Cyber Security Issues and Solutions: A Comprehensive Report
VerifiedAdded on 2025/05/03
|14
|2455
|157
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Contents
Introduction................................................................................................................................2
Issues encountered.....................................................................................................................3
Summary..................................................................................................................................10
Glossary....................................................................................................................................11
References................................................................................................................................12
List of Figures
Figure 1: Features of YesWare..................................................................................................5
Figure 2: Quick Heal Anti-Virus................................................................................................6
Figure 3: LAN............................................................................................................................7
Figure 4: Features of Cloud........................................................................................................8
Figure 5: Latest Windows 10.....................................................................................................9
Introduction................................................................................................................................2
Issues encountered.....................................................................................................................3
Summary..................................................................................................................................10
Glossary....................................................................................................................................11
References................................................................................................................................12
List of Figures
Figure 1: Features of YesWare..................................................................................................5
Figure 2: Quick Heal Anti-Virus................................................................................................6
Figure 3: LAN............................................................................................................................7
Figure 4: Features of Cloud........................................................................................................8
Figure 5: Latest Windows 10.....................................................................................................9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Introduction
The below-made report is based on the assessment that is regarding the identification of the
issues present in the field of Cyber Security. All the related issues are needed to have closer
scrutiny. More of the issues are needed to be identified and few of the most common issues
are then extracted out of them. The selected issues are then resolved by the most appropriate
software that is to be used in place of the useless software. There are 18 issues being found at
the starting of the assessment and later on, the suitable and the most common five issues are
found out of them. The issues found are then rated on different scales and proper solutions
are also provided to overcome those issues. Various features of the selected software are also
mentioned in the form of a diagram created on draw.io. In the end, the whole scenario of the
assessment is properly concluded.
The below-made report is based on the assessment that is regarding the identification of the
issues present in the field of Cyber Security. All the related issues are needed to have closer
scrutiny. More of the issues are needed to be identified and few of the most common issues
are then extracted out of them. The selected issues are then resolved by the most appropriate
software that is to be used in place of the useless software. There are 18 issues being found at
the starting of the assessment and later on, the suitable and the most common five issues are
found out of them. The issues found are then rated on different scales and proper solutions
are also provided to overcome those issues. Various features of the selected software are also
mentioned in the form of a diagram created on draw.io. In the end, the whole scenario of the
assessment is properly concluded.

Issues encountered
Issues Reasons
The old version of the Windows in the
Laptop.
As a lot of new version of Windows is being
introduced nowadays, the issue is created
regarding the absence of the new version of
the Windows.
No security software is present. As each of the organization contains a lot of
confidential data, the security of the data is
must and that is being compromised in the
organization (Carr, M. 2016).
No anti-virus software is present in the
systems.
A number of viruses such as Trojan,
Malware, etc are present and that could harm
the data easily if no anti-virus is provided in
the system.
Use of the Internet by ADSL via D-Link
DSL-2740B wireless router.
Using this internet option creates a lot of
issues such as slow speed for accessing a lot
of things when required and it causes the
work delay.
IDS/ IPS Issue No reports or alert notifications appear.
Backup purpose software QNap TS-412
NAS.
For backing up the issue, this is considered as
the older version.
Spam messages occurrence. Includes a lot of viruses along with it and
which harms the system.
Windows Server 2000. Includes a number of faults.
The cost paid for an infection named Loss in the funds is addressed.
Issues Reasons
The old version of the Windows in the
Laptop.
As a lot of new version of Windows is being
introduced nowadays, the issue is created
regarding the absence of the new version of
the Windows.
No security software is present. As each of the organization contains a lot of
confidential data, the security of the data is
must and that is being compromised in the
organization (Carr, M. 2016).
No anti-virus software is present in the
systems.
A number of viruses such as Trojan,
Malware, etc are present and that could harm
the data easily if no anti-virus is provided in
the system.
Use of the Internet by ADSL via D-Link
DSL-2740B wireless router.
Using this internet option creates a lot of
issues such as slow speed for accessing a lot
of things when required and it causes the
work delay.
IDS/ IPS Issue No reports or alert notifications appear.
Backup purpose software QNap TS-412
NAS.
For backing up the issue, this is considered as
the older version.
Spam messages occurrence. Includes a lot of viruses along with it and
which harms the system.
Windows Server 2000. Includes a number of faults.
The cost paid for an infection named Loss in the funds is addressed.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Ransomware.
Easy access to personal data and emails. Creates a problem in keeping personal data.
No policies regarding Employees
authenticity,
This would create trouble because of the
absence of authentication.
