logo

Cyber Security Analysis Report

   

Added on  2022-08-09

7 Pages1356 Words51 Views
2/20/2020
Running Head: CYBERSECURITY 0
Student name
Cybersecurity
Report
Cyber Security Analysis Report_1
CYBERSECURITY 1
Introduction
Cybercrime has increased day-by-day in various industries, which is a huge issue in
the market for many businesses. The number of cyber-attacks has increased in the retail
industry because of vulnerabilities in their systems as well as other reasons, such as lack of
knowledge, lack of security systems, and security policies (Chang, 2017). This report will
analyze the vulnerabilities of the Abdullah Al-Othaim Markets Company based on many
criteria. This report will be discussed about the risks and threats for the company as well as
the retail industry. In this report, protentional solutions will provide for the company to
manage its different processes using cybersecurity. mitigations strategies will provide for the
company in the later section of this report. The firm has operated their business at two places,
which are Egypt and Saudi Arabia. The firm has focused on three main activities which are
malls, grocery stores, and food wholesaling (Othaimmarkets, 2020).
Risks, Threats, and Vulnerabilities
The company is running 231 stores in Saudi Arabia. The company has created a good
position in the market as well. In addition, there are some vulnerabilities on the website of the
company as well as lack of knowledge in the managers and employees about the online retail
business, which is a huge issue in front of the firm (Fruhlinger, 2018). We can categorize the
risks, threats, and vulnerabilities, which areas:
Device-based risks:
The company has used basic computer systems and servers, which are not secure from
firewalls and other IDS/IPS systems. Hackers can access those systems and servers using a
different types of malicious programs (Klemash, 2018). The firm has stored its customer's
data in its database, which can be breached by the attacks as well. In addition, hackers can
exchange information from databases as well. It is a huge risk that systems have used without
updating operating systems as well.
Software and database risks:
There is some basic software have used for managing and monitoring retail business.
It is necessary to use legal and ethical software for managing the website. SQL Injection can
be used for accessing data and devices of the company (Loader & Thomas, 2013).
Cyber Security Analysis Report_2
CYBERSECURITY 2
Source: (Quiocho, 2018)
A malware attacks can be used by hackers for changing information as well as other
malicious programs as well (Margaret, 2019).
Network-based risks
The network has used for accessing data and information from the website as well as
information systems. Thus, it can be a huge risk for the company to lack in network security.
Man-in-middle is a popular attack, which has used by the hacker for accusing information
between company and customers. Moreover, Denial of Service (DoS) attack is a common
attack in the present era, which can stop all the services of a firm including data access,
network access, and many others (Von Solms & Van Niekerk, 2013).
Source: (Margaret, 2019)
Cyber Security Analysis Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Assignment PDF
|9
|2867
|2114

Hacking and Cybersecurity
|4
|705
|70

Risk Management
|9
|2006
|299

Cybersecurity: Protecting Home and Office from Cyberattacks
|12
|2626
|224

Cybersecurity Threat Name of the Student
|11
|2321
|49

Information and Systems Security
|7
|1270
|80