Cyber Security Issues and Solutions for JL Company

   

Added on  2023-06-03

12 Pages3132 Words274 Views
Computer Security
Student name
Professor’s name
Affiliation
Date
Cyber Security Issues and Solutions for JL Company_1
Table of Contents
Introduction....................................................................................................................................2
Cyber Security Issues Identified in JL Company.......................................................................3
i. Phishing...............................................................................................................................3
How to address the Issue..........................................................................................................3
Why the chosen solution is better than alternative approaches................................................4
Cost Implications......................................................................................................................4
ii. Brute force attacks..............................................................................................................4
How to address the Issue..........................................................................................................5
Why the chosen solution is better than alternative approaches................................................5
Cost Implications......................................................................................................................5
iii. Virus Attacks...................................................................................................................5
How to address the Issue..........................................................................................................5
Why the chosen solution is better than alternative approaches................................................6
Cost Implications......................................................................................................................6
iv. Hacking.................................................................................................................................6
How to address the Issue..........................................................................................................6
Why the chosen solution is better than alternative approaches................................................6
Cost Implications......................................................................................................................7
v. Ransomware........................................................................................................................7
How to address the Issue..........................................................................................................7
Why the chosen solution is better than alternative approaches................................................7
Cost Implications......................................................................................................................8
Conclusion......................................................................................................................................8
References.......................................................................................................................................9
Cyber Security Issues and Solutions for JL Company_2
Introduction
Cyber security has become a growing concern especially with beginner companies being
the target of cyber security attackers (Ning, Liu & Yang 2013). Cyber security is so important in
business that Indeed it is now viewed as a business issue. Security management in any business
becomes doubly difficult especially for companies involved in transacting in the online market.
The internet poses important security issues that would require business organizations to make
critical precautionary measures to secure themselves against cyber security issues. Small and
midsize businesses (SMBs) are often targeted by cyber security attackers, and a recent study
shows that almost half of the beginner companies that have undergone cyber-attack opt out of
business within a period of six months (Ericsson, 2010) .
In the given case study, there are a number of security breaches that need to be fixed for
JL Company to be safe against cyber security attacks. There are a number of cyber security
issues that JL Company is vulnerable to, due to a number of cyber security issues that this report
is going to address. Hence, this report is going to address the challenges cyber security
challenges that JL Company is currently facing, and considering the fact that the company is
shifting to online marketing, this report will suggest solutions that will enable the company to
fulfill its current and future client requests.
Cyber Security Issues Identified in JL Company
i. Phishing
Phishing is a type of cyber security attack whereby the attackers take advantage of the
ignorance of individuals rather than the system itself (Khurana, Hadley, Lu & Frincke 2010).
This issue need to be dealt with as early as possible because the company has now to
more cautious against cyber security especially now that the company is shifting to online
marketing. JL Company has five employees who have no expertise on IT. It is very easy for
them to fall victims to phishing attacks, and so to compromise the business activities of the
company.
How to address the Issue
Cyber Security Issues and Solutions for JL Company_3
To address the phishing issue, the employees need an intensive briefing on cyber security
issues, and probably get to know mitigate some of the risks, for example by avoiding plugging in
questionable flash disks into the computers in the offices. In the briefing, the employees would
need to know what cyber security is and how it is related to JL Company. Secondly, the
employees need to understand the risks of cyber security attacks in the company and then be
briefed on the necessary precautions to take. Employee training is a basic security practice that
will enable the JL Company employees to beware of cyber security attacks and take security
precautions.
The company should hire an experienced networking expert to help the company in
networking, as the 17 year old employee is obviously not experienced enough.
Why the chosen solution is better than alternative approaches
Furthermore, training the employees would be the best solution because the training will
instill a sense of personal responsibility in taking precautions against cyber security attacks, as
opposed to other alternatives that would employ external security experts. This would be less
effective since external experts are not always dependable, as they are normally outsourced.
Cost Implications
The cost implications of this procedure will be an approximate of A$70 (Modi, Patel,
Borisaniya, Patel & Rajarajan 2013).
ii. Brute force attacks
A brute force attack is a scenario whereby an attack uses all means possible to crack user
account passwords in order to access it (Wang & Lu 2013). A brute force attack is one of the
most dreaded cyber security attacks that is often conducted against web attacks. The aim of this
type of attack is to access user accounts either by repeatedly guessing passwords or by taking
over an open session of a user’s account (Gupta, Agrawal & Yamaguchi 2016).
Since the company is moving into the online market and has started communicating and
sending confidential documents to its clients, it is imperative that they encrypt their data.
Cyber Security Issues and Solutions for JL Company_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Methods to Address Cybersecurity Issues in JL Organization
|13
|2416
|109

Cybersecurity Issues and Solutions for JL Accounting Company
|15
|3261
|464

Cyber Security Concerns and Solutions for a Small Accounting Company
|13
|3036
|196

Cyber-Security Solution Report for JL Organization
|13
|3333
|496

Cyber Security Issues and Solutions for Small Accounting Company JL
|11
|3082
|122

Cyber Security Issues in JL Company
|15
|3783
|56