This study explores the importance of cyber security in organizations, focusing on the vulnerabilities in cloud and ICT implementation. It also discusses possible security threats and provides recommendations for maintaining cyber security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER SECURITY IN ORGANIZATION CYBER SECURITY IN ORGANIZATION Name of the Student: Name of the University: Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 CYBER SECURITY IN ORGANIZATION Executive summary The area of digital dependency has been found to play a crucial part to enhance technology at the current marketplace. For the current case, the ABC technology is selected. Here, the business has been operating at a large scale and dealing with a greater level of technology. This requires suitable maintenance with smart security measures. In this study the cybersecurity and its importance are identified. Next, the importance of cyber security under the technology’s business is evaluated. Further, discussions are made on data breaching and security vulnerabilities within cloud. Next, the study demonstrates the vulnerabilities related to the ICT implementation. At last, the probable security threats under the business are identified.
2 CYBER SECURITY IN ORGANIZATION Table of Contents Introduction......................................................................................................................................2 Discussion........................................................................................................................................2 Cyber Security and its significance.............................................................................................2 Relevance of cyber security in ABC Technology.......................................................................3 Data Breaching............................................................................................................................3 Security vulnerability in cloud.....................................................................................................4 Vulnerability regarding the implementation of ICT....................................................................5 Possible security threats in the organization................................................................................5 Recommendations........................................................................................................................8 Conclusion.......................................................................................................................................9 References......................................................................................................................................10
3 CYBER SECURITY IN ORGANIZATION Introduction Digital dependency plays an important role for the development of the technology in the industry. It has been seen that with the increase in the digital dependency, there raises the concern about maintain the cyber security. The advancement of the technology has allowed the useoftheemergingtechnologiesliketheInternetofThings(Kuypers,Maillart&Pate- Cornell,2016). Apart from that many new concepts of doing the work has been implemented. In this context, the use of the “Bring your own device” policy can be mentioned. Concerning all these things it has been seen that the cyber security attacks has been increased significantly. In most of the cases, the security attacks are exploiting the security vulnerabilities of the emerging technologies. In order to prevent this certain measures are needed to be taken like the use of the VPN. Apart from that the awareness among the users regarding maintaining the cyber security is also important. The main objective of this paper is to evaluate the different aspects of the cyber security and the measures those are needed to be taken in the organizationssothatthefunctioningoftheorganizationcanbesecured.Theselected organization in this case is ABC technology (Perakslis& Stanley,2016). The company is currently operating in large scale and is dealing with the high level technology that needs the proper maintenance and the security measures. The factors discussed in the paper will indicate the conclusion. Discussion Cyber Security and its significance Cyber security is defined by the activities those are needed to be carried out for the protecting the system and the information stored in the system from the external threats. It has
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 CYBER SECURITY IN ORGANIZATION been seen, in most of the cases, the transfer of the information between two devices are done through the internet connection. Apart from that the use of the emerging technologies needs the internet connectivity for the proper operation. In this situation , there is a possibility that the potential external threats can make the system damage or violate the proper transformation of the data. All these activities can be regarded as cyber threats. The measures for the prevention of the cyber threats can be mentioned as the cyber security. There are different kinds of threats like internal threats or external threats. In that case, the external threats can be the attacks by the malicious codes or the ransom ware. On the other hand the internal threats can be access of the important system through the illegal use of the username and password for the modification of the important data in the system. The main objective of the cyber security is to prevent those threats so that the system along with its functionality can run in a proper way. Cyber Security and ABC Technology ABC Technology is currently working on the products those are based on the emerging technology. Apart from that the organization is also into the manufacturing of the hardware those can support the use of the emerging technology. The organization can be defined as the medium organization as, there are 10,000 employees work in the organization. In this situation it is the responsibility of the organization to maintain the data and information related to the client and the organization in a proper way so that the functionality and the confidentiality are not hampered. Apart from that as the organization is working through online and is investing money for the development of the merging technology, there is a chance that the research data can be stolen form the online system, Considering all these factors it is important for the organization to develop a cyber-security system that will help the organization to maintain the proper security.
