The report discusses the cyber security issues faced by JL Company and provides solutions to address them. It also compares traditional IT security approach with cloud security approach.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER SECURITY ISSUES Cyber security issues Name of the student: Name of the university: Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CYBER SECURITY ISSUES Abstract The report is prepared to discuss about the current security threats that the organisation of JL company is facing recently. Among major of the security threats that are mentioned, five important security issues are identified within the organisation which needs urgent attention. The report reflects the possible risks that might occur if this risk is not resolved and based on it possiblesecurity approach isrecommendedin the last part of the report. A brief comparison is thus mentioned in the report on the different types of approaches that the company can follow and finally recommending the best approach towards mitigating those issues.
2CYBER SECURITY ISSUES Table of Contents Introduction:...............................................................................................................................3 Cyber security issues related to the organisation:......................................................................4 Need to address the cyber security issues immediately:........................................................7 Solutions to address the identified cyber security issues:......................................................7 Comparison between the different alternative approaches in order to address the security issues:.....................................................................................................................................9 Cost breakdown to implement the solution for the identified issues:..................................11 Conclusion:..............................................................................................................................11 References:...............................................................................................................................12
3CYBER SECURITY ISSUES Introduction: Withmoreandmoredailybusinessactivitiesmovingonline,itisbecoming increasingly important for companies to ensure that no one is attempting to steal their data or money. That is why cyber security plays a significant role in business. Cyber security involves the protection of computer-based equipment and information from unintended or unauthorized access changed mode of destruction (Srinivasan, 2014). A cyber attack takes several forms including theft or unauthorized access of computers, laptops, tablets or mobile devicesaremoteattackonInformationtechnologysystemsorwebsites,attackson information held in third party systems such as cloud devices. It is very important for companies to protect themselves from the threat of scams, data thefts and other online vulnerabilities(Tisdale,2015).HerethechosenbusinessorganisationisnamedasJL company on which the further cyber risk assessment is made. Overview of the company:JL is a small company mainly working on accounting related works. The company resides in Perth, Western Australia. As a means to progress in the online marketing field, the company started communicating and transferring some confidential files and documents to their clients with the help of variety of online services. But recently the company is facing some kind of problems related to slowing down of computers, random malware inspired popups and many other failures of the operating systems that are being used in the company. All these issues that are arising in the company may lead to some serious cyber related threats that might take up the whole business. The following report is thus presented based on the possible cyber security issues that are related to the JL company and those which need immediate attention to be resolved.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CYBER SECURITY ISSUES Cyber security issues related to the organisation: As far as the current situation of the JL company concerns there are major security risks that are associated with every step that the company is operating on. The cyber security issues that are identified within the organisation are mentioned as follows: 1.The SOE of the company consists of Windows 10 laptops, all of which are currently updated with the most recent Microsoft updates: According to recent researches, there are some problems going on with the most recent update of the Microsoft in Windows 10. The last update that came in the year 2019 has more serious issues than the previous ones (Wash et al., 2014). As most of the computers now a days are installed with windows 10, hence the security concern is rising day by day. According to reports, companies like JL who have computers with this kind of updates are in the verge of experiencing automatic restart of computer systems leading to activation of the active hour feature in the system.This is a serious security concern as this kind of behavior of the system may prevent users from restarting their systems during the automatic operation of the system. 2.Noneofthelaptopsusedinthecompanycontainanysecuritysoftware: Information technology security software are essential to use in any business in order to protect the computer networks used in the business process. It acts as a defense to prevent unauthorized access in organisations systems (Madzima, Moyo & Abdullah, 2014). As none of the laptops in the company has these features installed among them hence it may cause a severe security risks in terms of unauthenticated access into their systems leading to major data breach. 3.The company uses D-Link DSL-2740B wireless router to access internet via ADSL:According to some reports, the first generation of the ADSL routers are encompassed with certain flaws which allowed the devices connecting to it to be
