logo

Cyber Security: ABC Technologies

Write a formal academic report analyzing an assessment task, researching relevant information, and making recommendations for future practice.

16 Pages3805 Words242 Views
   

Added on  2022-11-13

About This Document

This report discusses the cyber security requirements of ABC Technologies, the identified security vulnerabilities, and the consequences of cyber attacks. It also provides recommendations to prevent cyber attacks.

Cyber Security: ABC Technologies

Write a formal academic report analyzing an assessment task, researching relevant information, and making recommendations for future practice.

   Added on 2022-11-13

ShareRelated Documents
Running head: CYBER SECURITY: ABC TECHNOLOGIES
Cyber Security: ABC Technologies
[Name of the Student]
[Name of the Organization]
[Author Note]
Cyber Security: ABC Technologies_1
CYBER SECURITY: ABC TECHNOLOGIES1
Table of Contents
Introduction:....................................................................................................................................3
Discussion:.......................................................................................................................................3
Cyber security:.................................................................................................................................3
Cyber Security Importance in ABCT:.............................................................................................4
Explanation of the Identified Security vulnerabilities:....................................................................5
Denial of Service attacks:................................................................................................6
Syn Flood Attacks:......................................................................................................6
Buffer overflow attack:................................................................................................6
Phishing attack:................................................................................................................7
Snooping attack:..............................................................................................................7
Justification of the Cyber threats:....................................................................................................7
Emerging threats:.............................................................................................................8
Usage of Personal devices:..........................................................................................8
Lack of Security in the network channels and security polices:..................................9
Lack of cryptography mechanisms:.............................................................................9
Consequences of the Attack:...........................................................................................9
Data damage:.............................................................................................................10
Misuse of data and information:................................................................................10
Failure in meeting the company expectations:..........................................................10
Cyber Security: ABC Technologies_2
CYBER SECURITY: ABC TECHNOLOGIES2
Attacking techniques and person responsible for the attack:.........................................10
Recommendations:........................................................................................................................11
Usage of the Encryption Technology:...........................................................................11
Training sessions:..........................................................................................................11
Firewall Implementation:...............................................................................................12
Conclusion:....................................................................................................................................12
References:....................................................................................................................................13
Cyber Security: ABC Technologies_3
CYBER SECURITY: ABC TECHNOLOGIES3
Introduction:
The cyber security issues and challenges are seen to be increasing at a rapid rate with the
evolution of the computing network (Zhang et al., 2015). This challenges are in turn associated
with having a huge impact upon the commercial revenue as well as upon the competitive
advantages of a business. In this report we would be describing about the cyber security
requirements of the ABC technologies. The organization is associated with making offering their
services by means of VPN. However, while conducting the business operations various kind of
emerging threats might be associated with interrupting the company’s security along with having
a negative impact upon the emerging threats which have been presented in this report.
Discussion:
Cyber security:
Cyber Security generally refers to the technique which is seen to be utilized by organizations of
different sizes for protecting their computers along with the programs and the data along with
being associated with providing of authorized access or prevention of any kind of attacks (Syed
et al., 2016). Some of the major areas which are seen to be covered by the cyber security is
associated with including the following:
Application security,
Information security, and
Network and disaster security;
Application security is associated with including the counter measures along with the
measures which are to be implemented throughout the entire life cycle of a project development.
Cyber Security: ABC Technologies_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Embedding Cyber Resilience Principles for Board
|16
|2997
|436

Legal and Ethical Issues in Cybersecurity
|18
|4538
|174

Cyber Security: Exploring the Various Aspects and Solutions
|29
|8168
|290

Importance of Cybersecurity
|9
|1925
|214

IT Risk Management: Cyber Security
|20
|4610
|231

Cryptography Techniques and Challenges: An Overview
|5
|1751
|65