logo

Cyber Security Threat Assessment for Emirates

11 Pages2499 Words395 Views
   

Added on  2019-11-26

About This Document

CYBER THREAT ASSESSMENT FOR EMIRATES AIRLINE 10 CYBER THREAT ASSESSMENT FOR EMIRATES AIRLINE Cyber Threat Assessment for Emirates Online Name of the Lecturer: Date: Author Note: Executive Summary The report serves the purpose of providing Emirates Airlines, an aviation organisation of United Arab Emirates, with the insight of the cyber security threats that can cause financial as well as reputational harm to the organisation. However, the airlines that are responsible for the protection of the

Cyber Security Threat Assessment for Emirates

   Added on 2019-11-26

ShareRelated Documents
Running head: CYBER THREAT ASSESSMENT FOR EMIRATES AIRLINECyber Threat Assessment for Emirates OnlineName of the Student:Name of the University:Name of the Lecturer:Date:Author Note:
Cyber Security Threat Assessment for Emirates_1
1CYBER THREAT ASSESSMENT FOR EMIRATES AIRLINEExecutive SummaryThe report serves the purpose of providing Emirates Airlines, an aviation organisation ofUnited Arab Emirates, with the insight of the cyber security threats that can cause financial aswell as reputational harm to the organisation. Critical analysis is conducted to identify thecyber threats that have been concerning the cyber law enforcers for the past few years. Thecyber threats are determined that can cause damage to the chosen organisation as well assolutions are provided to prevent such attacks. The report concludes with suggestionsregarding safeguarding the information assets of the company.
Cyber Security Threat Assessment for Emirates_2
2CYBER THREAT ASSESSMENT FOR EMIRATES AIRLINETable of Contents1. Introduction............................................................................................................................32. Top Global Security Threats..................................................................................................32.1. Ransomware Attack........................................................................................................42.2. Risks due to Internet of Things.......................................................................................52.3. Phishing Attacks..............................................................................................................52.4. DoS or DDoS attacks......................................................................................................52.5. Cyber Espionage.............................................................................................................63. Methods of Mitigating the Threats.........................................................................................64. Suggestions to Secure the Information Assets of Emirates...................................................75. Conclusion..............................................................................................................................86. References..............................................................................................................................9
Cyber Security Threat Assessment for Emirates_3
3CYBER THREAT ASSESSMENT FOR EMIRATES AIRLINE1. IntroductionCyber attacks and cyber threats are possibly the most pressing issue that hasconcerned the cyber-law enforcement agencies around the globe for past few years. Reportsof cyber attacks have continued to occupy the headlines of every newspaper worldwide. Thecyber law-breakers are always coming up with innovative methods and technologies to causehavoc in the cyber world and keep busy the guardians of cyber security (Singer and Friedman2014). The agencies that are responsible for the protection of the cyber world are alwaysinvolved in developing new strategies, methods and technologies to disrupt the actions of thecyber criminals. However, the cyber criminals seem to outdo the protectors every time atevery instance (Robinson et al. 2013). This report serves the objective of informing Emirates Airlines regarding the cyberthreats that are concerning the cyber vigilantes for the past two years. It also analyses andprovides details on the impacts that such cyber threats may have on the organisation and itsoperations. Finally, the report provides suggestions on possible risk management measuresthat can be undertaken by the organisation to protect itself from such cyber assaults.2. Top Global Security ThreatsThe past few years has seen an intense level of activity in cyber attacks around theglobe that caused damage ranging from organisational to global. There has been anexponential growth in the frequency of cyber attacks lately. The attacks were carried out withdifferent methods and technology that had different effects and results (Andress andWinterfeld 2013). The global law-enforcement organisations constantly analyse these attacksand compare their complexities with other types of attack. Based on the final report the mostthreatening attacks are identified every year. In 2015, the top 5 cyber security threats were
Cyber Security Threat Assessment for Emirates_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Moral and Ethical Frameworks Concepts
|7
|1023
|69

Politically Motivated Hacking: Analysis, Examples and Defence
|12
|3306
|156

Comparison of Data Protection Laws in UAE and UK
|16
|4042
|70

Security Breach Incidents Report 2017
|12
|2682
|60

Information Technology Security
|13
|2712
|67

Cyber Security in Aviation
|115
|33698
|384