5CYBER SECURITY ISSUES accessed and controlled remotely. In 2009, a new type of malware had been detected which targeted the ADSL routers (Στασινόπουλος, 2014). The issues related to wireless network is a common vulnerability that is affected via the use of this kind of routers. Hence as the company is using this type of router to access their internet serviceshence,theyarealsointhelistofgettingattackedbythepossible vulnerabilities related to the use of ADSL router. 4.The company previously was using the windows 2000 server but due to some power cut problem it is no longer in a functioning state:Now, windows 2000 server is considered to be one of the most secured servers offering features for securing data stored in the computers (Alnatheer, 2014). It facilitates features with enhanced security measures that were designed to meet the needs of expanding businesses online. So, for JL company as they are moving towards online business hence it would have been beneficial if they used the windows 2000 server again. 5.As the company reported that, each employee receives an average of 40 spam messages each day:Receiving spam messages on a daily basis in a business organisation is a signal for the upcoming threats that might take up the business organisation attacking each computer via the spam messages. This type of attack is defined to be a particular cyber threat known as Phishing (Arachchilage & Love, 2014). 6.The organization has a previous record of getting attacked by ransomware:It is being reported by the manager of the organisation that on July 2017, the company faced a major cyber threat in terms of ransomware attack (Richardson & North, 2017). But nosuch actions were taken by the higher officials of the business in order to patch their systems against the future possible attacks instead they paid the
6CYBER SECURITY ISSUES ransomware that was demanded by the hackers. This is a major drawback that the company is facing recently as the matter of security is still not resolved. 7.There are no policies or rules for employees on using the computer systems effectively without getting attacked by hackers:It is important for every company to set up some security policies and rules that needs to be followed by employees while using the computer systems for business purposes (Safa, Von Solms & Furnell, 2016). But the JL company do not have any such measures which is one of the most important basic security flaws that the organisation is facing. 8.Employees can access each other’s account without any objection:this kind of practice may lead to future internal theft within the business organisation.It is important to maintain access of particular database information with respect to particular roles in the organisation. 9.All types of confidential data of the business are transferred via email without having any cryptographic techniques:Business data are much confidential and the loss of which may lead to the fall of the entire business organization. Hence it is important to implement cryptographic security measures in transferring important credentials related to the business via email (Gupta, Agrawal & Yamaguchi, 2016). According to report, the company also fails in implementing this security measure within their business system. Among all these issues that are prevailing in the business organisation of JL company, the main five identified issues that needs immediate attention includes: 1.Lack of security software in the laptops used in the company. 2.Non-functioning of windows 2000 server 3.Receiving of spam messages 4.Lack of policies and rules to guide employees
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7CYBER SECURITY ISSUES 5.Unauthorized access of confidential data within the organisation. Need to address the cyber security issues immediately: As the business organisation of JL company, is planning to move its business towards online platforms hence it is necessary that it should work on its basic security measures in order to prevent any type of attacks in their system. The company need to implement cyber security measures in order to safe guard their information while working on online business platforms. Among the five main identified risks, it is important the company first try to implement a basic policy and rule that would help the employees in using their systems securely.Asmany of theemployeesdo not havea proper expertiseon information technology hence, they are unaware of the recent cyber threats that are emerging in the modern business world. Solutions to address the identified cyber security issues: All the above-mentioned cyber issues that are related to the company needs to be solved immediately. As a measure to solve the issues it is recommended that the company of JLmoveitsonlinebusinessplatformtoacloud-basedenvironment(Chang,Kuo& Ramachandran, 2016). E-commerce industries are flourishing day by day and it seems that there is no stopping in its growth. It is obvious that if the JL company moves its business to online platform, then it will face more expansion with more consumers coming up for convenience of online services. The company now needs to manage the rise of unexpected peaks in the traffic, optimizing load speed and content delivery and most importantly ensuring data security and protecting them from cyber-attacks. As the business organisation of JL is facing some major issues with respect to cyber security, moving its business platform to a more secured cloud environment will be the best option to mitigate all the issues that are being identified and need immediate attention.