5 CYBER SECURITY IN ORGANIZATION Loss of Data There are certain drawbacks those can be turned into security vulnerability for the ABC Technology. It has been seen that the organization is operating the policy regarding the “bring your own device”. In this policy the employees can bring their own system at work place and can use those system for the further improvisation of the process. This can become a security threat for the ABCT. The organization is not aware about the configuration of all the devices carried by the employees. It can be possible that there is a security vulnerability in one of the systems of the employees (Staheli et al., 2016). The breaching of the data can be done through that system which is not desirable for the organization. Apart from that some of the employees in the organization can illegally pass the confidential data to the other organization through their system. There would be a lack of monitoring from the organization’s end on the activities of the employees as well as their systems. Security vulnerability in cloud The second identified vulnerability is the use of the cloud storage architecture.There is no specification of the cloud deployment model the organization is using. In that case, it can be assumed that the ABCT is using the public cloud. Storing data in public cloud may be a cost effective solution for the company but there can be lack of security in storing the data in public cloud. The maintenance of the security in the public cloud is carried out by the cloud providing company (Busby,Green&Hutchison, 2017). In that case, if the organization does not have the proper maintenance or security policy there is a chance for the breaching of the data (Kramer, Walsh&Theunissen, 2017). As the organization is operating on the high end technologies, the breaching of the data is not a desired thing. In this case, the organization should be careful about
6 CYBER SECURITY IN ORGANIZATION the selection of the cloud deployment architecture. Apart from that the ABCT needs to negotiate about the security policies with the cloud service provider. Vulnerability regarding the implementation of ICT The third identified problem ABCT facing is regarding the rules and the regulation. The organizations those are dealing with the technology and technology driven services need to have the proper ICT rules and regulations. There are certain ethical standards mentioned by different approved organizations those are needed to be maintained by all the organizations (Min, Chai& Han,2015). Apart from that the organizations have their own set of rules and regulations regarding the use of ICT in the organization. In this case, it has been seen that there is no mention of specific rules and regulations regarding the use of technology in ABCT. This will lead to the misunderstanding and the wrong implementation of the ICT (Ganesan, Jajodia& Cam,2017). Apart from that the products and the services may not be of standard quality in this case. Sue of the lack of rules and regulations the improvisation of the cyber security can become tough. The external threats in this case can exploit the absence of particular rules and regulations of the organization. Apart from that managing all 10,000 employees in the organization can be tough for the ABCT without proper rules and regulations. Possible security threats in the organization Attack from the malware:There is a potential chances for the systems in ABCT system to get attacked by the malware. Generally, the intruders can get the information about the system through the malware attack. The malware can enter into the system through different ways. However, in most of the cases, it has been seen that the intruders are sending the malicious links to the users. In case, if the users are clicking on those links the malware gets activated in the system.Malware can be defined as the piece of code that will help the intruders to get the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 CYBER SECURITY IN ORGANIZATION information entered by the users in the system. Apart from that the confidential information can also be collected through installing the malicious codes in the system. In order to mitigate the chances of the system affecting by the malware attacks, the organizations can increase the awareness program regarding cyber security among the employees (Safa,VonSolms&Furnell, 2016). Apart from that the installation of the anti-virus software is needed to be done in this case. From this context, it can also be said that the use of the original and the updated software is required for the further implementation of the security in the system. Attack from the ransomware: The attacks from the ransomware is another possible threats that can be occurred in the system. The functionality of the ransomware is to captivate the functions of the system. In this case, the users can not open or access the particular file or the system (Anwar et al., 2017). In most of the cases, it has been seen that the ransomware attacks are initiated by the intruders for the personal gain (Leuprecht, Skillicorn&Tait, 2016). After the encryption of the data and information if the user’s computer or the system, the intruders demand the money and in exchange they will free the data through the decryption technique. Regarding the ransomware attack, the mention of the WannaCry can be taken. In order to prevent the ransomware attack, the network of the system is needed to be secured.Proper protocol is needed to be maintained during the implementation of the overall system. Apart from that the use of the VPN and firewall are needed to be used in the system (Mármol, Pérez& Pérez, 2016). The use of the VPN and Firewall will help the system to get rid from the unnecessary traffics.Apart from that the users are needed to be aware about the consequences of these attacks so that they can maintain the security while using the network in the system.
