logo

Importance of Cyber Security for ABCT

   

Added on  2023-01-16

14 Pages4078 Words94 Views
Running head: CYBER SECURITY OF ABCT
IMPORTANCE OF CYBER SECURITY, VULNERABILITIES AND EMERGING
THREATS – A CASE STUDY OF THE COMPANY ABCT
Name of the Student:
Name of the University:
Author Note:

CYBER SECURITY OF ABCT
1
Executive Summary
The report discusses the importance of cyber security measures in industries and
organisations. The report illustrates on the importance of cyber security and the impact of
neglecting it. The report also discusses about the different vulnerabilities in the company
ABC Technology’s security system. The report also discusses the various types of emerging
cyber threats, their causes and the types of techniques used by such attacks. The report
concludes with a summary of all the main points of the report. The conclusion is followed by
few recommendations to further improve the security of ABCT.

CYBER SECURITY OF ABCT
2
Table of Contents
Introduction................................................................................................................................3
Cyber security and its Importance..............................................................................................3
Vulnerabilities of ABC Technology..........................................................................................4
Five emerging threats affecting ABCT......................................................................................6
Conclusion..................................................................................................................................7
Recommendation........................................................................................................................8
References..................................................................................................................................9

CYBER SECURITY OF ABCT
3
Introduction
The company ABC Technologies is an information technology firm based in
Australia which deals in high level technological products comprising of both hardware and
software. The company is a multinational company with many offices in Australia and two
offices in foreign countries. The company has over 10000 regular customers and has both
work from home and working onsite policies. The company provides free internet access to
its customers via the wireless LANs and uses a virtual private network for its employees to
work. The employees are requested to bring their own laptops to work. The company has
recently been subjected to multiple cyber-attacks and they are sceptical that their customer’s
data might have been stolen by the hackers. The company fears that if all the data of their
10000 customers is leaked or used for illegal purposes, they will lose the trust of their
customers and suffer massive losses in revenues.
In this report, the basic concept of cyber security and its importance in today’s world
will be discussed. The report will also highlight on the major types of emerging cyber threats
and analyse the vulnerabilities present in ABCT’s security system. These cyber security
threats will be discussed in detail along with their attack techniques, the hackers responsible
for them and their consequences. The report will also illustrate the loopholes in the ABCT’s
system and security structure. The report will conduct thorough research on the above
mentioned topics and provide proper solutions to them and also give recommendations on
how to improve the company’s security.
Cyber security and its Importance
Cyber security is the method used to provide systems, programs and networks
protection against online or cyber-attacks. These type of cyber-attacks are generally aimed at
modifying, accessing or deleting crucial and sensitive information or extorting money from
people using the stolen information. These attacks can also be carried out to disrupt normal
business processes. The implementation of proper cyber security measures are slowly
becoming a challenge because the number of online devices around the world is
exponentially increasing along with the cyber criminals devising more innovative and unique
ways to attack the systems (Bada, Sasse, & Nurse, 2019).
A successful cyber security method has many different layers of security spread
across the devices, networks, data and the programs that are needed to be kept safe. In an

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security in ABCT Company
|14
|3832
|97

Emerging Security Threats
|12
|3912
|46

Cyber Security Challenges in Organizational Context: A Case Study of ABC Technology Company
|12
|3788
|45

Cybersecurity for Office and Home
|14
|3454
|46

Cyber Security for ABCT
|13
|3526
|21

Professional skills for Information and Communication
|8
|1329
|480