This documentation focuses on cybersecurity and the use of Linux web server for data protection. It discusses mobile device vulnerabilities, security protection techniques, ensuring web server availability, and using Linux server auditing tools. It also provides recommendations to minimize employee risk.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Individual project 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTRODUCTION Thedocumentationisbasedonthesetofcybersecuritythatisalwayshelpfor organization to prevent company from other unauthorized access. It is helping for maintaining security and privacy of system effectively and efficiently. The report is mainly focused on the Linux web server which consider as most effective and efficient way to protect data. The assignment will consider on the MBC TV broadcasting organization that allows their staff member to use own computing services. It will describe about the two security protection technique for mobile phone and ensure that availability of web service by using Linux server. Furthermore, it will discuss about different Linux server auditing tools for purpose of analyzing and monitoring the webserver, email server problem. TASK 1 Identify that how mobile devices vulnerable to abuse and destruction. There are various type of mobile threats that is directly effects on the entire processing of mobile phone. It mainly involves virus, malicious, spyware, worms that can inflect hardware devices (Brilingaitė,Bukauskas and Kutka, 2019). But some threats against mobile phones are highly dangerous because it can be destructive and abusive. In this way, various threat can make mobile device vulnerable to abuse and destruction. Malicious application threat (Malware): It is the kind of malicious code and harmful for mobile device because it is designed to create system vulnerabilities. Sometimes, it may not be blocked by using antivirus software. Malicious threat intend to do harm which is mainly used by hackers (Chetty and Alathur, 2019). They can cause and vary by various intent they have. The malware threat can either steal sensitive information of organization in mobile phone without realizing the person. The application make device vulnerable due to malware. Web based threat: This type of threat is mainly targeting the mobile device if a person visits the website. Initially, it is completely looking fine but actually person install malicious code in mobile system. Furthermore, it directly target the entire processing system. In this way, Fake website intend for distribution. This type of threat can destroy of personal information within mobile device. 3
Two types of security protection technique and how it can mitigate threats. Securityprotectiontechniqueisbasedontheprocessthatperformedthevarious prevention task to eliminate threat within mobile device (Douglas, Harris and Dragiewicz, 2019). The technique is basically used for mobile device in order to control or mitigate threat while providing protection from against malware. There are two types of security protecting technique that can be used for mobile phone devices. Installation of encryption technique: It is one of the most common technique that is mainly used in mobile devices. Encrypting technique provide the security in the mobile phone which help for making data or information unreadable. If mobile device is hacked, stolen whereas it has chances to loss all sensitive data (Korać, Damjanović and Simić, 2020). At that time this encryption technique will support to protect information from unauthorized users because data must be encrypted in the coding format. In order to mitigate threats and control unauthorized access.It is not easier to directly access information. User need to install feature within device to encrypt data in proper manner. Install antivirus application: there are various type of application consists of malicious code, if once install malicious code within mobile device, it can send information to unauthorized person, hackers which increasing the possibilities of threat. In this way, antivirus application support to eliminate threat when it occurred from mobile device. In order to maintain the privacy and security through threat (Wiryawan and et.al., 2019). The antivirus technique that provide better functionalities such as erase data if mobile device lost, tracking and blocking unknown callers. In this way, it mitigate the threats and eliminate in mobile devices. Organization can ensure the availability of web server by using Linux web server. MBC firm is mainly used the Apache webserver on Linux which always supporting the web pages that required by hardware system present within organization. So as require for company to configure Linux as a root sever. In order to perform various task and check availability of web-browser (Wixey, Johnson and De Cristofaro, 2020). The organization need to visit the website and hosted with the help of Apache web server. Afterwards, it has been developed the connection from local host whereas firm identify the connection between website on Linux web server in proper manner. In some situation, it will require to enter address of URL and perform the significant tasks or ensure the availability the webserver. 