8 CYBER SECURITY IN ORGANIZATION Denial of Service attack: The denial of service attack is a form of cyber-attack that will take the control of the system from the users. In this case, the users cannot manage or handle the system. This attack is initiated by sending the large amount of the requests in the network of the system(Almeshekah&Spafford,2016).Theoverloadingoftherequestwillmakethe functionalityofthesystemfortheprocessingviolated(Almuhammadi&Alsaleh,2017). Exploiting this vulnerability the intruder can take the charge of the system. There are different types of denial of service attack such as distributed denial of service attack. Moreover, it has been seen that using this denial of service attacks the other attacks are also exploiting the system. The name of one such attack is the memcache attack. In order to prevent the denial of service attacks the network of the organization is needed to be secured. Apart from that with the improvement of the network security in the organization, there is a need for the upgradation of the system (He&Johnson, 2017). The upgradation of the software provides the updated software patch of the security. In this case, the system can be secured from the advanced threats. Password spoofing: Spoofing of the password is another type of cyber security threat for the organization. The password spoofing can be regarded as both internal and external threat. It has been seen that through the password spoofing the username and the password of the system can be known to the intruders (Park, Suh & Park, 2016). There are different password spoofing techniques those can be used by the intruders. In order to prevent this the organizations has to maintain some of the rules and regulations so that the security regarding the cyber space can be maintained in a proper way. Breaching of the data: Breaching of the data can be regarded as one of the security threats for both the organizations and the users. It has been seen that through the use of the different
9 CYBER SECURITY IN ORGANIZATION advanced technology the intruder can get the access of the system. After getting access of the system the breaching of the data is possible for the intruders (Murdoch & Leaver, 2015). The data stored in the system of the organization can be confidential in nature. Apart from that those data can be used by the intruders in an illegal way. This can be a threat for both the organization and the consumers of the organization. In order to prevent the breaching of the data, certain security measures are needed to be implemented in a proper way. Apart from that the users and the employees in the organizations are needed to make aware about the consequences of the data breaching (Brown, Gommers& Serrano, 2015). Along with the organization, it is also the responsibility of the users to follow the security rules while using the cyber space in order to prevent the breaching of the data. Recommendations There are certain recommendations those can be made on the basis of the discussion in the paper. It has been seen that the threats can be of different types. Apart from that the cyber threats are applicable for both the systems at the office space and the systems owned by the individuals. In this context, the threats for the organization can be both internal and external (Trim & Upton, 2016). In this context, making the users aware about the use of the cyber space in a proper way is needed. Apart from that the anti-virus software are needed to be installed in the systems so that it can inform the system about the presence of the malicious codes or the links (Limba et al., 2019). The users should not open the suspicious links as those can be a source of the external threats (Safa et al., 2015). In order to secure the network, the use of VPN along with the firewall can be done. The use of the firewall will prevent the intrusion of the unnecessary network traffic in the system. Apart from that the use of VPN will allow the organization to transfer data through a private network. The use of the original software is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 CYBER SECURITY IN ORGANIZATION needed for the systems so that the systems can get update in proper time. The update of the system or the software contains the security patches. In that case, the upgraded security patches will help to prevent the advanced security threats for the organization. Conclusion The discussion is regarding the use of the security measures in the organization. It has been seen that ABCT organization is a medium organization which is dealing with the smart and the emerging technologies. There are certain security vulnerabilities those are needed to be identified in the process. In this context, the mention of the three security vulnerabilities are mentioned in the discussion. Apart from that the discussion regarding the possible threats in the system are also mentioned in the discussion.The mitigation plan is mentioned through the recommendations. In this case, it can be said there are certain security measures those are needed to be taken so that the functioning of the organization can be safe and secured.