No data can be kept personal. Due to the means of the transmission of data,
the security of data is getting lost.
Unsafe to keep the data stored. The same reason is addressed at most of the
issues is that confidential data is unsafe.
No skilled Employees are present. This affects the work of the company.
No proper policies defined. This causes inconsistency in the work.
No policies regarding the accessing of the
data.
As mentioned, anyone could easily access the
data of the other person, so no policies are
defined to restrict them.
Irresponsible employees No employee is aware of the solution to the
problems being encountered in the company.
No policies are defined for backing up the
data.
This issue is also really sensitive as if data
would not be backed-up then losing of the
data can be addressed.
Easy access to personal data and emails. Creates a problem in keeping personal data.
No policies regarding Employees
authenticity,
This would create trouble because of the
absence of authentication.
No data can be kept personal. Due to the means of the transmission of data,
the security of data is getting lost.
Unsafe to keep the data stored. The same reason is addressed at most of the
issues is that confidential data is unsafe.
No skilled Employees are present. This affects the work of the company.
No proper policies defined. This causes inconsistency in the work.
No policies regarding the accessing of the
data.
As mentioned, anyone could easily access the
data of the other person, so no policies are
defined to restrict them.
Irresponsible employees No employee is aware of the solution to the
problems being encountered in the company.
No policies are defined for backing up the
data.
This issue is also really sensitive as if data
would not be backed-up then losing of the
data can be addressed.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Out of the 18 mentioned issues, 5 major issues are:
(i) Data access to employees
Every company owns the emails that are professional and official and the employees present
in the company can access the emails of other employees so this can be an issue for the
employees those do not likely to share their emails with anyone and want to keep them
confidential (Janakova, M. (2018). Therefore, this is the responsibility of the company to
provide such services for the employees.
Consequences
The data security of an employee is absent.
An employee can feel uncomfortable with the absence of privacy of the mails.
The account of the employee can be used by anyone and can cause a major issue to
the employee.
Alternative
In order to resolve this particular issue, the use of a software named as the YesWare software
is installed that tracks emails of the employees and help them to keep a check on the
employee's activities (Ahrend, J. M., & Jirotka, M. 2017). By doing this if any employee
misuse the account of another employee then it can be easily identified. The data security is
ensured by this software.
Cost
The installment of this software can cost up to $3000 per year to an individual system.
Figure 1: Features of YesWare
(i) Data access to employees
Every company owns the emails that are professional and official and the employees present
in the company can access the emails of other employees so this can be an issue for the
employees those do not likely to share their emails with anyone and want to keep them
confidential (Janakova, M. (2018). Therefore, this is the responsibility of the company to
provide such services for the employees.
Consequences
The data security of an employee is absent.
An employee can feel uncomfortable with the absence of privacy of the mails.
The account of the employee can be used by anyone and can cause a major issue to
the employee.
Alternative
In order to resolve this particular issue, the use of a software named as the YesWare software
is installed that tracks emails of the employees and help them to keep a check on the
employee's activities (Ahrend, J. M., & Jirotka, M. 2017). By doing this if any employee
misuse the account of another employee then it can be easily identified. The data security is
ensured by this software.
Cost
The installment of this software can cost up to $3000 per year to an individual system.
Figure 1: Features of YesWare

(ii) Optimal anti-virus is absent
Anti-viruses are the guards of the computer systems that help these systems from getting
attacked with different viruses that can result in slowing down the speed of the system and
reduce efficiency. It is important for a company to use an effective anti-virus that can protect
every system that is present in the company. The company was using obsolete software for
the protection so this needs replacement.
Consequences:
Slowing down of working of systems, therefore, efficiency decrease.
Problems related to the system boots start occurring.
The virus can transfer from another and can harm every system present in the
company.
Information that is confidential can be leaked.
Alternative:
The use of Quick Heal anti-virus is adopted so as to improve the quality of protection given
to the computer systems (Sahay, S. K., & Sharma, A. 2019). There are various features of this
anti-virus that are the optimized and effective protection of the systems, managing passwords
and provide backups as well. Many others are also there but major features are these.
Cost:
The implementation of this software is around $40 per year per system.
Figure 2: Quick Heal Anti-Virus
Anti-viruses are the guards of the computer systems that help these systems from getting
attacked with different viruses that can result in slowing down the speed of the system and
reduce efficiency. It is important for a company to use an effective anti-virus that can protect
every system that is present in the company. The company was using obsolete software for
the protection so this needs replacement.
