Professional Skill for Information and Communication
VerifiedAdded on 2023/03/31
|15
|3340
|77
AI Summary
This report discusses the importance of professional skill for information and communication in ABCT organization. It highlights the cybersecurity challenges and the need for implementing security policies. The report also identifies three security vulnerabilities and five emerging threats in ABCT.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/ea353d8b-aded-4d86-b46a-b4995fd93614-page-1.webp)
Running head: PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
Professional Skill for Information and Communication
Name of the Student
Name of the University
Author Note:
Professional Skill for Information and Communication
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/72241bc7-9754-495d-9bc1-370c76c3aff5-page-2.webp)
1PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
Executive Summary
The following report is all about ABCT which is an Australian Based organization that has
business for various kind of high tech products. It is merely inclusive of two kind of components
that is hardware and software. ABCT comes up with different number of offices on national wide
platform. This merely come up with two branches in various location. There are large number of
system services which is completely marked by the employees that is completely maintained in
its head office that is located in Canberra. ABCT will merely help the employees so that they can
work various location by the help of VPN connection. It is all about making use of BYOD (bring
your own device) which will ultimately the help in working employee for working onsite
location.
Executive Summary
The following report is all about ABCT which is an Australian Based organization that has
business for various kind of high tech products. It is merely inclusive of two kind of components
that is hardware and software. ABCT comes up with different number of offices on national wide
platform. This merely come up with two branches in various location. There are large number of
system services which is completely marked by the employees that is completely maintained in
its head office that is located in Canberra. ABCT will merely help the employees so that they can
work various location by the help of VPN connection. It is all about making use of BYOD (bring
your own device) which will ultimately the help in working employee for working onsite
location.
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/2c79f842-0935-49cb-9b6b-da0aec3880fa-page-3.webp)
2PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
Table of Contents
Introduction..........................................................................................................................3
Discussion............................................................................................................................4
Cybersecurity and Importance for ABCT........................................................................4
Three security vulnerabilities in ABCT...........................................................................6
Five Emerging threats......................................................................................................8
Conclusion...........................................................................................................................9
Recommendation...............................................................................................................10
References..........................................................................................................................12
Table of Contents
Introduction..........................................................................................................................3
Discussion............................................................................................................................4
Cybersecurity and Importance for ABCT........................................................................4
Three security vulnerabilities in ABCT...........................................................................6
Five Emerging threats......................................................................................................8
Conclusion...........................................................................................................................9
Recommendation...............................................................................................................10
References..........................................................................................................................12
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/553d0a5d-3c40-4040-b35d-aeb48940b905-page-4.webp)
3PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
Introduction
This particular report is all about ABCT organization that comes up with various kind of
business ranging from various kind of products. The devices are merely inclusive of high tech
products that require software and hardware based products. At present, there are large number
of challenges with respect to cyber-security based products that helps in establishing mobile
connectivity, online mode of payment (Akbari Roumani et al., 2016). The use of technologies is
increasing at a rapid rate for the use of cloud and IoT. In the present era, every business comes
up with website which will make the website from any kind of external exposure. It will merely
help the attacker so that they can enter into the network. All the required information with
respect to product and customer are completely stored in the cloud platform. ABCT was recently
a victim of various kind of cyber-attack they emphasize on the fact that the organization may
lose some of their data (Alshaikh et al., 2018). This will ultimately result in losing of some of the
vital information of the customer. It is expected that they will lose some of the major amount of
revenue. ABCT is emphasizing on certain number of methods by which they can improve the
overall security policies of the system. In the beginning, ABCT is focusing on certain number of
ways by which they can document cyber-security for training their staff with respect to cyber-
security.
The report will merely highlight about cyber-security and its overall importance for this
firm that is ABCT. Three of the biggest security vulnerability of the system in ABCT firm will
be provided in details. The report ends with five different kind of emerging threats which can
affect the ABCT organization.
Introduction
This particular report is all about ABCT organization that comes up with various kind of
business ranging from various kind of products. The devices are merely inclusive of high tech
products that require software and hardware based products. At present, there are large number
of challenges with respect to cyber-security based products that helps in establishing mobile
connectivity, online mode of payment (Akbari Roumani et al., 2016). The use of technologies is
increasing at a rapid rate for the use of cloud and IoT. In the present era, every business comes
up with website which will make the website from any kind of external exposure. It will merely
help the attacker so that they can enter into the network. All the required information with
respect to product and customer are completely stored in the cloud platform. ABCT was recently
a victim of various kind of cyber-attack they emphasize on the fact that the organization may
lose some of their data (Alshaikh et al., 2018). This will ultimately result in losing of some of the
vital information of the customer. It is expected that they will lose some of the major amount of
revenue. ABCT is emphasizing on certain number of methods by which they can improve the
overall security policies of the system. In the beginning, ABCT is focusing on certain number of
ways by which they can document cyber-security for training their staff with respect to cyber-
security.
