logo

Cybersecurity Threats and Recommendations for ABCT Organization

   

Added on  2022-11-13

12 Pages3497 Words88 Views
Running head: INFORMATION AND COMMUNICATION TECHNOLOGY
Information and Communication Technology
Name of the Student
Name of the University
\
Author Note

1INFORMATION AND COMMUNICATION TECHNOLOGY
Abstract
Developing a proper cyber-security is an important requirement for any organizations who deals
in IT products and services. This report has analysed various security threats for investigating a
cyber-crime that ABCT has recently identified. Recently the company has identified that its
information system has been hacked and it has compromised security of both the organization
and the consumer as well. Three important security vulnerabilities, which has been analysed for
the IT infrastructure of ABCT are vulnerabilities in VPN services, security issues in BYOD
service and lack of security measurement for cloud services where ABCT stores its business and
consumer data. Along with that this report has also analysed five emerging security threat for the
IT infrastructure of ABCT and provided recommendations for security enhancement to ensure
overall organizational data security important for business and consumer service.

2INFORMATION AND COMMUNICATION TECHNOLOGY
Table of Contents
Introduction:....................................................................................................................................3
Explanation of CyberSecurity in ABCT..........................................................................................3
Emerging Threats in ABCT Organization:......................................................................................4
Security vulnerabilities:...................................................................................................................7
Recommendation:............................................................................................................................8
Conclusion:......................................................................................................................................8
References:....................................................................................................................................10

3INFORMATION AND COMMUNICATION TECHNOLOGY
Introduction:
The organization that is selected in this report is ABCT, who offers a range of services to
the clients and it includes both hardware and software services. It specifically provides advanced
and high-tech products while offering service in hardware and software configuration as well. As
the organization provides hardware and software solutions to the business, it is important to
collect data about the consumers to offer customized and personalized services based on the
business requirements (Almeshekah & Spafford, 2016). However, recently the company has
identified that its information system has been hacked and it has compromised security of both
the organization and the consumer as well.
The paper is reflecting on the importance of the cybersecurity which is not helping to
reduce security related issues but it helps to improve over the security systems. The report also
analyzes three security vulnerabilities which are raised into the selected organization as well as
five threats which are emerging by providing proper recommendations to protect office as well a
home for the cyber threats.
Explanation of CyberSecurity in ABCT
Cyber security in simple terms means network integrity and also program from the
authorized access. It is a way to defend the computer server from various attacks. There are
various ways that hackers exploit data storage, data networks for getting access to data without
proper authorization, and this requires securing those resources from hacking for which cyber-
security is required (Almorsy, Grundy& Müller, 2016). In the selected organization, there are
10,000 customers and they are storing the data in the cloud. The data are required to keep
secured so that it helps to improve security system plus security based regulations and policies.
There are various aspects that motivate hackers into doing cyber-crime such as money, fame or it
might be a part of political propaganda sponsored by the state. However, it is not essential to
identify exact motivation behind a cyber-crime, what is important is to design a proper cyber
security strategy, which ensures protection against these crimes, and safeguard IT
resources(Schoitsch et al., 2016). Therefore, cyber security is the strategies and policies that

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Importance of Cybersecurity for ABCT
|15
|3960
|94

Cybersecurity Risks and Recommendations for ABCT
|13
|3833
|55

Emerging Security Threats
|12
|3912
|46

Cyber Security for ABCT
|13
|3526
|21

Cybersecurity and its Importance to ABCT
|5
|959
|422

Cybersecurity: Importance, Vulnerabilities, Emerging Threats, and Recommendations
|13
|3502
|179