8CYBER SECURITY ISSUES Cloud Security for online business:Cloud provides a set of security features for business organisations who are deploying their business platform via cloud infrastructure. It can be a little expensive for business organisations to implement strong security features from cloud and as the JL company is a small startup business organisation hence it is recommended that it takes the help of some cloud service providers who can provide the right security features for the business platform (Srinivasan, 2014). The basic security features that are provided by cloud service providers to ensure security features within the business organisation includes: 1.Top of the line perimeter firewall: This type of security feature provided by the cloud services helps in mitigating the issue that is faced in the organisation like it lacks in implementing security software in its systems (Jaiswal, Nath & Kumar, 2014). With the help of this advanced perimeter firewall feature, all the requirements that are needed for the service can be satisfied. 2.Intrusion detection system using event logging: Unauthorized access of information within the organisation irrespective of roles is a major issue that needs to be mitigated (Nikolai & Wang, 2014). For this the feature of intrusion detection system will help the company in detecting the users who are using the database information within the organisation with detailed login details.
9CYBER SECURITY ISSUES 3.Data at rest encryption: All the data that are transferred within the systems of the company lacks encryption feature. This security feature of cloud will help the organisation in transferring messages with encryption feature (Ramachandran & Chang, 2016). Also as the company employees receives about 40 spam messages in their systems per day, this advanced encryption method will also help them in mitigating the issue to some extent. 4.Implementing cloud directory service: Another important thing that the company needs to solve is with the issue of using windows 2000 server (Liao et al., 2016). As it is planning to move its business to online platform, it is very important to use the windows 2000 server again in their system but it will cost the company a huge expenditure hence moving towards a cloud directory service will help the company in mitigating this issue. Comparison between the different alternative approaches in order to address the security issues: There can be two main approaches in order to mitigate the cyber security issues that are faced in the JL company. On e is the traditional IT approach and the other is the Cloud security approach.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10CYBER SECURITY ISSUES Traditional IT security approach:In order to create a typical IT infrastructure in a company, it needs to connect to hardware devices to on-premise servers in order to store their important information securely. In traditional approach of IT security, the company will need to incorporate a greater number of physical hardware on-site and this will lead to high expenditure. As the company is a small startup company, it cannot bear the huge amount of expenditure in order to provide security facility for its prevailing issues (Sandberg, Amin & Johansson, 2015). Cloud security approach:On the other hand, while taking the help of cloud service providers in deploying their online business platform in the cloud environment, they can help the company in incorporating the internet for a storage place which will reduce the cost of buying specific hardware or software requirement for the company (Kalaiprasath, Elankavi & Udayakumar, 2017). Traditional way of approach to cyber security does not always provide security measures ensuring that the data are protected. But the security features in cloud environment meet the hackers at their level(Ibrahim, Hamlyn-Harris & Grundy, 2016). Cloud security provides the following benefits in mitigating the issues that are identified within the company of JL- 1.It controls and ensures the security measures like firewall implementation, password protocols and updating security patches. 2.It helps the staffs in informing about the latest security threats and policies that the hackers are using. 3.It enables the layered authorization in order to access networks by customers, employees and mostly by the managers in the company.
11CYBER SECURITY ISSUES 4.It helps in routing all requests in the network such as the messages and emails received through a centralized and protected latest security updates of the protocols and hence helps in blocking threats before entering into the network. Cost breakdown to implement the solution for the identified issues: There ae various cloud service providers who provide cloud security services at a very cheap cost ranging to about $2.50/ month to $10/ month (Mtebe, & Raisamo, 2014). As the business of JL is a small startup company, it can take the help of service providers such as Vultr, A2 Hosting, Digital ocean and many more who are known for providing cloud security services at a lowest cost. The cost for implementing a firewall in cloud environment will be around $100 and the cost to implement IAM service in cloud is $5000. Conclusion: Thus, from the report it can be concluded that using a cloud-based security will benefit the JL company in mitigating the major security risks that are prevailing in the company’s scenario. Cloud data security is a shared responsibility between the cloud providers and the customers. In this case it is the utmost responsibility of the JL company to secure its data in the cloud environment. Cloud data security adds additional data security to its users by helping in backing up of files in the off-site, decreasing the potential of the hackers and mitigating other cyber security issues. Besides using the cloud security services, it is also necessary that the employees of the organisation should be trained with basic awareness against using computer systems safely without clicking on an any unwanted links or any other unauthorized accesses. It is the due responsibility of the company as well to implement security features within the organisation and make use of standard policies and rules that the employees are bound to follow.
