information like collecting money from various user alongwithinterruptionofsomenormalbusinessprocesses.Implementationofproper cybersecurity practices can be considered to be very much challenging in nature. It is mainly done because of result of various devices, people and attacker are becoming very much innovative. The main notion of effective cybersecurity is all about reducing the overall risk of cyber-attacks (Carr, 2016, pp- 43-62). It is all about protecting the whole thing from any unauthorized exploitation of the given system, technologies and given networks.The main notion of cyber-security is all about implementing proper controls which is completely based on three important pillars that are people., technology and process (Ben-Asher & Gonzalez, 2015, pp- 51-61). The given three approaches will help the organization in defending themselves from organized attacks and internal threats like breach of accident and any kind of human error. People:Various employee needs to be completely aware of various kind of roles which is needed for preventing and minimizing any kind of security threats (Knowles et al., 2015, pp- 52- 80). It merely makes use of some of technical staff of cyber-security which is needed for updating with the skills and qualification for mitigating and responding to cyber-attacks. Process:Processes are considered to be an important aspect of the fact that given organization can focus on activities roles and documentation (Lee, Bagheri & Jin, 2016, pp -11- 15). It is mainly needed for mitigating various kind of risk concerning organizational activities. Cyber threats aim to reduce the various processes that need to be completely reviewed that needs to be adapted alongside.
5COIT20249 ASSESSMENT DETAILS Technology:Cyber-riskcaneasilyencountertheissuesthatarebeingfacedby organization that is being put on control. Proper technology needs to be deployed for preventing or reducing the overall impact of the given cyber-risk (Syed et al., 2016). It is completely based on overall risk and is completely based on overall level of risk. Cyber-Security can play a key in this particular organization that is ABCT like Cost of data-breaches are soaring:With the enforcement of EU GDPR that is in force, ABCT can face fines up to a value of 20 million or annual rate of return of 4 %. The global turnover comes up with certain number of limitation (Anwar et al., 2017, pp- 437-443). Apart from this, financial loss, reputation damage and overall loss of customer needs to consider. Cyber-attacks are becoming sophisticated:With time, cyber-attacks are becoming very much sophisticated (Liu et al., 2015) pp- 1009-1024). Attackers are growing variety of exploit vulnerabilities like social engineering, ransomware and malware Cyber-Security is a critical board issue:By the help of regulation and reporting of requirement the cyber-security risk has become has a major challenge. The given board merely focus on looking for assurance from the management (Do et al., 2017). The given cyber risk strategies focus on reducing the overall risk of given attack along with limit of impact of both financial and operational. Three security vulnerabilities in ABCT’s system VPN stands for Virtual Private Networks can be considered to be as one of the emerging technology in the last few years. It is mainly needed for securing the network from various kind of cyber-attacks (DiMase et al.,2015, pp- 291-300). By making use of advanced encryption methods, VPN can easily provide a proper solution against all the present major issues. It can be easily used by making use of public network. By making use of activity of VPN, the overall
6COIT20249 ASSESSMENT DETAILS parameter needs to be taken into account. VPN can be considered to be best way which is needed for securing the overall mechanism of transmission of some of the sensitive data. It is mainly done between two that is server and remote application (Almeshekah & Spafford, 2016), pp. 23- 50). VPN technology is used on global platform and used is implemented in various places of the world. Some of the security vulnerabilities in ABCT system are DNS leak:This particular aspect helps the ISP to have an overview by making use of VPN and making detection in the website (Atat et al., 2017, 49-54). Digital eavesdropping can be used for analyzing and interpreting the overall traffic which is opposite to VPN that is being used at present. WebRTC leaks:It is considered to be very much similar to DNS leaks that come up with key difference that is being used exclusive of web browser. The point can be concluded that problem is not itself to VPN but is due to browser more specifically the windows version of both ChromeandFirefox(Collins,2016).WebRTCmakesuseofsomespecialkindof communication protocol which is known as STUN that allows the user to keep track of visitor of the website. By making use of VPN, the IP address can be disguised and in doing certain number of geographical restrictions come into picture. IPv6 leaks:Overall leaks of IPv6 can create huge number of issues, and they are mainly common for most common out the given three issues. IPv6 is known to be the successor of IPv4 which is much bigger and safe kind of IP address which will take over the whole internet (Schoitsch et al., 2016, pp. 251-261). Various VPN aims to provide IPv4 protection of leaks but many of them are still needed for providing protecting against IPv6. With time, personal computing is developing at a rapid rate. With overall growth of mobile industry, both smartphones and tabletshave helped in taking work with us to our home.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7COIT20249 ASSESSMENT DETAILS By making use of bringing your device (BYOD) strategy, the business of ABCT organization has become very productive (Iannacone et al., 2015). BYOD can create huge number of security risk. Some of the common vulnerabilities in BYOD are Leakage of data:The biggest issues of business is all about implementing BYOD strategy is that it can leave the data of the organization to various data breaches. Personal devices are not considered to be a part of IT infrastructure (Hendrix, Al-Sherbaz & Victoria, 2016, pp- 53-61). It merely focuses on the fact that the given devices are not protected by the help of firewall and security system. Loss of Devices:The second risk which ABCT needs to deal with is its possibility of the employees to understanding the loss of personal devices. If some of the important devices of the employee get lost and fall on the wrong hands, then any individual can have unauthorized access to the valuable data of ABCT organization (Xu, 2015). All the required data is stored completely in BYOD. Possible Hacking:Personal BYOD devices tend to lack some of proper data encryption techniques for keeping the people to snoop on the given information. Employees of BYOD does not have updates on regular basis where software devices are completely rendering of devices (Sun, Hahn & Liu, 2018, pp-45-56). It is all about understanding IT infrastructure which is very much susceptible to infiltration. Establishment of connection with open Wi-Fi spot in public can make the organization very much vulnerable and open to hackers. It is mainly done because hackers can create hotspot by which can be tricked in much easy way. Detail description of five different types of emerging threats which can affect ABCT