The report will merely highlight about cyber-security and its overall importance for this
firm that is ABCT. Three of the biggest security vulnerability of the system in ABCT firm will
be provided in details. The report ends with five different kind of emerging threats which can
affect the ABCT organization.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/0368c8b9-c197-40ee-a548-957d2e1ed3d9-page-5.webp)
4PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
Discussion
Cybersecurity and Importance for ABCT
Cyber-Security is completely defined as a step or method which the organization need to
adopt so that they can easily provide some of the vital and useful information. Cyber-security
need to focus on certain number of facto like changing and access lastly destroying some of the
vital information (Anwar et al., 2017). It is completely done with respect to some of destructive
use of information that is hacking bank account and stealing the money of the user. This
particular step will ultimately interrupt a list of business interruption. There is a need of
implementing some of the best kind of cyber-security practices which is very much challenging.
This particular step is mainly taken due to the result of different devices, attackers and people
who are becoming innovative with the passage of time (Astani & Ready, 2016). The mere focus
is all about improving cyber-security that will ultimately remove the various kind of risk that
may arise as a result of risk of cyber-security. The mere focus of cyber-security is giving control
that is based completely based on three disciplines like people, process and lastly technology.
This particular kind of approach is completely based on various kind of attacks and threats that
can result in incident breach as result of human error.
Technology People Process
Discussion
Cybersecurity and Importance for ABCT
Cyber-Security is completely defined as a step or method which the organization need to
adopt so that they can easily provide some of the vital and useful information. Cyber-security
need to focus on certain number of facto like changing and access lastly destroying some of the
vital information (Anwar et al., 2017). It is completely done with respect to some of destructive
use of information that is hacking bank account and stealing the money of the user. This
particular step will ultimately interrupt a list of business interruption. There is a need of
implementing some of the best kind of cyber-security practices which is very much challenging.
This particular step is mainly taken due to the result of different devices, attackers and people
who are becoming innovative with the passage of time (Astani & Ready, 2016). The mere focus
is all about improving cyber-security that will ultimately remove the various kind of risk that
may arise as a result of risk of cyber-security. The mere focus of cyber-security is giving control
that is based completely based on three disciplines like people, process and lastly technology.
This particular kind of approach is completely based on various kind of attacks and threats that
can result in incident breach as result of human error.
Technology People Process
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/fc8d2819-a98d-474d-96be-f2733cca51ab-page-6.webp)
5PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
There are various kind of
cyber-risk can be easily
encountered by different kind
of risk that is being faced by
ABCT (Awan, & Memon,
2016). The organization need
to have proper kind of control
on the given things. This
particular parameter is based
on reducing various kind of
risk along with reducing its
overall level.
Employees of ABCT needs to
completely known of various
kind of role that is needed
preventing and reducing any
particular kind of threat.
ABCT make use of some
technical aspect of cyber-
security which is needed for
updating with desired skill
(Glaspie & Karwowski,
2017). The mere focus is all
about providing update with
respect to skill and mitigation
technique. The mere focus is
all about a response with
respect to mitigating and
making response to various
kind of cyber-attack at
ABCT.
Process are known to be an
important part of the given
organization that merely
focus on the given roles and
responsibilities. It is all about
making documentation of
some of the given paper (He
& Johnson, 2017). The main
focus is all about overcoming
various kind of risk with
activities at ABCT. Cyber
threat focus on minimizing
process which is complete
adopted on the both the given
sides.
The importance of cyber-security of ABCT has been described below like
There are various kind of
cyber-risk can be easily
encountered by different kind
of risk that is being faced by
ABCT (Awan, & Memon,
2016). The organization need
to have proper kind of control
on the given things. This
particular parameter is based
on reducing various kind of
risk along with reducing its
overall level.
Employees of ABCT needs to
completely known of various
kind of role that is needed
preventing and reducing any
particular kind of threat.
ABCT make use of some
technical aspect of cyber-
security which is needed for
updating with desired skill
(Glaspie & Karwowski,
2017). The mere focus is all
about providing update with
respect to skill and mitigation
technique. The mere focus is
all about a response with
respect to mitigating and
making response to various
kind of cyber-attack at
ABCT.
Process are known to be an
important part of the given
organization that merely
focus on the given roles and
responsibilities. It is all about
making documentation of
some of the given paper (He
& Johnson, 2017). The main
focus is all about overcoming
various kind of risk with
activities at ABCT. Cyber
threat focus on minimizing
process which is complete
adopted on the both the given
sides.
