Cyber Security: Dealing with Cyber Attacks and Emerging Technologies in Oil and Gas Industry

   

Added on  2022-11-16

11 Pages1615 Words387 Views
Running head: CYBER SECURITY
Cyber Security
Name of Student
Name of University
Author Note
Cyber Security: Dealing with Cyber Attacks and Emerging Technologies in Oil and Gas Industry_1
1
CYBER SECURITY
Table of Contents
Case Study 1: Dealing with cyber attacks...........................................................................2
Task 1...............................................................................................................................2
Task 2...............................................................................................................................2
Task 3...............................................................................................................................4
Task 4...............................................................................................................................5
Case Study 2: Identify & assess emerging technologies.....................................................6
Task 5...............................................................................................................................6
Task 6...............................................................................................................................7
Task 7...............................................................................................................................8
Task 8...............................................................................................................................8
Task 9...............................................................................................................................9
Bibliography......................................................................................................................10
Cyber Security: Dealing with Cyber Attacks and Emerging Technologies in Oil and Gas Industry_2
2
CYBER SECURITY
Assessment 2: Case Study
Case Study 1: Dealing with cyber attacks
Task 1
The scenarios discussed involves the cases of information loss and lack of effective data
protection. The valuable assets in both the scenarios that requires protection along with the use
and the risk to the asset is indicated in the table below-
Scenario Valuable Assets that
requires protection
Use an intruder
might have for the
asset
Risks to the asset
1 Soft copy of
confidential file and
information
Monetary gain, on
having an access to
the confidential
information asset
Risk of unauthorized
access
2 The personal and
private data of the
customers of the
international financial
service organization
along with their
merger plan
The access to the data
of the customers
proves to be a source
of blackmail for the
attackers
The loss of
customers’ data and
revelation of the
merger plan will
incur a huge financial
loss and reputation
loss for the company.
Task 2
Cyber Security: Dealing with Cyber Attacks and Emerging Technologies in Oil and Gas Industry_3
3
CYBER SECURITY
In both the scenarios, there are certain amount of cyber security threats that are present in
both the cases. The details of the present cyber security threats and current controls which are in
place are indicated in the table below-
Scenario Cyber Security Threats Current Controls
1 Replying to any email
without checking its
authenticity is linked with the
risk of email spoofing
There is no active control of
detecting and eliminating the
risk of email spoofing in the
organization or else, the issue
could have been avoided.
As per the control, a security
system is needed to be
installed that will filter the
spam email. Also, the
employees are needed to be
educated about the process in
which the spam emails can be
detected.
2 The second scenario indicates
presence of a ransomware in
the system along with the
threat of inaccurate data
protection.
The data confidentiality can
be maintained by encryption
of the stored data so that the
attackers does not get an
access to the stored personal
data and details of the
Cyber Security: Dealing with Cyber Attacks and Emerging Technologies in Oil and Gas Industry_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment | Cyber Security
|23
|2174
|14

Information Governance and Cyber Security: Risks and Mitigation Strategies
|13
|3198
|416

Cyber Security - Identification of threats
|16
|1865
|20

Importance of Information Governance and Cyber Security Threats
|10
|2965
|32

IT Risk Assessment and Cyber Security Lead Consultant for Gigantic Corporation
|10
|3551
|91

Report on the Cyber Security 2022
|14
|3027
|5