Cyber Cafe Case Study Assessment

Verified

Added on  2022/08/18

|13
|2585
|16
AI Summary
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBER CAFE CASE STUDY ASSESSMENT
CYBER CAFE CASE STUDY ASSESSMENT
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBER CAFE CASE STUDY ASSESSMENT
Executive summary
The report focuses on determining the issues that are identified by the Cyber café director. The
assignment will aim at designing a security plan after analyzing the issues faced within Cyber
café. The main concern is to identify the threats, outlining the security guidelines and to develop
a robust training program for the purpose of reducing the threats that are emerging within the
café. In addition to this the report will also focus on developing a plan for the purpose of
protecting the information maintained within the organization. Thus the report will be able to
ensure that the key threats are mitigated successfully.
Document Page
2CYBER CAFE CASE STUDY ASSESSMENT
Table of Contents
Introduction......................................................................................................................................3
Security plan....................................................................................................................................3
Security countermeasures................................................................................................................5
Training............................................................................................................................................7
Security policy.................................................................................................................................8
Interview..........................................................................................................................................9
Conclusion.....................................................................................................................................10
Bibliography..................................................................................................................................11
Document Page
3CYBER CAFE CASE STUDY ASSESSMENT
Introduction
The aim of the assessment is to focus on identifying the key issues that are faced within
the Cyber café. The cyber café main functionality is to allow the customers to access internet for
performing different activities. According to the director of the Cybercafé the security provided
towards the information and network were not sufficient. The director is seemed to be concerned
about the viruses that have the potential to cause major cyber-attack. These attacks can lead to
downtime of the organization. Thus it becomes essential to identify the reason behind the
security flaws so that it becomes easy to design an effective security policy that will protect the
system function. The issue raised an alarming rate that caused shutting down the Cyber Cafés for
2 days so that it becomes easy to determine the source of malicious email.
Cyber-attacks are increasing at an alarming rate and thus it becomes important to ensure
that the organization is capable of managing the performance with proper security policy. An
efficient and strict security policy will ensure that the activities are carried out based on the
threats that are identified at the cyber café. The cyber café umbrella mainly operates it
functionalities from 3 different locations and are open for 24 hours a day. Hence it can be stated
that it is important to analyze the impacts properly for the purpose of protecting the data shared
over the communication process. With an enhanced security policy it will become easy to
manage the data.
Security plan
Cyber security is considered as the most important aspect while exchanging the data.
Without providing any proper security it becomes difficult to trust any communication process.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CYBER CAFE CASE STUDY ASSESSMENT
The threats that are currently faced by the Cyber café are receiving malicious threat mails that
have led to shutting the system for 2 days. The issues those are most probably to hamper the
business functionalities due to lack of proper security plan are described below:
Lack of data protection: The cyber café allows the user to share data through internet.
This has the potential to threat towards the data maintained and protected within the café.
Without proper data protection act it becomes difficult to manage the performance. This
will eventually hamper the overall functioning and will lead to threating the data sets
stored and shared.
Issues with confidentiality: It becomes difficult to manage the confidentiality within the
data shared and managed over the internet. Without proper confidentiality it becomes
difficult to manage the data. While sharing a data between two parties it becomes
essential to ensure that the data are shared with proper confidentiality and integrity.
Data breach: As soon as a third party gets access over the data it becomes difficult to
prevent the data from getting breach. With the help of an efficient data security plan it
becomes easy to protect the data.
The above identified issues have the potential to hamper the overall performance of the cyber
café. These impacts have the potential to hamper the performance and thus it is important to
design a proper security plan that will protect the data from getting hampered. The cyber security
plan is designed for the purpose of protecting the performance. The features of security plan
includes having a proper incident response plan, accepting the policy use, configuring the
management plan and ensuring that an effective disaster recovery plan is designed for protecting
the data shared over the internet. This typically includes ensuring that the security plan designed
is proactive. IT and security teams should focus on aligning the strategic activities for the
Document Page
5CYBER CAFE CASE STUDY ASSESSMENT
purpose of supporting the activities such as early detection and mitigation for the potential
threats. In addition to this it is important to ensure that a proper risk management procedure is
included within the organization.