11 CYBER SECURITY IN ORGANIZATION References Almeshekah, M. H., &Spafford, E. H. (2016). Cyber security deception. InCyber deception(pp. 23-50). Springer, Cham. Almuhammadi, S., &Alsaleh, M. (2017). Information Security Maturity Model for Nist Cyber Security Framework.Computer Science & Information Technology,51. Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors.Computers in Human Behavior,69, 437-443. Brown, S., Gommers, J., & Serrano, O. (2015, October). From cyber security information sharing to threat management. InProceedings of the 2nd ACM workshop on information sharing and collaborative security(pp. 43-49). ACM. Busby, J. S., Green, B., & Hutchison, D. (2017). Analysis of affordance, time, and adaptation in the assessment of industrial control system cybersecurity risk.Risk Analysis,37(7), 1298- 1314. Ganesan, R., Jajodia, S., & Cam, H. (2017). Optimal scheduling of cybersecurity analysts for minimizing risk.ACM Transactions on Intelligent Systems and Technology (TIST),8(4), 52. He, Y., & Johnson, C. (2017). Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization.Informatics for Health and Social Care,42(4), 393-408.
12 CYBER SECURITY IN ORGANIZATION Kramer, K., Walsh, W. P., &Theunissen, E. (2017). From the Editors of the Special Issue on Cyber Security in Aerospace.IEEE Aerospace and Electronic Systems Magazine,32(11), 3-3. Kuypers, M. A., Maillart, T., & Pate-Cornell, E. (2016). An empirical analysis of cyber security incidents at a large organization.Department of Management Science and Engineering, StanfordUniversity,SchoolofInformation,UCBerkeley,http://fsi.stanford. edu/sites/default/files/kuypersweis_v7. pdf, accessed July,30. Leuprecht, C., Skillicorn, D. B., & Tait, V. E. (2016). Beyond the Castle Model of cyber-risk and cyber-security.Government Information Quarterly,33(2), 250-257. Limba, T., Plėta, T., Agafonov, K., &Damkus, M. (2019). Cyber security management model for critical infrastructure. Mármol, F. G., Pérez, M. G., & Pérez, G. M. (2016, July). I don’t trust ICT: Research challenges in cyber security. InIFIP International Conference on Trust Management(pp. 129-136). Springer, Cham. Min, K. S., Chai, S. W., & Han, M. (2015). An international comparative study on cyber security strategy.International Journal of Security and Its Applications,9(2), 13-20. Murdoch, S., & Leaver, N. (2015, October). Anonymity vs. trust in cyber-security collaboration. InProceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security(pp. 27-29). ACM. Park, J., Suh, Y., & Park, C. (2016). Implementation of cyber security for safety systems of nuclear facilities.Progress in Nuclear Energy,88, 88-94.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13 CYBER SECURITY IN ORGANIZATION Perakslis, E. D., & Stanley, M. (2016). A cybersecurity primer for translational research.Science translational medicine,8(322), 322ps2-322ps2. Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., &Herawan, T. (2015). Information security conscious care behaviour formation in organizations.Computers & Security,53, 65-78. Safa, N. S., Von Solms, R., &Furnell, S. (2016). Information security policy compliance model in organizations.Computers & Security,56, 70-82. Staheli, D., Mancuso, V., Harnasch, R., Fulcher, C., Chmielinski, M., Kearns, A., ...&Vuksani, E. (2016). Collaborative data analysis and discovery for cyber security. InTwelfth Symposium on Usable Privacy and Security ({SOUPS} 2016). Trim, P., & Upton, D. (2016).Cyber security culture: Counteracting cyber threats through organizational learning and training. Routledge.