logo

Cybersecurity: Importance, Vulnerabilities, Emerging Threats, and Recommendations

   

Added on  2022-11-13

13 Pages3502 Words179 Views
Running head: CYBERSECURITY
Cyber security
Name of the Student
Name of the University
Author’s Note

CYBERSECURITY
1
Table of Contents
1. Introduction.........................................................................................................................2
2. Explanation about cyber security and its importance in ABCT.............................................2
3. Identification as well as explanation of three security vulnerabilities...................................3
4. Five different types of emerging threats................................................................................5
5. Recommendation for protecting both home and office from cyber attack............................7
6. Conclusion..............................................................................................................................9
Bibliography.............................................................................................................................10

CYBERSECURITY
2
1. Introduction
The paper mainly reflects on ABCT organization whose business line generally stars from
various types of tech products including the hardware as well as software. The main aim of
the organization is to secure the data of the customers and for this the organization wants to
prepare a proper document on cybersecurity for training their staffs on cybersecurity. It is
found that the information associated with cybersecurity not only helps in reducing security
related issues but will also be helpful in improving the entire security system. The paper
mainly reflects on the importance of cybersecurity as well as about the three security
vulnerabilities that is present within the ABCT system. In addition to this, proper research is
generally done in order to list five various types of threats that are emerging with appropriate
recommendations that are generally helpful in protecting both the office and home from the
problem of cybersecurity.
2. Explanation about cyber security and its importance in ABCT
According to Furfaro et al. (2017), cyber security is defined as one of the important
technique that is used for protecting the integrity of the network as well as programs from
damage and authorized access. It is also considered as one of the practice that is generally
utilized in order to properly defend the servers as well as the computers from different types
of malicious attacks.
It is found that the organization “ABCT” which is one of the Australian technology
companies that ranges from different types of high tech products that include both software as
well as hardware. It is found that the organization generally helps in allowing its employees
the facility of work from home and additionally utilizes policy of having Bring your Own
Device. Currently the organization has 10,000 customers and the data as well as information
of the customers are generally stored within the cloud. As the organization is the victim of

CYBERSECURITY
3
different types of cyber security and therefore the organization is always concerned about the
ways through which a keep the data of the customers secure which further be helpful in
maintaining their revenue. In order to keep the data secure, the organization wants cyber
security related measures that would be helpful in improving the entire security systems as
well as security related policies.
3. Identification as well as explanation of three security vulnerabilities
The three different types of cybersecurity vulnerabilities that generally occur within
the ABCT organization are generally illustrated with proper explanation.
Insecure cryptography: Cryptography based algorithm generally requires different
types of random number generators that generally utilizes different types of unpredictable
sources of information and data for generating proper random numbers that is generally
needed for obtaining large entropy ad it is analyzed that the number can be brute forced (Ani,
He & Tiwari, 2017). Within the client computers, it is found that main sources that are related
with randomization is by key presses or with the help of the mouse movement however, it is
identified that the servers generally without the interaction of the user that further creates
randomization (Clark et al., 2017). It is found that these types of insecure cryptography can
increase security related vulnerabilities in ABCT organization as all the data are stored in the
cloud.
Security misconfiguration: Security misconfiguration generally includes different
types of vulnerabilities as well as issues that are generally cantered based on the lack of
proper maintenance or due to the lack of attention within the entire web application related
configuration (Kshetri, 2015). It is found that a secured configuration within the website of
ABCT organization generally needs to be deployed for the frameworks, application servers as
well as web servers as well as database servers. Moreover, it is analyzed that the security

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity Risks and Recommendations for ABCT
|13
|3833
|55

Cybersecurity Threats and Recommendations for ABCT Organization
|12
|3497
|88

Emerging Security Threats
|12
|3912
|46

Importance of Cybersecurity for ABCT
|15
|3960
|94

Cybersecurity and its Importance to ABCT
|5
|959
|422

Cyber Security for ABCT
|13
|3526
|21