Cybersecurity and its Importance to ABCT
VerifiedAdded on 2023/03/31
|5
|959
|422
AI Summary
This assignment addresses the concept of cybersecurity and its importance to ABCT, a technology company based in Australia. It discusses the common types of cyber attacks, the vulnerabilities of ABCT's systems, emerging cyber threats, and ways to secure both office and home users from cyberattacks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Cybersecurity
Student Name
Institution
Course
Date
Student Name
Institution
Course
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Rough Draft
This assignment attempts to address the concept of cybersecurity and why it is important
to any organization. This has been attributed to the recent increase in the number of cyber crimes
as a result of enhancement and improvement of internet use and the emergence of cloud
computing. Some of the common types of cyber attacks that are experienced by many
organizations include main in the middle attacks, phishing, denial of service attacks, malware
attacks among others. As a result, cyber security has become an essential aspect towards
protecting the organization’s critical resources such as data and information.
This paper will focus on ABC Technology (ABCT) which is a technology company
based in Australia and deals with a number of businesses including high-tech hardware and
software. The company has several branches across the country and two offices outside the
country. The company utilizes virtual private network which is maintained in the head office
located in Canberra. Employees are able to work remotely and access company network
remotely via VPN connections. The company has in the recent times experienced a number of
cyberattacks and the company believes that critical resources such as data has been compromised
and this might have great consequences including loss of revenue and losing customer trust.
In response to these attacks, the company has hired a cyber security consultancy firm to
assess the current situation within ABCT and train its staff on the best practices. This is because
cyber security has become a very crucial aspect in today’s digital era in order to secure data,
information, applications, hardware, networks, and systems that are of essence to the company
from cyberattacks in order to ensure availability of resources, confidentiality, and integrity.
Another objective of this research is to provide a document that will be able to guide the users
and the company at large to prevent the risks that the company and staff at ABCT from losing or
damaging sensitive data, theft of private/confidential data, identity theft, loss of intellectual
property, or interrupting the normal business operations.
The sections that will be covered in this research include:
Definition of cyber security and its importance to ABCT
Identification of security vulnerabilities of the systems within ABCT
Description of emerging cyberthreats that may affect ABCT
This assignment attempts to address the concept of cybersecurity and why it is important
to any organization. This has been attributed to the recent increase in the number of cyber crimes
as a result of enhancement and improvement of internet use and the emergence of cloud
computing. Some of the common types of cyber attacks that are experienced by many
organizations include main in the middle attacks, phishing, denial of service attacks, malware
attacks among others. As a result, cyber security has become an essential aspect towards
protecting the organization’s critical resources such as data and information.
This paper will focus on ABC Technology (ABCT) which is a technology company
based in Australia and deals with a number of businesses including high-tech hardware and
software. The company has several branches across the country and two offices outside the
country. The company utilizes virtual private network which is maintained in the head office
located in Canberra. Employees are able to work remotely and access company network
remotely via VPN connections. The company has in the recent times experienced a number of
cyberattacks and the company believes that critical resources such as data has been compromised
and this might have great consequences including loss of revenue and losing customer trust.
In response to these attacks, the company has hired a cyber security consultancy firm to
assess the current situation within ABCT and train its staff on the best practices. This is because
cyber security has become a very crucial aspect in today’s digital era in order to secure data,
information, applications, hardware, networks, and systems that are of essence to the company
from cyberattacks in order to ensure availability of resources, confidentiality, and integrity.
Another objective of this research is to provide a document that will be able to guide the users
and the company at large to prevent the risks that the company and staff at ABCT from losing or
damaging sensitive data, theft of private/confidential data, identity theft, loss of intellectual
property, or interrupting the normal business operations.
The sections that will be covered in this research include:
Definition of cyber security and its importance to ABCT
Identification of security vulnerabilities of the systems within ABCT
Description of emerging cyberthreats that may affect ABCT
Provide ways and techniques to secure both office and home users from cyberattacks.
By doing so, the critical cyber security aspects that are important for ABCT will be captured
and findings presented to the relevant departments for action. As argued by Kazan (2016), one of
the main reasons that is driving business to adopt Bring Your Own Device (BYOD)policy is
because of the need to provide flexible working environment. This might have been one of the
driving factors that led to ABCT adopting this policy. However, such a policy could be very
dangerous to the company’s IT security if proper security systems are not in place because
allowing employees to work remotely creates more loop holes for cyber criminals to access the
company system.