8COIT20249 ASSESSMENT DETAILS Cybersecurity scenario is developing at a rapid rate where new kind of threats has come into picture. The overall ability for tracking and preparing tend to encounter huge number of threats that can help leaders of security and risk management in ABCT (Buczak & Guven, 2016, pp- 1153-1176). It will ultimately help the organization so understand reliance along with providing support to the goals of business. In below section, five emerging threats which tend to impact technology and business leaders of ABCT has been discussed below like Crypto jacking:Ransomware is known to be as one of the emerging threat that can impact the overall business of ABCT. Exploiting of some of the basic vulnerabilities is inclusive of lack of network segmentation and proper backups (Gupta, Agrawal & Yamaguchi, 2016). At present, threat actors are planning to employ same kind of ransomware in previous way which is needed for encrypting data. For having ransomware of organization resources and system, the practice of cryptocurrency comes into picture which is known as Crypto mining (Bada, Sasse & Nurse, 2019). With the development of crypto jacking the main focus is on SBM leaders that is used in past so that their business very much small to be attacked. Threats due to Internet of Things (IoT) devices:Organization like ABTC are adding more number of devices as a result of their infrastructure. ABCT has number of solution like security cameras and smart container ship (Carr, 2016, pp- 43-62). The concept of maintenance comes into picture which is known to be last consideration considering IoT. Organization like ABTC wants to stay safe which require IoT device so that it can be managed and implemented at the instance of updating. Geopolitical Risk:Organization like ABTC have taken into consideration of required product that needs to be implemented. It is the instance where required data is stored concerning cyber-securityriskanditsregulation(Ben-Asher&Gonzalez,2015,pp-51-61).Ifthe
9COIT20249 ASSESSMENT DETAILS organization like ABTC does not take into account location and geographical risk, then all the stolen data will be there in the third party or even nation-state. It is mainly done because sensitive data will run on threat actors and nation resource that is being used. Cross-Cite scripting:Organization like ABTC need to avoid various kind of attack like cross-site scripting attacks (XSS) at every stage of development of life cycle. Most of the vulnerabilities are found in the areas of XSS making it as the leading vulnerability (Knowles et al., 2015, pp- 52-80). This particular attack helps the advertises to make use of business of ABTC for executing some of the untrusted code in the browser of victim. This particular aspect helps the victim to interact with user and collect all the required information by making use of authentication hijack site without making use of any credential. Mobile malware:Mobile malware is known to be an as one of the increasing top targets which mainly comes into picture due poor management of vulnerability. Various kinds of organization like ABCT are planning to adopt mobile device management (MDM) solution. It is mainly needed for limiting the overall concern of adaptation (Lee, Bagheri & Jin, 2016, pp -11- 15). Organization merely focusing on certain number of ways by which can have easy access to anti-malware solution. If the given access is completely managed by ABTC, then it can result in huge number of security issues. Conclusion From the above pages of the report, the point can be noted that this report is all about cybersecurity which can be used in office and home system. In the last few years, there has been overall improvement of system networks and overall growth of interconnected devices by making use of technology like cloud computing and Internet. Due to development, various kind of attacks has come into picture like malware attack, phishing, denial of services is considered to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10COIT20249 ASSESSMENT DETAILS be as some common kind of attacks. Cybersecurity can be essential practice which is needed for protecting the required information in the digital age. The main notion is all about preventing the various kind of risk which is encountered by both organization and individual like damage and loss of sensitive data. Some of the major issues which are encountered due to cyber-security are mainly due to effort of the given mobile devices, online mode of payment. In the above pages of the report, an explanation has been provided concerning cybersecurity and its importance for ABCT.Anidentificationandexplanationhavebeendoneconcerningthreesecurity vulnerabilities in this given organization that is ABCT.Five different kinds of threats that can affect the organization has been discussed in details. The discussion mainly comprises of overall damage of the attack and the technique of attack has been discussed in brief. The last section of the report deals with list of recommendation for protecting both home and office from any kind of cyberattack. Three recommendations for protecting home and office from cyberattack The whole domain cyber-security is developing at a rapid rate at the similar instance there is a needfor improvement of technologies has become an important aspect. The taken steps will ultimately help in assisting both hackers and cyber-criminals for exploiting loopholes due to data security. Three steps can be easily taken for protecting both home and office from cyber- attack like Limiting Data Access:Organization like ABTC provide privilege to have easy access to some of the vital data. Major number of organization executives are very much unaware of the details of individual employee that have access to some of the vital data. Any kind of access can result in huge amount of data, hacking and theft.