Consequences:
Slowing down of working of systems, therefore, efficiency decrease.
Problems related to the system boots start occurring.
The virus can transfer from another and can harm every system present in the
company.
Information that is confidential can be leaked.
Alternative:
The use of Quick Heal anti-virus is adopted so as to improve the quality of protection given
to the computer systems (Sahay, S. K., & Sharma, A. 2019). There are various features of this
anti-virus that are the optimized and effective protection of the systems, managing passwords
and provide backups as well. Many others are also there but major features are these.
Cost:
The implementation of this software is around $40 per year per system.
Figure 2: Quick Heal Anti-Virus
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

(iii) The issue regarding internet accessing:
The organization currently uses the ADSL in order to access the internet with the help of
router of D-Link DSL-2740B wireless. This is the router that is wireless and is very effective
in order to provide internet access for the organization. The limitation that this router is the
slow speed of the internet that hamper the work of employees.
Consequences
High speed of internet is needed for efficient working.
The employee gets restricted in the limited content as more content can be taken from
the internet but due to lack of speed, it is not possible.
The communication can affect the employees from different branches due to lack of
speed on the internet.
The applications that work through the internet may not properly work.
Alternative
This problem can be resolved by replacing the router with the local area network. This is the
method through which this internet speed problem can be resolved and it helps in providing
an ultimate speed to the users (Zabawa, M. 2018). The LAN helps to create a stable network
with the internet that does not hamper the work of the employee and can result in growth and
advancement of the company by increasing the efficiency of the employees working.
Cost:
The installment cost of the local area network according to the 100 users per year will be
approximately $20,000 to $50,000.
Figure 3: LAN
(iv) Unsecured stored data
The company uses the QNap TS-412 NAS for the backup data that is not effective and
require updates to the current technique of data storage is replaced by the cloud technology
The organization currently uses the ADSL in order to access the internet with the help of
router of D-Link DSL-2740B wireless. This is the router that is wireless and is very effective
in order to provide internet access for the organization. The limitation that this router is the
slow speed of the internet that hamper the work of employees.
Consequences
High speed of internet is needed for efficient working.
The employee gets restricted in the limited content as more content can be taken from
the internet but due to lack of speed, it is not possible.
The communication can affect the employees from different branches due to lack of
speed on the internet.
The applications that work through the internet may not properly work.
Alternative
This problem can be resolved by replacing the router with the local area network. This is the
method through which this internet speed problem can be resolved and it helps in providing
an ultimate speed to the users (Zabawa, M. 2018). The LAN helps to create a stable network
with the internet that does not hamper the work of the employee and can result in growth and
advancement of the company by increasing the efficiency of the employees working.
Cost:
The installment cost of the local area network according to the 100 users per year will be
approximately $20,000 to $50,000.
Figure 3: LAN
(iv) Unsecured stored data
The company uses the QNap TS-412 NAS for the backup data that is not effective and
require updates to the current technique of data storage is replaced by the cloud technology
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

which provides the unlimited storage memory for the data and information along with the
company data security.
Consequences:
The information of the clients of the company as well as the employees of the
company is on high risk.
The essential and confidential information is not safe.
The data can be stolen that can cause heavy loss to the company.
The profits that the company can earn are on high risk.
Authenticity is jeopardized.
Alternative:
The replacement of the QNap can be done by using cloud technology (Weigel, E. G. 2015).
This is very effective as well as an efficient technology that helps in providing the maximum
storage capacity and security to the customers as well. The maintenance is also easy and
helps in providing large access to the network with a huge amount of space and is also very
economical (Pottie, G. J., & Kaiser, W. J. 2000). These features make this technology
advanced and effective and almost every organization is switching on this technology.
Cost:
The cost of implementation of this cloud technology approximately starts from $100 per
month to $200 and other costs like storage, implementation is separately added.
Figure 4: Features of Cloud
v) Using the older version of the Windows in the Laptops
As the organization is currently using the Windows 10 laptops rather than the latest version
of Windows 10 as it is quite updated now (Press, C. R. C. 2016). The company should switch
company data security.
Consequences:
The information of the clients of the company as well as the employees of the
company is on high risk.
The essential and confidential information is not safe.
The data can be stolen that can cause heavy loss to the company.
The profits that the company can earn are on high risk.
Authenticity is jeopardized.
Alternative:
The replacement of the QNap can be done by using cloud technology (Weigel, E. G. 2015).