The importance of cyber-security of ABCT has been described below like
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/e7c3d8d4-edcf-4b21-8b8b-c63231a5e8e5-page-7.webp)
6PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
Change into sophistication: With each and every passing year, cyber-attacks are
becoming very sophisticated in nature. With the passage of time, attackers are exploiting various
kind of vulnerabilities in the system like malware, ransomware and social engineering.
Changing into a big issue: With respect to regulation and report made by risk of cyber-
security, it is growing into a huge challenge. This particular aspect is looking for proper kind of
assurance from the side of management of ABCT (Hettiarachchi & Wickramasinghe, 2016).
Cyber-strategies focus on minimizing various kind of risk with respect to attack. This will
merely impact all the kind of ongoing operation in ABCT.
Data Breach at ABCT is soaring: As a result of increase in enforcement of EU GDPR
will ultimately force fine around a value of 20 million. It will ultimately result in increase in rate
of revenue to around 4% (Johnson et al., 2016). The overall turnover is coming up with various
kind of limitation. There are various kind of financial loss, damage of reputation and financial
loss the needed for various customers.
Three security vulnerabilities in ABCT
VPN is known to be as a developing technology that has come into picture in past years.
This particular technology is needed for providing security to the existing network so that it can
tackled from the growing cyber-attacks (Koppel et al., 2015). At present, there are some
advanced way for VPN so that they can make use of best kind of solution for the existing issues.
This is completely achieved by using best kind of solution. VPN merely focus on large number
of aspect which needs to be discussed in details. VPN is growing technology which is needed for
providing security to the overall method of transmission (Kott et al., 2018). This particular point
need to be taken into account that there are application and remote server associated with this.
Change into sophistication: With each and every passing year, cyber-attacks are
becoming very sophisticated in nature. With the passage of time, attackers are exploiting various
kind of vulnerabilities in the system like malware, ransomware and social engineering.
Changing into a big issue: With respect to regulation and report made by risk of cyber-
security, it is growing into a huge challenge. This particular aspect is looking for proper kind of
assurance from the side of management of ABCT (Hettiarachchi & Wickramasinghe, 2016).
Cyber-strategies focus on minimizing various kind of risk with respect to attack. This will
merely impact all the kind of ongoing operation in ABCT.
Data Breach at ABCT is soaring: As a result of increase in enforcement of EU GDPR
will ultimately force fine around a value of 20 million. It will ultimately result in increase in rate
of revenue to around 4% (Johnson et al., 2016). The overall turnover is coming up with various
kind of limitation. There are various kind of financial loss, damage of reputation and financial
loss the needed for various customers.
Three security vulnerabilities in ABCT
VPN is known to be as a developing technology that has come into picture in past years.
This particular technology is needed for providing security to the existing network so that it can
tackled from the growing cyber-attacks (Koppel et al., 2015). At present, there are some
advanced way for VPN so that they can make use of best kind of solution for the existing issues.
This is completely achieved by using best kind of solution. VPN merely focus on large number
of aspect which needs to be discussed in details. VPN is growing technology which is needed for
providing security to the overall method of transmission (Kott et al., 2018). This particular point
need to be taken into account that there are application and remote server associated with this.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/e4b4955e-4692-4916-beea-3f411505c467-page-8.webp)
7PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
Leaks in IPv6: Any kind of leaks in the IPv6 can result in huge number of problem. It
merely comprises of various kind of problem. This is known to be successor IPv4 that is much
big and safe in nature. It comes up with safe kind of address which will merely take over the
whole internet (Loukaka & Rahman, 2017). The main notion of VPN technology is all about
providing protection for any kind of leakage where most of them are needed to addressed for
protecting IPv6.
Leaks in DNS: In this the mere focus is all about making use of ISP so that they can
make use of VPN along with detection in the website of ABCT (Madnick, et al., (2016).
Eavesdropping is needed for making an analysis and making an interception of the overall traffic
that is in opposite place of VPN. This particular aspect is taken into account.
Leaks in WebRTC : This is needed to be taken into account for much similar kind of
DNS which will ultimately result in the key kind of difference which is being used as a exclusive
of web server (Newhouse et al., 2017). It can be analysed that there are no kind of issue with
respect to VPN but can be actually due to the working kind of window that is either chrome or
Firefox. It mainly makes use of a typical kind of communication protocol which is known be
STUN. It helps the user to easily keep a track of the number of visitor of the website. It is all
about using VPN where IP addresses are completely distinguished and have certain number of
geographical limitation.