12CYBER SECURITY ISSUES References: Alnatheer,M.A.(2014).SecureSocketLayer(SSL)ImpactonWebServer Performance.Journal of Advances in Computer Networks,2(3), 211-217. Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective.Computers in Human Behavior,38, 304-312. Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds.Future Generation Computer Systems,57, 24-41. Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016).Handbook of research on modern cryptographic solutions for computer and cyber security. IGI global. Ibrahim, A. S., Hamlyn-Harris, J., & Grundy, J. (2016). Emerging security challenges of cloud virtual infrastructure.arXiv preprint arXiv:1612.09059. Jaiswal, C., Nath, M., & Kumar, V. (2014). Location-based security framework for cloud perimeters.IEEE Cloud Computing,1(3), 56-64. Kalaiprasath,R.,Elankavi,R.,&Udayakumar,D.R.(2017).Cloud.Securityand Compliance-A Semantic Approach in End to End Security.International Journal Of Mechanical Engineering And Technology (Ijmet),8(5), 987-994. Liao, X., Liu, C., McCoy, D., Shi, E., Hao, S., & Beyah, R. (2016, April). Characterizing long-tail SEO spam on cloud web hosting services. InProceedings of the 25th International Conference on World Wide Web(pp. 321-332). International World Wide Web Conferences Steering Committee.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13CYBER SECURITY ISSUES Madzima, K., Moyo, M., & Abdullah, H. (2014, August). Is bring your own device an institutional information security risk for small-scale business organisations?. In2014 Information Security for South Africa(pp. 1-8). IEEE. Mtebe, J. S., & Raisamo, R. (2014). eLearning cost analysis of on-premise versus cloud- hosted implementation in Sub-Saharan countries.The African Journal of Information Systems,6(2), 2. Nikolai, J., & Wang, Y. (2014, February). Hypervisor-based cloud intrusion detection system.In2014InternationalConferenceonComputing,Networkingand Communications (ICNC)(pp. 989-993). IEEE. Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providersforclouddatasecurity.InternationalJournalofInformation Management,36(4), 618-625. Richardson,R.,&North,M.M.(2017).Ransomware:Evolution,mitigationand prevention.International Management Review,13(1), 10. Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations.Computers & Security,56, 70-82. Sandberg, H., Amin, S., & Johansson, K. H. (2015). Cyberphysical security in networked control systems: An introduction to the issue.IEEE Control Systems Magazine,35(1), 20-23. Srinivasan, S. (Ed.). (2014).Security, trust, and regulatory aspects of cloud computing in business environments. IGI Global. Srinivasan, S. (Ed.). (2014).Security, trust, and regulatory aspects of cloud computing in business environments. IGI Global.
14CYBER SECURITY ISSUES Tisdale, S. M. (2015). Cybersecurity: Challenges from a Systems, Complexity, Knowledge ManagementandBusinessIntelligencePerspective.IssuesinInformation Systems,16(3). Wash, R., Rader, E., Vaniea, K., & Rizor, M. (2014). Out of the loop: How automated software updates cause unintended security consequences. In10th Symposium On Usable Privacy and Security ({SOUPS} 2014)(pp. 89-104). Στασινόπουλος, Α. Χ. (2014).ADSL router exploitation(Master's thesis).