logo

Investigation into Cyber Security

   

Added on  2023-03-17

13 Pages3064 Words80 Views
Running head: INVESTIGATION INTO CYBER SECURITY
Investigation into cyber security
Name of the student:
Name of the university:
Author note:

1INVESTIGATION INTO CYBER SECURITY
Table of Contents
Introduction:...............................................................................................................................2
Overview of the company:.....................................................................................................2
Issues related to cyber security within the organisation:...........................................................3
5 Major issues that need immediate attention:.......................................................................4
Measure to address the identified issues:...................................................................................6
Proposed security platform too countermeasure the identified issues:..................................6
Detailed cost breakdown structure to provide solution to mitigate the issues:......................9
Comparison between the proposed solution and other alternatives:......................................9
Other recommendation:..........................................................................................................9
Conclusion:..............................................................................................................................10
References:...............................................................................................................................11

2INVESTIGATION INTO CYBER SECURITY
Introduction:
With the increase in the number of cyber advancements, cyber risks are also gradually
growing in modern world. This gives rise to the importance of securing information and
important credentials that are associated with everyday life. The term information security is
precisely defined as the process of securing data from unauthorized access or disclosure,
disruption or modification as a result of some major data breach. Information security can be
applied physically or by electrical methods. The term information security refers to many
research areas such as online social media, mobile computing, cryptography, cyber forensics
and many more. Data assets are some of the important assets within organisation and are very
much critical for the survival of any business. Attackers or black hat people are likely to
attack different data assets of a company. One of the greatest challenges that is faced by any
organisation is identifying the risks associated with the organization’s data assets. Cyber
security is a constant growing area and thus targets towards identifying the major risks within
organizations. In this modern world of cyber advancement, it is important for every business
organisations to perform a cyber risk assessment based on the major data assets and
identifying and mitigating the major vulnerabilities or threats associated within the
organisation. The following report is prepared so as to investigate upon the security analysis
of the company of JL and to provide some countermeasures based on the threats identified
within the company.
Overview of the company:
The company of JL is a small company who mainly does accounting works resides in
Perth, Western Australia. The company is a small startup and currently employs about five
people. JL company is progressively making a giant move by planning to move its business
into the online market. As a part in doing so the company now has started sending its

3INVESTIGATION INTO CYBER SECURITY
confidential files via means of various online services. However, in recent years, it is seen
that the company and its employees are facing a number of security challenges within their
operating systems and other machine systems and thus it is necessary for JL company to
perform a risk assessment based on the current practices and use of their computer system
and data assets.
Issues related to cyber security within the organisation:
As per report, the company of JL, is recently facing some major cyber security risks
which are mentioned as follows:
1. The company of JL, uses the latest updates of Microsoft within their operating
system. As per recent reports, there exists some vulnerability with the latest update of
Microsoft within Windows 10 operating systems and causes some major security
risks.
2. None of the laptops consists of any software security installed in them. This a major
security issue as attackers might take advantage of this operating system in spreading
malware.
3. The internet access method of the company is via ADSL which uses a D-Link DSL-
2740B wireless router. Besides the company uses the Q Nap TS -412 NAS in order to
backup the data in the workstation using the WinSCP. With the use of this type of
internet access, a risk may occur where the whole system may get disrupted if there
occur some major cyber risks within the organisation.
4. Apart from the above-mentioned issues, other issues that exists within the
organization includes, lack in the use of Windows 2000 server within the
organisation, lack of awareness within the organisation as a result of which the
company failed to mitigate the ransomware attack that they faced in the year 2018.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Countermeasures
|13
|3136
|67

Cyber Security Issues in JL Company
|15
|3783
|56

Issues in Cyber Security
|14
|3207
|24

JL Company Computer Security Implementation
|11
|2995
|397

Recommendations for Ensuring Cyber Security in JL Company
|17
|2944
|223

Computer Security within JL: Mitigation Techniques and Advantages of Artificial Intelligence
|11
|2506
|299