A number of decisions that the company has made towards adoption of technology may have
been good but not the best especially when it comes to security. As it will be discussed later in
the report, the company opens up its IT systems to the outside world by allowing BYOD or guest
Wi-Fi. The chances and risk of data bridge is increases majorly because the company has no
control over what the users access from their computers while working remotely. As mentioned
by Augebaum (2019), the IT infrastructure is opened up to more cyber threats providing a weak
link for hackers and other criminals to access the company’s IT infrastructure. However, more
details will be provided in the final report on the other points that need to be captured,
By doing so, the critical cyber security aspects that are important for ABCT will be captured
and findings presented to the relevant departments for action. As argued by Kazan (2016), one of
the main reasons that is driving business to adopt Bring Your Own Device (BYOD)policy is
because of the need to provide flexible working environment. This might have been one of the
driving factors that led to ABCT adopting this policy. However, such a policy could be very
dangerous to the company’s IT security if proper security systems are not in place because
allowing employees to work remotely creates more loop holes for cyber criminals to access the
company system.
A number of decisions that the company has made towards adoption of technology may have
been good but not the best especially when it comes to security. As it will be discussed later in
the report, the company opens up its IT systems to the outside world by allowing BYOD or guest
Wi-Fi. The chances and risk of data bridge is increases majorly because the company has no
control over what the users access from their computers while working remotely. As mentioned
by Augebaum (2019), the IT infrastructure is opened up to more cyber threats providing a weak
link for hackers and other criminals to access the company’s IT infrastructure. However, more
details will be provided in the final report on the other points that need to be captured,
References
Ahn, J. (2018). Issues Presented by Cybersecurity Information Sharing Act 2015. Yonsei Law
Review, 28(4), 259-282. doi: 10.21717/ylr.28.4.8
Ali, A. (2013). Cyberattacks: a menace to global trade. Competitiveness Review, 23(1). doi:
10.1108/cr.2013.34723aaa.001
Augenbaum, S. (2019). The secret to cybersecurity. New Manila: Forefront Books.
Bradshaw, S. (2015). Combating Cyber Threats: CSIRTs and Fostering International
Cooperation on Cybersecurity. SSRN Electronic Journal. doi: 10.2139/ssrn.2700899
Campbell, C. (2016). Protect your System from Cyberattacks!. Opflow, 42(8), 8-11. doi:
10.5991/opf.2016.42.0045
Collier, P., & Friedman, A. (2014). Cybersecurity and cyberwar. New york: Oxford University
Press.
Eaton, T., Grenier, J., & Layman, D. (2019). Accounting and Cybersecurity Risk
Management. Current Issues In Auditing. doi: 10.2308/ciia-52419
Fisher, B. (2016). Addressing Pressing Cybersecurity Issues through Collaboration. IT
Professional, 18(4), 66-69. doi: 10.1109/mitp.2016.65
Jaccard, J. (2013). Cybersecurity threats in cloud computing. Australian Journal Of
Telecommunications And The Digital Economy, 1(1), 58-74. doi: 10.18080/ajtde.v1n1.128
Kazan, H. (2016). Contemporary Issues in Cybersecurity. Journal Of Cybersecurity Research
(JCR), 1(1), 1. doi: 10.19030/jcr.v1i1.9745
Kerfoot, T. (2012). Cybersecurity: Towards a Strategy for Securing Critical Infrastructure from
Cyberattacks. SSRN Electronic Journal. doi: 10.2139/ssrn.2285587
Markov, A., & Tsirlov, V. (2014). Guidelines for Cybersecurity in the Context of ISO
27032. Voprosy Kiberbezopasnosti, (1(2), 28-35. doi: 10.21681/2311-3456-2014-1-28-35
Ahn, J. (2018). Issues Presented by Cybersecurity Information Sharing Act 2015. Yonsei Law
Review, 28(4), 259-282. doi: 10.21717/ylr.28.4.8
Ali, A. (2013). Cyberattacks: a menace to global trade. Competitiveness Review, 23(1). doi:
10.1108/cr.2013.34723aaa.001
Augenbaum, S. (2019). The secret to cybersecurity. New Manila: Forefront Books.
