Cyber Security Report

   

Added on  2023-01-10

10 Pages3317 Words98 Views
Cyber Security Report
Cyber Security Report_1
Table of Contents
Introduction......................................................................................................................................1
Overview of Case...................................................................................................................1
1 Formulate disaster recovery plan for incident that is experienced by firm.........................1
2 Develop response summary for incident.............................................................................4
3 Prepare security incident checklist that can be utilised by firm when they have compromised
................................................................................................................................................6
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
Cyber Security Report_2
Introduction
Cyber security is defined as body of processes, practices and technologies which are
designed for protection of programs, data, networks and programs from any kind of damage,
attack or unauthenticated access (David, Keupp and Mermoud, 2020). It is also denoted by
information technology security. It is the practice that defends servers, electronic systems, data,
mobile devices, computers, networks and computers. With reference to organisations, it is
critical that they have adequate, policies, strategies and procedures that will assist them to secure
their systems in precise manner and carry out their functionalities effectively. Cyber security aids
firms to make sure that they can protect devices from third party attacks. This report is based on
ITBase which is publicly traded firm that is regarded as a market leader within highly
competitive as well as multi-billion dollar infrastructure IT market. This report will provide an
insight into disaster recovery plan and furnish response summary for the incident that have been
occurred. Apart from this, security incident checklist must be prepared that firm can use when
their assets have been intercepted by intruders.
Overview of Case
ITBase is an IT firm who has decided to add layer of security defence in order to identify
that their systems have been compromised. But when it was carried out then it was identifies that
their server is being utilised like a launching pad to attack other firms. For this organisation have
hired SeekSecNet which is a network security organisation that will formulate external
penetration test. ITBase is making use of firewall for protection of their networks but it was
identified that there logs were hardly reviewed and any kind of intrusion detection capabilities
were not executed. The fact was that the firm did not know that their server is compromised
unless unrelated firm contacted them for the network attack which was organised from their
network. But if they have not been notified by the firm then they will be compromised for many
more months. There is a probability that many firms might have been impacted but may not
know this. To have complete analysis of incident organisation have contacted SeekSecNet
through which they can prevent their system from getting compromised in future.
1 Formulate disaster recovery plan for incident that is experienced by firm
The structured and documented approach that is liable for illustration of ways in which
firm can resume their operations from any kind of unplanned incident is referred to as disaster
1
Cyber Security Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Importance of Cyber Security in Retail Industry
|21
|7572
|72

Significance of Cyber Security in Business: A Case Study on Retail Industry
|16
|943
|42

What Is Business Continuity and Why Is It Important?
|10
|1590
|14

Cyber Security Threats and Information Governance
|16
|4128
|21

Embedding Cyber Resilience Principles for Board
|16
|2997
|436

Application of Risk Mitigation and Planning Tools
|3
|830
|42