logo

Importance of Cybersecurity for ABCT

   

Added on  2023-03-17

15 Pages3960 Words94 Views
Running head: COIT20249 ASSESSMENT DETAILS
Coit20249 Assessment Details
Name of the Student
Name of the University
Author Note:

1COIT20249 ASSESSMENT DETAILS
Executive Summary
ABCT is an Australian technology firm that comes up line of business ranges that is available for
various kind of high technology-based products. It is merely inclusive of both that is hardware
and software. ABCT operates its offices on worldwide location, and along with this, it has two
overseas offices. All the given services related to computing is completely provided by the help
of Virtual Private Network (VPN). The report deals with the overall importance of cyber-security
for ABCT. An explanation has been provided concerning three security vulnerabilities in the
system of ABCT. Apart from this, a discussion has been provided concerning five different kinds
of emerging threats which can affect ABCT.

2COIT20249 ASSESSMENT DETAILS
Table of Contents
Introduction......................................................................................................................................3
Explain what is cybersecurity and why it is important for ABCT..............................................3
Three security vulnerabilities in ABCT’s system........................................................................5
Detail description of five different types of emerging threats which can affect ABCT..............7
Three recommendation for protecting home and office from cyberattack..................................9
Conclusion.......................................................................................................................................9
References......................................................................................................................................10

3COIT20249 ASSESSMENT DETAILS
Introduction
The following report is all about ABCT which is an Australian organization that comes
up with range of different kind of high tech products. There manufacture products are mainly
inclusive of both hardware and software (Buczak & Guven, 2016, pp- 1153-1176). ABCT comes
up with various kind of offices which is available and maintained in head office that is Canberra.
ABCT will allow most of its employees so that they can work from their home location so that
can have VPN connection. It mainly provides Bring Your Own Devices (BYOD) policy for
various employees that work onsite. Each of the given locations aims to provide free kind of
wireless LAN access that can be used by guest and visitors. At present, ABCT needs to add more
than 10,000 customers on regular basis (Gupta, Agrawal & Yamaguchi, 2016). All the required
information related to both customers and product are completely stored on the cloud platform.
As ABCT is the prime victim of various cyber attacks in recent years. This particular
organization might lead to compromise. In most of the cases, hackers might have taken the
overall information of the customers. The point should be taken into account they might lose the
overall trust of the customers. This particular aspect will help in loss of overall revenue. So as a
result, ABCT is focusing the idea of overall improvement of the current security system and
related policies.
In the coming pages of the report, an idea has been provided to cybersecurity and overall
importance in this organization ABCT. After that, three security vulnerabilities in the system of
ABCT has been discussed in brief. Five different kinds of emerging threats which can affect
ABCT along with detail description has been provided.
Explain what is cybersecurity and why it is important for ABCT

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Professional Skill for Information and Communication
|15
|3340
|77

Cybersecurity Threats and Recommendations for ABCT Organization
|12
|3497
|88

Emerging Security Threats
|12
|3912
|46

Cybersecurity and its Importance to ABCT
|5
|959
|422

Cybersecurity: Importance, Vulnerabilities, Emerging Threats, and Recommendations
|13
|3502
|179

Use of Cybersecurity within office and home systems
|15
|4011
|74