This assignment addresses the concept of cybersecurity and its importance to ABCT, a technology company based in Australia. It discusses the common types of cyber attacks, the vulnerabilities of ABCT's systems, emerging cyber threats, and ways to secure both office and home users from cyberattacks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Cybersecurity Student Name Institution Course Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Rough Draft This assignment attempts to address the concept of cybersecurity and why it is important to any organization. This has been attributed to the recent increase in the number of cyber crimes as a result of enhancement and improvement of internet use and the emergence of cloud computing.Someofthecommontypesofcyberattacksthatareexperiencedbymany organizations include main in the middle attacks, phishing, denial of service attacks, malware attacks among others. As a result, cyber security has become an essential aspect towards protecting the organization’s critical resources such as data and information. This paper will focus on ABC Technology (ABCT) which is a technology company based in Australia and deals with a number of businesses including high-tech hardware and software. The company has several branches across the country and two offices outside the country. The company utilizes virtual private network which is maintained in the head office located in Canberra. Employees are able to work remotely and access company network remotely via VPN connections. The company has in the recent times experienced a number of cyberattacks and the company believes that critical resources such as data has been compromised and this might have great consequences including loss of revenue and losing customer trust. In response to these attacks, the company has hired a cyber security consultancy firm to assess the current situation within ABCT and train its staff on the best practices. This is because cyber security has become a very crucial aspect in today’s digital era in order to secure data, information, applications, hardware, networks, and systems that are of essence to the company from cyberattacks in order to ensure availability of resources, confidentiality, and integrity. Another objective of this research is to provide a document that will be able to guide the users and the company at large to prevent the risks that the company and staff at ABCT from losing or damaging sensitive data, theft of private/confidential data, identity theft, loss of intellectual property, or interrupting the normal business operations. The sections that will be covered in this research include: Definition of cyber security and its importance to ABCT Identification of security vulnerabilities of the systems within ABCT Description of emerging cyberthreats that may affect ABCT
Provide ways and techniques to secure both office and home users from cyberattacks. By doing so, the critical cyber security aspects that are important for ABCT will be captured and findings presented to the relevant departments for action. As argued by Kazan (2016), one of the main reasons that is driving business to adopt Bring Your Own Device (BYOD)policy is because of the need to provide flexible working environment. This might have been one of the driving factors that led to ABCT adopting this policy. However, such a policy could be very dangerous to the company’s IT security if proper security systems are not in place because allowing employees to work remotely creates more loop holes for cyber criminals to access the company system. A number of decisions that the company has made towards adoption of technology may have been good but not the best especially when it comes to security. As it will be discussed later in the report, the company opens up its IT systems to the outside world by allowing BYOD or guest Wi-Fi. The chances and risk of data bridge is increases majorly because the company has no control over what the users access from their computers while working remotely. As mentioned by Augebaum (2019), the IT infrastructure is opened up to more cyber threats providing a weak link for hackers and other criminals to access the company’s IT infrastructure.However, more details will be provided in the final report on the other points that need to be captured,
References Ahn, J. (2018). Issues Presented by Cybersecurity Information Sharing Act 2015.Yonsei Law Review,28(4), 259-282. doi: 10.21717/ylr.28.4.8 Ali, A. (2013). Cyberattacks: a menace to global trade.Competitiveness Review,23(1). doi: 10.1108/cr.2013.34723aaa.001 Augenbaum, S. (2019).The secret to cybersecurity. New Manila: Forefront Books. Bradshaw,S.(2015).CombatingCyberThreats:CSIRTsandFosteringInternational Cooperation on Cybersecurity.SSRN Electronic Journal. doi: 10.2139/ssrn.2700899 Campbell,C.(2016).ProtectyourSystemfromCyberattacks!.Opflow,42(8),8-11.doi: 10.5991/opf.2016.42.0045 Collier, P., & Friedman, A. (2014).Cybersecurity and cyberwar. New york: Oxford University Press. Eaton,T.,Grenier,J.,&Layman,D.(2019).AccountingandCybersecurityRisk Management.Current Issues In Auditing. doi: 10.2308/ciia-52419 Fisher,B.(2016).AddressingPressingCybersecurityIssuesthroughCollaboration.IT Professional,18(4), 66-69. doi: 10.1109/mitp.2016.65 Jaccard,J.(2013).Cybersecuritythreatsincloudcomputing.AustralianJournalOf Telecommunications And The Digital Economy,1(1), 58-74. doi: 10.18080/ajtde.v1n1.128 Kazan, H. (2016). Contemporary Issues in Cybersecurity.Journal Of Cybersecurity Research (JCR),1(1), 1. doi: 10.19030/jcr.v1i1.9745 Kerfoot, T. (2012). Cybersecurity: Towards a Strategy for Securing Critical Infrastructure from Cyberattacks.SSRN Electronic Journal. doi: 10.2139/ssrn.2285587 Markov, A., &Tsirlov, V. (2014). Guidelinesfor Cybersecurityin theContextof ISO 27032.Voprosy Kiberbezopasnosti, (1(2), 28-35. doi: 10.21681/2311-3456-2014-1-28-35
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Minton, S. (2018). The Value of AI Tools: Some Lessons Learned.AI Magazine,38(3), 99-101. doi: 10.1609/aimag.v38i3.2747 Nam, T. (2019). Understanding the gap between perceived threats to and preparedness for cybersecurity.Technology In Society. doi: 10.1016/j.techsoc.2019.03.005 Rizov,V.(2018).InformationSharingforCyberThreats.Information&Security:An International Journal,39(1), 43-50. doi: 10.11610/isij.3904 Shrobe, H., Shrier, D., & Pentland, A. (2018).New solutions for cybersecurity. London: MIT Press. Smith, P. (2015). Cyberattacks as Casus Belli: A Sovereignty-Based Account.Journal Of Applied Philosophy,35(2), 222-241. doi: 10.1111/japp.12169 Trappe,W.,&Straub,J.(2018).Cybersecurity:ANewOpenAccess Journal.Cybersecurity,1(1), 1. doi: 10.3390/cybersecurity1010001 Wilson, A. (2014). Control-System Cybersecurity: Staying Ahead of Evolving Threats.Journal Of Petroleum Technology,66(08), 122-125. doi: 10.2118/0814-0122-jpt