This is very effective as well as an efficient technology that helps in providing the maximum
storage capacity and security to the customers as well. The maintenance is also easy and
helps in providing large access to the network with a huge amount of space and is also very
economical (Pottie, G. J., & Kaiser, W. J. 2000). These features make this technology
advanced and effective and almost every organization is switching on this technology.
Cost:
The cost of implementation of this cloud technology approximately starts from $100 per
month to $200 and other costs like storage, implementation is separately added.
Figure 4: Features of Cloud
v) Using the older version of the Windows in the Laptops
As the organization is currently using the Windows 10 laptops rather than the latest version
of Windows 10 as it is quite updated now (Press, C. R. C. 2016). The company should switch

to the updated latest version in order to get all the new features and make the work even more
effective.
Consequences:
Security issues can be created.
Risk regarding the third-party issue is also being encountered.
A wanna cry risk could affect the system really bad.
Alternative:
The substitute for this could be the latest updated version of the Windows 10 (Singh, V., &
Margam, M. 2018). As the latest version contains the latest features that could sort many
other issues along with this single issue. This could really be helpful as it provides a number
of features and Cortana is the assistant or we could say the virtual assistant provided here.
Cost:
The cost could be $199 annually.
Figure 5: Latest Windows 10
effective.
Consequences:
Security issues can be created.
Risk regarding the third-party issue is also being encountered.
A wanna cry risk could affect the system really bad.
Alternative:
The substitute for this could be the latest updated version of the Windows 10 (Singh, V., &
Margam, M. 2018). As the latest version contains the latest features that could sort many
other issues along with this single issue. This could really be helpful as it provides a number
of features and Cortana is the assistant or we could say the virtual assistant provided here.
Cost:
The cost could be $199 annually.
Figure 5: Latest Windows 10
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Summary
The report is created in order to identify at least eighteen issues that can be faced and the
optimal solution for each issue with the description, the consequences and the cost of
installing the solution is provided in this report. The organization uses the tools and
techniques that are not optimized and efficient so the replacement of these tools is required
that is given in this report. With the help of diagrams, the features and components of the
provided solution are explained and attached along with the report.
The report is created in order to identify at least eighteen issues that can be faced and the
optimal solution for each issue with the description, the consequences and the cost of
installing the solution is provided in this report. The organization uses the tools and
techniques that are not optimized and efficient so the replacement of these tools is required
that is given in this report. With the help of diagrams, the features and components of the
provided solution are explained and attached along with the report.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Glossary
Glossary
Quick Heal Antivirus This is the antivirus that helps in keeping the
dangerous viruses away from the systems.
IPS/IDS Intrusion Prevention as well as the Intrusion
detection system.
QNap This is one of the software that could be used
for storing the data.
Windows 10 pro Updated part of Windows 10.
YesWare Software The software that helps in protecting the
emails by tracking the whole system.
LAN Local Area Network used for internet
connection purposes.
Glossary
Quick Heal Antivirus This is the antivirus that helps in keeping the
dangerous viruses away from the systems.
IPS/IDS Intrusion Prevention as well as the Intrusion
detection system.
QNap This is one of the software that could be used
for storing the data.
Windows 10 pro Updated part of Windows 10.
YesWare Software The software that helps in protecting the
emails by tracking the whole system.
LAN Local Area Network used for internet
connection purposes.

References
1. Janakova, M. (2018). Crm & social networks. Academy of Strategic Management
Journal, 17(5), 1-15.
2. Weigel, E. G. (2015). Modern graduate student mentors: Evidence-based best
practices and special considerations for mentoring undergraduates in ecology and
evolution. Ideas in Ecology and Evolution, 8(1).
3. Singh, V., & Margam, M. (2018). Information Security Measures of Libraries of
Central Universities of Delhi: A Study. DESIDOC Journal of Library & Information
Technology, 38(2), 102-109.
4. Sharma, S., Krishna, C. R., & Sahay, S. K. (2019). Detection of advanced malware by
machine learning techniques. In Soft Computing: Theories and Applications (pp. 333-
342). Springer, Singapore.
5. Sahay, S. K., & Sharma, A. (2019). A Survey on the Detection of Windows Desktops
Malware. In Ambient Communications and Computer Systems (pp. 149-159).
Springer, Singapore.
6. Zarghoon, A., Awan, I., Disso, J. P., & Dennis, R. (2017, December). Evaluation of
AV systems against modern malware. In 2017 12th International Conference for
Internet Technology and Secured Transactions (ICITST) (pp. 269-273).
7. Zabawa, M. (2018). Computers are humans: on conceptual metaphors in the semantic
field of computers and the Internet in Polish.