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Initially, it has established the connection and check availability service status. If in case server has completely stopped and then restart again the server. Sometimes, it also identified the issue or problem so that it increases conflict (Wixey, Johnson and De Cristofaro, 2020). If one port conflict with another entire running program stopped. In this way, it will require to check the availability of Apache web server and running the system in proper manner. Furthermore, MBC firm can easily manage hosting service and also self-diagnostic. In order to monitor and analyse fault within system. At last, MBC ensure the availability of apache webserver. Understandtheimpactofemployeeoninformationsecuritywithinorganization, recommendation to minimize the risk of employee. In recently, it has rapidly increased the usage of online tool and platform among existing potential people. In this way, MBC allows to the use of various platform by staff member at workplace. As slowly, enterprise have realized that social media and other tool impacts on the organization in term of security and privacy (Wixey, Johnson and De Cristofaro, 2020). The online tool influence attitude of staff member to access the information or data quickly but it also impacted on the business process. As per given Scenario, MBC is also based on the TV broadcasting firm which always share information from one device to another by using Social media platform. In this way, it has been increased the vulnerabilities to the information security (Wiryawan and et.al., 2019). It is important to protect the broadcasted information because authorized users leaked sensitive through social media platform. Before broadcasting data which require to identifying the data leakage situation within system. Furthermore, it should be recommendations that useful for organization to minimize risk of threat whereas employee can mobile phone to access data at workplace. Recommendations It will be restricted the physical access and always use mobile device within organization premises. At workplace, staff members are not allowed to record and save any kind of organization data within personal device. All devices must connect with system which continuously monitor or analyse availability of transferred information. 5
Discuss the Linux Sever Auditing tool and how it can be used by MBC to analyse or monitor web server. The auditing and checking the Linux server, ensure that it completely configured with the system. It provides the better security and privacy to monitor different activities of server. In MBC, Administrator get locked up with working on regular task. Sometimes, it is important to complete the task effectively and efficiently. Here some tools that always helping to automate auditing and also monitoring Linux system in proper manner. Tiger: it is based on the open source Linux tool which provide the facility to check availability accounts, file system (Wiryawan and et.al., 2019). It is consider as auditing tool which automatically check file system and give permission to secure information or data. Sometimes, it is highlighting things such as policies and procedures of installation Tiger. NIX Auditor: it is another type of tool that is geared towards RHEL. It also working on the Ubuntu and other type of Nix auditor. It is the most efficient auditing tool that will check the password gaining and maintain the account or file system in proper manner. LYNIS: it is a type of well-designed tool or platform that always support various version of Linux. Many developers are focused on the active on social media tool include online dashboard. It allows to check the servers against an appropriate policies (Wiryawan and et.al., 2019). As per discussion, it has explained the various Linux auditing tools which providing the facilities to record large amount of data or information in proper manner. MBC firm uses these tool to monitor and analyse the problem if organization find out in webserver. This will help for debugging Linux system while eliminating email web server problem efficiently. In order to increase the business performance as well as efficiency. As per identification of any problem and issue during task execution which needed to use Linux auditing tool for providing the brief idea of particular issue. Sometimes, it also useful for eliminating and removing threats within system. 6
CONCLUSION From above discussion, it has summarized about the concept of cybersecurity that is always help for organization to prevent from other unauthorized access. It is useful for maintaining security and privacy of system effectively and efficiently. The report is mainly focused on the Linux web server which consider as most effective and efficient way to protect data. It can be identified the two security protection technique for mobile phone and ensure that availability of web service by using Linux server. Furthermore, consider as various Linux server auditing tools for purpose of analyzing and monitoring the webserver, email server problem. 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
REFERENCES Book and Journals Brilingaitė, A., Bukauskas, L. and Kutka, E., 2019, July. Detection of Premeditated Security Vulnerabilities in Mobile Applications. InECCWS 2019 18th European Conference on Cyber Warfare and Security(p. 63). Academic Conferences and publishing limited. Chetty, N. and Alathur, S., 2019. An architecture for digital hate content reduction with mobile edge computing.Digital Communications and Networks. Douglas, H., Harris, B. and Dragiewicz, M., 2019. Migrant women are particularly vulnerable to technology-facilitated domestic abuse.The Conversation. (1). Korać, D., Damjanović, B. and Simić, D., 2020, March. Information Security in M-learning Systems:ChallengesandThreatsofUsingCookies.In202019thInternational Symposium INFOTEH-JAHORINA (INFOTEH)(pp. 1-6). IEEE. Wiryawan, D. and et.al., 2019. Malware Mobile Devices in Indonesia.KnE Social Sciences. pp.259-267. Wixey, M., Johnson, S. and De Cristofaro, E., 2020. On the Feasibility of Acoustic Attacks Using Commodity Smart Devices.arXiv preprint arXiv:2001.07157. 8