11COIT20249 ASSESSMENT DETAILS Tracing sensitive data:Organization like ABTC, it is very important to have some of the sensitive data that needs to be protected. It merely tends to highlight the fact there is right access to information along with access to large number of resources. It is all about protecting some of sensitive data of the organization. StrongandUniquepasswordforeverydepartment:Alltherequiredsensitive information of ABTC can be easily locked by the help of passwords. Strong password is mainly needed for fighting with password hacking tools.
12COIT20249 ASSESSMENT DETAILS References Almeshekah, M. H., & Spafford, E. H. (2016). Cyber security deception. InCyber deception(pp. 23-50). Springer, Cham. Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors.Computers in Human Behavior,69, 437-443. Atat,R.,Liu,L.,Chen,H.,Wu,J.,Li,H.,&Yi,Y.(2017).Enablingcyber-physical communication in 5g cellular networks: challenges, spatial spectrum sensing, and cyber- security.IET Cyber-Physical Systems: Theory & Applications,2(1), 49-54. Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour?.arXiv preprint arXiv:1901.02672. Ben-Asher,N.,&Gonzalez,C.(2015).Effectsofcybersecurityknowledgeonattack detection.Computers in Human Behavior,48, 51-61. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection.IEEE Communications Surveys & Tutorials,18(2), 1153-1176. Carr, M. (2016). Public–private partnerships in national cyber-security strategies.International Affairs,92(1), 43-62. Collins, A. (Ed.). (2016).Contemporary security studies. Oxford university press. DiMase, D., Collier, Z. A., Heffner, K., & Linkov, I. (2015). Systems engineering framework for cyber physical security and resilience.Environment Systems and Decisions,35(2), 291- 300.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13COIT20249 ASSESSMENT DETAILS Do, C. T., Tran, N. H., Hong, C., Kamhoua, C. A., Kwiat, K. A., Blasch, E., ... & Iyengar, S. S. (2017).Gametheoryforcybersecurityandprivacy.ACMComputingSurveys (CSUR),50(2), 30. Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016).Handbook of research on modern cryptographic solutions for computer and cyber security. IGI global. Hendrix, M., Al-Sherbaz, A., & Victoria, B. (2016). Game based cyber security training: are serious games suitable for cyber security training?.International Journal of Serious Games,3(1), 53-61. Iannacone, M. D., Bohn, S., Nakamura, G., Gerth, J., Huffer, K. M., Bridges, R. A., ... & Goodall,J.R.(2015).DevelopinganOntologyforCyberSecurityKnowledge Graphs.CISR,15, 12. Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems.International journal of critical infrastructure protection,9, 52-80. Lee, J., Bagheri, B., & Jin, C. (2016). Introduction to cyber manufacturing.Manufacturing Letters,8, 11-15. Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M., & Liu, M. (2015). Cloudy with a chance of breach: Forecasting cyber security incidents. In24th {USENIX} Security Symposium ({USENIX} Security 15)(pp. 1009-1024). Schoitsch, E., Schmittner, C., Ma, Z., & Gruber, T. (2016). The need for safety and cyber- security co-engineering and standardization for highly automated automotive vehicles. InAdvanced Microsystems for Automotive Applications 2015(pp. 251-261). Springer, Cham.
14COIT20249 ASSESSMENT DETAILS Sun, C. C., Hahn, A., & Liu, C. C. (2018). Cyber security of a power grid: State-of-the- art.International Journal of Electrical Power & Energy Systems,99, 45-56. Syed, Z., Padia, A., Finin, T., Mathews, L., & Joshi, A. (2016, March). UCO: A unified cybersecurity ontology. InWorkshops at the Thirtieth AAAI Conference on Artificial Intelligence. Xu, S. (2015). Cybersecurity dynamics.arXiv preprint arXiv:1502.05100.