8. Song, T., Kim, T. Y., Kim, W., & Pack, S. (2016, January). Channel bonding
algorithm for densely deployed wireless LAN. In 2016 International Conference on
Information Networking (ICOIN) (pp. 395-397).
9. Hamidi, E. Z., Dzudin, L. S., Faroqi, A., & Ramdhani, M. A. (2018, January). The
Implementation of Alert System for LAN Network Monitoring Using the Dude Based
Email. In IOP Conference Series: Materials Science and Engineering (Vol. 288, No.
1, p. 012054). IOP Publishing.
10. Negra, R., Jemili, I., & Belghith, A. (2016). Wireless body area networks:
Applications and technologies. Procedia Computer Science, 83, 1274-1281.
11. Chen, M., Zhang, Y., Hu, L., Taleb, T., & Sheng, Z. (2015). Cloud-based wireless
network: Virtualized, reconfigurable, smart wireless network to enable 5G
technologies. Mobile Networks and Applications, 20(6), 704-712.
12. Georgiadis, L., Neely, M. J., & Tassiulas, L. (2006). Resource allocation and cross-
layer control in wireless networks. Foundations and Trends® in Networking, 1(1), 1-
144.
13. Pottie, G. J., & Kaiser, W. J. (2000). Wireless integrated network
sensors. Communications of the ACM, 43(5), 51-58.
14. Negra, R., Jemili, I., & Belghith, A. (2016). Wireless body area networks:
Applications and technologies. Procedia Computer Science, 83, 1274-1281.
15. Press, C. R. C. (2016). Wireless sensor networks: Current status and future trends.
CRC press.
1. Janakova, M. (2018). Crm & social networks. Academy of Strategic Management
Journal, 17(5), 1-15.
2. Weigel, E. G. (2015). Modern graduate student mentors: Evidence-based best
practices and special considerations for mentoring undergraduates in ecology and
evolution. Ideas in Ecology and Evolution, 8(1).
3. Singh, V., & Margam, M. (2018). Information Security Measures of Libraries of
Central Universities of Delhi: A Study. DESIDOC Journal of Library & Information
Technology, 38(2), 102-109.
4. Sharma, S., Krishna, C. R., & Sahay, S. K. (2019). Detection of advanced malware by
machine learning techniques. In Soft Computing: Theories and Applications (pp. 333-
342). Springer, Singapore.
5. Sahay, S. K., & Sharma, A. (2019). A Survey on the Detection of Windows Desktops
Malware. In Ambient Communications and Computer Systems (pp. 149-159).
Springer, Singapore.
6. Zarghoon, A., Awan, I., Disso, J. P., & Dennis, R. (2017, December). Evaluation of
AV systems against modern malware. In 2017 12th International Conference for
Internet Technology and Secured Transactions (ICITST) (pp. 269-273).
7. Zabawa, M. (2018). Computers are humans: on conceptual metaphors in the semantic
field of computers and the Internet in Polish.
8. Song, T., Kim, T. Y., Kim, W., & Pack, S. (2016, January). Channel bonding
algorithm for densely deployed wireless LAN. In 2016 International Conference on
Information Networking (ICOIN) (pp. 395-397).
9. Hamidi, E. Z., Dzudin, L. S., Faroqi, A., & Ramdhani, M. A. (2018, January). The
Implementation of Alert System for LAN Network Monitoring Using the Dude Based
Email. In IOP Conference Series: Materials Science and Engineering (Vol. 288, No.
1, p. 012054). IOP Publishing.
10. Negra, R., Jemili, I., & Belghith, A. (2016). Wireless body area networks:
Applications and technologies. Procedia Computer Science, 83, 1274-1281.
11. Chen, M., Zhang, Y., Hu, L., Taleb, T., & Sheng, Z. (2015). Cloud-based wireless
network: Virtualized, reconfigurable, smart wireless network to enable 5G
technologies. Mobile Networks and Applications, 20(6), 704-712.
12. Georgiadis, L., Neely, M. J., & Tassiulas, L. (2006). Resource allocation and cross-
layer control in wireless networks. Foundations and Trends® in Networking, 1(1), 1-
144.
13. Pottie, G. J., & Kaiser, W. J. (2000). Wireless integrated network
sensors. Communications of the ACM, 43(5), 51-58.
14. Negra, R., Jemili, I., & Belghith, A. (2016). Wireless body area networks:
Applications and technologies. Procedia Computer Science, 83, 1274-1281.
15. Press, C. R. C. (2016). Wireless sensor networks: Current status and future trends.
CRC press.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




