logo

Effectiveness of The Approached Strategies

Linda, the owner of Ace Hardware, wants to expand her business but is concerned about the security of her confidential data. The assignment requires analyzing the current security measures and proposing improvements to protect the data from potential threats.

13 Pages2989 Words19 Views
   

Added on  2022-09-16

Effectiveness of The Approached Strategies

Linda, the owner of Ace Hardware, wants to expand her business but is concerned about the security of her confidential data. The assignment requires analyzing the current security measures and proposing improvements to protect the data from potential threats.

   Added on 2022-09-16

ShareRelated Documents
Running head: COMPUTER SECURITY
REPORT ON COMPUTER SECURITY
Name of the Student
Name of the University
Effectiveness of The Approached Strategies_1
Computer Security 1
Table of Contents
Introduction................................................................................................................................2
Threat(s) and Vulnerability(s)....................................................................................................2
Mitigation Approaches...............................................................................................................5
Cost Breakdown Structure.........................................................................................................7
Effectiveness of the approached strategies................................................................................7
Conclusion..................................................................................................................................8
References................................................................................................................................10
Effectiveness of The Approached Strategies_2
Computer Security 2
Introduction
The primary objective of this report is to propose an effective security infrastructure
to a company Ace Hardware which is established in Perth. As it has been observed from the
case scenario that the selected company is a computer hardware company whose manager has
expressed her interest towards expanding the business across Australia. Followed this
approach it has been also noticed that the company does not have any secure infrastructure to
protect the organizational information. Further, it has been also monitored that the company
also performs database analysis in order to provide best services to their customers. Hence, in
this report a brief elaboration related to the incorporation of the IT security infrastructure in
the organization will be provided.
Threat(s) and Vulnerability(s)
After analysing the mentioned scenario it has been noticed that there are several
significant cyber security threats and vulnerabilities present which holds harmful impact on
the organizational services, Followed by this aspect list of possible cyber security threats are
listed below:
One of the most significant threats present in the mentioned scenario is the
possibilities of malware attacks. As it has been noticed that most of the
organizational operations of Ace hardware’s are performed via internet hence, these
types of attack can significantly harm the organizational services as well as it holds a
significant impact on the data security. Followed by this aspect one of the most
harmful malware attacks are the Trojans, Ransomware as well as the impact of
Worms (Shu et al., 2016). Due to the attacks of the above mentioned attacks the
attacker have the access to all of the organizational data as well as it may restrict the
owner to access those data. Hence, after investigating the impact of this threats it is
Effectiveness of The Approached Strategies_3
Computer Security 3
highly important to reduce the possibilities of this attack in order to protect the
organizational data as well as it will help to avoid extra expenses.
Along with the above mentioned threats another impactful threat is the phishing
attack as in the field of cyber-crime phishing attacks has taken a significant place
(Abomhara, 2015). In this case the attacker basically manipulates the system user and
attack the system followed by which it blocks all of the data from the user access.
Hence, due to these types of attacks there is a huge possibilities of data loss as well as
there are significant chance to pay money in order to release the data from the hacker.
Followed by this aspect it has been noticed that it is highly important to reduce the
chances of Phishing as it holds the abilities to harm the organizational data as well as
it may affect the system performance (Thakur et al., 2015). Thus, in order to prevent
the performance of the company from external threats effective mitigation approach
is essential.
Apart from the threats related to the malware and phishing attacks one of the most
significant threat present in this scope is related to the employee awareness. As it has
been noticed from the case scenario that the employee of the organization does not
has any idea about the cyber security which may invokes the possibilities of the
cyber-attacks (Conteh & Schmick, 2016). Hence, from the investigation it has been
identified that due to the actions and operation of the unawareness of the employ
several attacks has taken place which has significantly harmed the organizational data
as well as the operations of the organization. Followed by this aspect it is highly
important to mitigate this identified threat in order to protect the company system as
well as the data which is help to enhance the services of the company.
Effectiveness of The Approached Strategies_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on Risk Management and Mitigation Plan
|6
|1401
|65

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

Information System Security Report 2022
|5
|1052
|58

Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Information Technology 2022 Report
|12
|4826
|26

CYBER SECURITY Name: Student Id: Name of univeristy:.
|8
|4621
|39