logo

Emerging Security Threats

   

Added on  2023-03-21

12 Pages3912 Words46 Views
Running head: EMERGING SECURITY THREATS
EMERGING SECURITY THREATS
Name of the Student
Name of the University
Author Note
Emerging Security Threats_1
1EMERGING SECURITY THREATS
Executive summary:
This report aims to evaluate the cyber security aspects regarding the organization ABC
Technology. This report has analysed different security vulnerabilities that is relevant for IT
system of ABC Technology organization. This ABC Technology organization is a Australia
based technological organization which provides various of high class hardware services to
its customers.
Through this assessment the present cyber security in the ABCT organization has been
analysed. The assessment has identified different security vulnerabilities such as security
issue in VPN service, cloud services and BYOD policy. This report has then analysed three
important security vulnerabilities that is associated with the information system of the ABCT
Company. It is hence necessary for the company to increase security for all of its system.
Securing the system through advanced measures is not only an option for ABCT, it is an
essential strategy that they have to consider for securing their important data regarding
business, employee and consumers.
From the conclusion it is clear that the cyber security is very much important aspects for all
the organizations including the ABC Technology. The importance of cyber security for the
organizations has been justified in this case. This report also cleared that proper control over
the cyber security threats is very much important for betterment of the ABCT organization.
Implementation of the proper cyber security framework will help the organization to protect
them from any types of serious issues.
The following recommendations have been provided for the protection purpose of home and
offices from the cyber-attacks.
Strong password must be implemented by the users for protecting their personal
devices.
Infrastructure and the software services must be always up to date for protection
against the cyber security risks.
Awareness among the employees is needed for so that they can deny any type of
phishing and spoofing attack.
Emerging Security Threats_2
2EMERGING SECURITY THREATS
Table of Contents
1.0 Introduction:.........................................................................................................................3
1.1 Background:.....................................................................................................................3
1.2 Aim:..................................................................................................................................3
1.3 Scope:...............................................................................................................................3
2.0 Explanation of CyberSecurity:.............................................................................................4
2.1 Cyber Security and its Importance of its to ABCT:.........................................................4
2.1.1 Assessment of Security Vulnerabilities:....................................................................4
2.1.2 Securing Virtual Private Network:............................................................................5
2.1.3 Securing Hardware and Software Services:...............................................................5
2.2 Security Vulnerabilities in ABCT’s System:...................................................................5
2.2.1 VPN Vulnerability:....................................................................................................5
2.2.2 BYOD Policy Vulnerability:.....................................................................................6
2.2.3 Cloud Computing Vulnerability:...............................................................................6
3.0 Five Different Types of Emerging Threats:.........................................................................7
3.1 Cryptojacking:..................................................................................................................7
3.2 Threats from the IoT devices:...........................................................................................7
3.3 Geopolitical risk:..............................................................................................................7
3.4 Cross-site scripting:..........................................................................................................8
3.5 Mobile malware:...............................................................................................................8
4.0 Conclusion:..........................................................................................................................8
5.0 Recommendation:................................................................................................................9
6.0 References:.........................................................................................................................10
Emerging Security Threats_3
3EMERGING SECURITY THREATS
1.0 Introduction:
1.1 Background:
ABCT, an Australian technology company that specializes in delivering high tech
products that include hardware as well as software products. In not only Australia, but also it
has offices in overseas as well. Hence the company needs to manage services of two oversees
office as well.
1.2 Aim:
Hence, this report analysis the root cause of the security issues that are relevant to the
IT infrastructure of the company along with recommendation for developing security
measures for managing security threats due to cyber-crimes and illegal activities of the
hackers.
1.3 Scope:
The report specifically provides a detailed explanation of the concept of cyber-
security and describes why it is important for the company. This will give them a
comprehensive overview about the concept of cyber security and things they need to consider
while executing their business process through information system and technology for
enhancing efficiency of the overall business process.
This report has then analysed three important security vulnerabilities that is associated
with the information system of the ABCT Company. Explanation of the vulnerabilities is
based on research made on this topic analysing different literature in this context.
The next section includes discussion on five different types of emerging threats that
has potential to impact or influence security of the overall IT system of ABCT and thus might
compromise the security of the overall system as well.
While two section as described above have analysed different security aspect related
to the ABCT system, the report then includes a recommendation section, which describes
three techniques for protecting home and office from cyber-security threats.
The recommendation section is followed by a conclusion section, which provides the
findings of the overall report for effective analysis of the report.
Emerging Security Threats_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assessment on Cyber Security
|15
|3818
|31

Professional skills for Information and Communication
|8
|1329
|480

Importance of Cybersecurity for ABCT
|15
|3960
|94

Cybersecurity Threats and Recommendations for ABCT Organization
|12
|3497
|88

Cyber Security Vulnerabilities and Recommendations for ABC Technology
|10
|3323
|1

Cybersecurity and its Importance to ABCT
|5
|959
|422