The necessary steps that are essential for preparing a successful security plan are discussed
below:
Designing a good cyber security plan
Planning proper risks and compliance strategy that will be capable of managing the
functions
Including proper security administrations
Including security operations
Designing a better architecture for enhancing the security
Installing the firewall devices for managing the data efficiently
Providing limited access towards users
Installing antispyware software within every computer system for the purpose of
protecting the data
Data stored and shared must be maintained with proper encryption method
Creating awareness among the users regarding the possible cyber threats
Security countermeasures
Security countermeasures are referred to the process of preventing the business from
getting influenced by the possible threats. It becomes very much essential to understand the
importance of security within cyber café. With the help of an effective security countermeasure it
becomes easy to protect the data shared with the use of internet. It is important to ensure that the
Document Page
6CYBER CAFE CASE STUDY ASSESSMENT
data is maintained successfully within the system. Countermeasures are used for the purpose of
protecting the data from possible security threats. This will ensure that the data are managed
successfully and shared through a convenient medium. The possible countermeasures that have
the potential to protect the data within a cyber café are listed below:
Virus scanners: with the implementation of antivirus programs it becomes easy to check every
file and applications before processing so that it becomes easy to determine the viruses that have
the potential to hamper the performance. The virus scanners are responsible for using a wide
variety of techniques for the purpose of detecting the viruses. The techniques include signature
scanning, integrity checks, activity blocking and heuristic scanning.
Pretty good privacy: Pretty good privacy application is designed for the purpose of allowing the
organization to initially check the mails that are sent towards a receiver. This application is
designed for the purpose of providing a free mail security application that will ensure that all the
files and folders are encrypted properly so that it cannot be accessed by any other unauthorized
users.
Privacy enhanced mail: PEM is one of the oldest mail security standards that are used for the
purpose of providing a better encryption process. This will ensure that better authentication is
maintained within the mail shared among the two users.
Kerberos: Kerberos is a network authentication protocol that is designed for the purpose of
encrypting the network data. This ensures that the data shared over the network are
authenticated. These typically involve using a secret key cryptography for the purpose of
facilitating single sign on. This contains three parts that are client, server and a third trusted party
that acts as a mediator.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CYBER CAFE CASE STUDY ASSESSMENT
Transport layer security: This protocol is similar to SSL that is independent of application. This
aims at ensuring that the transport layer is not infected by any threat.
Training
Training is the process that is used for alerting the cyber café users about the possible
measures that can be taken for the purpose of protecting the data from getting breached. With the
use of proper training it becomes easy to manage the vulnerabilities at different stages. A better
cyber security act helps in managing the data effectively. The steps that are essential for carrying
out a training program within the Cyber café employee stating the key awareness reason are
discussed below:
Determining the area of concern
Identifying the major security threats
Designing a proper and intended system that will be capable of highlighting the major
risks
Providing awareness training regarding the key threats
Appointing proper supervisors who will be capable of handling the business
functionalities
Preparing list of employees for conducting the awareness program
Scheduling training programs so that it becomes easy to understand the number of people
attending the training session
Collecting feedback once the training is completed
Security measures must be integrated within the system for ensuring better performance
With the help of proper protocol the access can be managed effectively
Document Page
8CYBER CAFE CASE STUDY ASSESSMENT
Enhanced way of sharing the information and devices needs to be integrated
Security policy
Security policy is used for the purpose of minimizing the risks that can lead to data loss
or leak. The use of security policy will help in protecting the business data from malicious
attacks and external hackers. The policy helps in setting proper practices so that it becomes easy
to enhance the usage. Security policy includes 5 key steps that are identifying the issues,
conducting a proper analysis, using draft language, legal review and policy deployment
procedure. The security policy is designed for the purpose of providing support towards the staff,
computer users and the administrator. With the help of a security policy it becomes easy to
protect the organization and offers the organization to establish a baseline on security so that the
risks can be minimized effectively.
