logo

Methods to Address Cybersecurity Issues in JL Organization

   

Added on  2023-06-03

13 Pages2416 Words109 Views
Running Head: COMPUTER SECURITY
0
Methods to Address Cybersecurity Issues in JL Organization_1
COMPUTER SECURITY
1
Contents
Introduction...........................................................................................................................................2
Cybersecurity issues..............................................................................................................................2
Ransomware attack...........................................................................................................................2
DOS and DDOS attack........................................................................................................................3
Poor passwords.................................................................................................................................4
Phishing.............................................................................................................................................4
Unprecedented Attacks.....................................................................................................................5
Methods to reduce the cybersecurity issues.........................................................................................6
Encryption method............................................................................................................................6
Cryptography.....................................................................................................................................7
Firewall software...............................................................................................................................8
Antivirus and backup plans................................................................................................................8
Comparison of the chosen solution and alternative solutions...............................................................8
Breakdown of the cost of addressing the security issue........................................................................9
Conclusion...........................................................................................................................................10
References...........................................................................................................................................11
Methods to Address Cybersecurity Issues in JL Organization_2
COMPUTER SECURITY
2
Introduction
Security of data or information is a very common problem for JL organization
and in the last five years the problem of cybersecurity has increased. The JL
organization started their company with few employees and it provides various kinds of
online services to their customers and currently, only five people are working in this
organization (Abomhara, & Køien, 2015). The main purpose of this report is to
understand the fundamental concept of cybersecurity issues and methods to address
the issues of computer securities. In the last few months, the employees of JL
organization was facing the issue of performance, computer systems were not working
properly and some malware are observed on the server of JL. The employees and
manager of JL Company use D-link wireless routers which are very less secure and
hackers use malicious software to block the networks of JL organization. This report is
divided into four parts such as cybersecurity issues, methods to address these issues, a
comparison between chosen methods and alternative approaches and cost of
technologies or software.
Cybersecurity issues
There are many kinds of cybersecurity issues and threats identified that are
faced by JL organization and their employees:
Ransomware attack
It is a very common security threat and cyber-attack which is a very serious
problem for JL organization. It is a type of virus that attacks human peripheral devices
like computer and mobile (AbouZahr, et al., 2015). In which first hackers send
unwanted signals or mails to JL employees and after that, they collect all relevant data,
for example, IP address and type of data links. Attackers use malware and botnet
process to block the servers of JL and they store all personal information of consumers.
At the end of ransomware attack hackers communicate with consumers and employees
of JL through social Media and demand money to restore back their data. The employees
of JL Company has identified that their data files and computer networks were
corrupted and encrypted by attackers (Buczak, & Guven, 2016). Due to this kind of
cyber issue the performance and efficiency of computer networks are also decreased.
Methods to Address Cybersecurity Issues in JL Organization_3
COMPUTER SECURITY
3
Figure: ransomware attack steps
(Source: Gupta, Agrawal, & Yamaguchi, 2016)
DOS and DDOS attack
DOS is defined as a denial of services attack that is a very serious problem in the
field of computer networks. In which hackers produce a large number of traffic signals
and unwanted data with the help of malware software. JL organization faced the
problem of DOS and DDOS because their employees use unauthorized websites. It is
identified the JL community use wireless networks for communication purpose but they
do not use any security system due to which the problem of DOS attack has occurred. In
DOS attack hackers use flooding process and generate complex algorithm to block the
servers of JL organization.
Methods to Address Cybersecurity Issues in JL Organization_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ransomware & Malware
|5
|581
|276

DDOS attack
|5
|1194
|491

Cyber security Attacks | Assessment 1
|7
|1374
|30

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Introduction to Cyber Security
|14
|3209
|388

Security and Risk Management Assignment 2022
|12
|2790
|15