Bradshaw, S. (2015). Combating Cyber Threats: CSIRTs and Fostering International
Cooperation on Cybersecurity. SSRN Electronic Journal. doi: 10.2139/ssrn.2700899
Campbell, C. (2016). Protect your System from Cyberattacks!. Opflow, 42(8), 8-11. doi:
10.5991/opf.2016.42.0045
Collier, P., & Friedman, A. (2014). Cybersecurity and cyberwar. New york: Oxford University
Press.
Eaton, T., Grenier, J., & Layman, D. (2019). Accounting and Cybersecurity Risk
Management. Current Issues In Auditing. doi: 10.2308/ciia-52419
Fisher, B. (2016). Addressing Pressing Cybersecurity Issues through Collaboration. IT
Professional, 18(4), 66-69. doi: 10.1109/mitp.2016.65
Jaccard, J. (2013). Cybersecurity threats in cloud computing. Australian Journal Of
Telecommunications And The Digital Economy, 1(1), 58-74. doi: 10.18080/ajtde.v1n1.128
Kazan, H. (2016). Contemporary Issues in Cybersecurity. Journal Of Cybersecurity Research
(JCR), 1(1), 1. doi: 10.19030/jcr.v1i1.9745
Kerfoot, T. (2012). Cybersecurity: Towards a Strategy for Securing Critical Infrastructure from
Cyberattacks. SSRN Electronic Journal. doi: 10.2139/ssrn.2285587
Markov, A., & Tsirlov, V. (2014). Guidelines for Cybersecurity in the Context of ISO
27032. Voprosy Kiberbezopasnosti, (1(2), 28-35. doi: 10.21681/2311-3456-2014-1-28-35
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Minton, S. (2018). The Value of AI Tools: Some Lessons Learned. AI Magazine, 38(3), 99-101.
doi: 10.1609/aimag.v38i3.2747
Nam, T. (2019). Understanding the gap between perceived threats to and preparedness for
cybersecurity. Technology In Society. doi: 10.1016/j.techsoc.2019.03.005
Rizov, V. (2018). Information Sharing for Cyber Threats. Information & Security: An
International Journal, 39(1), 43-50. doi: 10.11610/isij.3904
Shrobe, H., Shrier, D., & Pentland, A. (2018). New solutions for cybersecurity. London: MIT
Press.
Smith, P. (2015). Cyberattacks as Casus Belli: A Sovereignty-Based Account. Journal Of
Applied Philosophy, 35(2), 222-241. doi: 10.1111/japp.12169
Trappe, W., & Straub, J. (2018). Cybersecurity: A New Open Access
Journal. Cybersecurity, 1(1), 1. doi: 10.3390/cybersecurity1010001
Wilson, A. (2014). Control-System Cybersecurity: Staying Ahead of Evolving Threats. Journal
Of Petroleum Technology, 66(08), 122-125. doi: 10.2118/0814-0122-jpt
doi: 10.1609/aimag.v38i3.2747
Nam, T. (2019). Understanding the gap between perceived threats to and preparedness for
cybersecurity. Technology In Society. doi: 10.1016/j.techsoc.2019.03.005
Rizov, V. (2018). Information Sharing for Cyber Threats. Information & Security: An
International Journal, 39(1), 43-50. doi: 10.11610/isij.3904
Shrobe, H., Shrier, D., & Pentland, A. (2018). New solutions for cybersecurity. London: MIT
Press.
Smith, P. (2015). Cyberattacks as Casus Belli: A Sovereignty-Based Account. Journal Of
Applied Philosophy, 35(2), 222-241. doi: 10.1111/japp.12169
Trappe, W., & Straub, J. (2018). Cybersecurity: A New Open Access
Journal. Cybersecurity, 1(1), 1. doi: 10.3390/cybersecurity1010001
Wilson, A. (2014). Control-System Cybersecurity: Staying Ahead of Evolving Threats. Journal
Of Petroleum Technology, 66(08), 122-125. doi: 10.2118/0814-0122-jpt
1 out of 5
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.