The enhanced security policy will help in protecting the data shared over the internet. The
necessary steps for designing a security plan are described below:
Including a proper risk management protocol for mitigating the risks
Designing proper network security feature
Creating awareness program for enhancing the security
Anti- Malware design for the organization
Protecting and securing the information
Organizing the information with proper protocol
Performance monitoring for managing the security and network aspects
Document Page
9CYBER CAFE CASE STUDY ASSESSMENT
Interview
Question 1: What are the major issues faced while managing Cyber cafe features?
Alexia (Manager): I have faced major issues while accessing the Cyber café features. Sometimes
my data got altered when I was not present. I think it is very much important to have proper
security plan.
Quetsion2: Does your current organization linked with any security policy?
Director: Our organization does not have any proper security policies at present.
Question 3: How lack of awareness program hampering the business functionality?
Suzanne (Employee): Business performance is getting hampered due to lack of knowledge and
training among the members.
Question 4: What are the major threats hampering the business and data shared within the cyber
café?
Employee: There is a need to analyze the threats at the early stage. I myself faced issues while
communicating with other members. Sometimes data got modified and the other time data got
leaked. Hence it is important to include proper system that will be capable of monitoring the
data.
Question 5: What issues are faced by the customers?
Employee: It has been observed that the customer tends to face issues with accessing the data and
performing communication process. Hence it is important to implement proper security process
within the organization.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10CYBER CAFE CASE STUDY ASSESSMENT
Conclusion
Thus after analyzing the report it can be stated that in order to mitigate risks faced within
the cyber café it will become essential to include proper cyber security methods. With the help of
proper cyber security aspect it becomes easy to manage the threats that take place within the
cyber café. The main issues that are faced with the current process o the cyber café is that it lacks
in managing the staffs and the data are shared over the internet. The cyber-attacks are needs to be
reduced within café so that it becomes easy to manage the performance. With the help of proper
support and security policy it will become easy to manage the performance.
Document Page
11CYBER CAFE CASE STUDY ASSESSMENT
Bibliography
Bauer, S. and Bernroider, E.W., 2017. From information security awareness to reasoned
compliant action: analyzing information security policy compliance in a large banking
organization. ACM SIGMIS Database: the DATABASE for Advances in Information
Systems, 48(3), pp.44-68.
Blakemore, B., 2016. Policing cyber hate, cyber threats and cyber terrorism. Routledge.
Dua, S. and Du, X., 2016. Data mining and machine learning in cybersecurity. Auerbach
Publications.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision support systems, 86, pp.13-23.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI global.
Han, J., Kim, Y.J. and Kim, H., 2017. An integrative model of information security policy
compliance with psychological contract: Examining a bilateral perspective. Computers &
Security, 66, pp.52-65.
Hemilä, J., Mikkola, M. and Salonen, J., 2019, December. Management of Cyber Security
Threats in the Factories of the Future Supply Chains. In 9th International Conference on
Operations and Supply Chain Management, OSCM 2019.
Kirichenko, L., Radivilova, T. and Carlsson, A., 2018. Detecting cyber threats through social
network analysis: short survey. arXiv preprint arXiv:1805.06680.
Document Page
12CYBER CAFE CASE STUDY ASSESSMENT
Mendel, J., 2017. Smart grid cyber security challenges: Overview and classification. e-
mentor, 68(1), pp.55-66.
Niemimaa, E. and Niemimaa, M., 2017. Information systems security policy implementation in
practice: from best practices to situated practices. European Journal of Information
Systems, 26(1), pp.1-20.
Paliszkiewicz, J., 2019. Information security policy compliance: Leadership and trust. Journal of
Computer Information Systems, 59(3), pp.211-217.
Sapienza, A., Bessi, A., Damodaran, S., Shakarian, P., Lerman, K. and Ferrara, E., 2017,
November. Early warnings of cyber threats in online discussions. In 2017 IEEE International
Conference on Data Mining Workshops (ICDMW) (pp. 667-674). IEEE.
Virmani, C., Choudhary, T., Pillai, A. and Rani, M., 2020. Applications of Machine Learning in
Cyber Security. In Handbook of Research on Machine and Deep Learning Applications for
Cyber Security (pp. 83-103). IGI Global.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]