The whole domain of personal computing has developed a lot. It has come into picture as
a result of mobile industry that has both smartphone and tablets which that employees to take the
work to home (Oyelami & Ithnin, 2015). It is all about making use of BYOD strategy which has
helped ABCT to become much productive in nature. BYOD has ultimately created huge number
of risk with respect to security. A list of some of the common vulnerabilities in BYOD are
Leaks in IPv6: Any kind of leaks in the IPv6 can result in huge number of problem. It
merely comprises of various kind of problem. This is known to be successor IPv4 that is much
big and safe in nature. It comes up with safe kind of address which will merely take over the
whole internet (Loukaka & Rahman, 2017). The main notion of VPN technology is all about
providing protection for any kind of leakage where most of them are needed to addressed for
protecting IPv6.
Leaks in DNS: In this the mere focus is all about making use of ISP so that they can
make use of VPN along with detection in the website of ABCT (Madnick, et al., (2016).
Eavesdropping is needed for making an analysis and making an interception of the overall traffic
that is in opposite place of VPN. This particular aspect is taken into account.
Leaks in WebRTC : This is needed to be taken into account for much similar kind of
DNS which will ultimately result in the key kind of difference which is being used as a exclusive
of web server (Newhouse et al., 2017). It can be analysed that there are no kind of issue with
respect to VPN but can be actually due to the working kind of window that is either chrome or
Firefox. It mainly makes use of a typical kind of communication protocol which is known be
STUN. It helps the user to easily keep a track of the number of visitor of the website. It is all
about using VPN where IP addresses are completely distinguished and have certain number of
geographical limitation.
The whole domain of personal computing has developed a lot. It has come into picture as
a result of mobile industry that has both smartphone and tablets which that employees to take the
work to home (Oyelami & Ithnin, 2015). It is all about making use of BYOD strategy which has
helped ABCT to become much productive in nature. BYOD has ultimately created huge number
of risk with respect to security. A list of some of the common vulnerabilities in BYOD are
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/b11d0f04-5665-4caf-b1d2-8d2ce8ce5cae-page-9.webp)
8PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
Data loss
Devices Loss
Hacking.
Five Emerging threats
The complete domain of cyber-security is developing at a huge rate where various kind of
threat has come in the present scene. It is all about analysing the method of tracking and
preparation which can result in huge number of threats (Parent & Cusack, 2016). It will be
ultimately used by leaders of both security and risk management of this organization that is
ABCT. In the coming part of the report, five kinds of growing technologies and business leaders
of ABCT are completely discussed below:
Mobile Malware: It is known to be as the most suitable way for the growing top targets
which has come into picture due to poor management. As a result of this, ABCT is coming plan
to have mobile device management based solution. It is mainly needed for reducing the overall
value of adaptation (Raud, 2015). ABCT merely emphasize on the way by which they can have
an easy access to the malware based solution. The complete access is managed by this
organization ABCT that can result in various kind of problem.
Cross- Site Scripting: ABCT is focusing on certain number of methods by which attack
kind cross-site scripting can be avoided or neglected. It is mainly done at each and every stage of
life cycle. A large number of vulnerabilities are found in certain number of zones of cross-site
scripting that makes it as one of the leading vulnerability (Safa et al., 2015). In this attack,
advertisers are making use of the business of ABCT that results in execution of untrusted code
from the victim of the browser. It is mainly needed by victim so that they can interact with
Data loss
Devices Loss
Hacking.
Five Emerging threats
The complete domain of cyber-security is developing at a huge rate where various kind of
threat has come in the present scene. It is all about analysing the method of tracking and
preparation which can result in huge number of threats (Parent & Cusack, 2016). It will be
ultimately used by leaders of both security and risk management of this organization that is
ABCT. In the coming part of the report, five kinds of growing technologies and business leaders
of ABCT are completely discussed below:
Mobile Malware: It is known to be as the most suitable way for the growing top targets
which has come into picture due to poor management. As a result of this, ABCT is coming plan
to have mobile device management based solution. It is mainly needed for reducing the overall
value of adaptation (Raud, 2015). ABCT merely emphasize on the way by which they can have
an easy access to the malware based solution. The complete access is managed by this
organization ABCT that can result in various kind of problem.
Cross- Site Scripting: ABCT is focusing on certain number of methods by which attack
kind cross-site scripting can be avoided or neglected. It is mainly done at each and every stage of
life cycle. A large number of vulnerabilities are found in certain number of zones of cross-site
scripting that makes it as one of the leading vulnerability (Safa et al., 2015). In this attack,
advertisers are making use of the business of ABCT that results in execution of untrusted code
from the victim of the browser. It is mainly needed by victim so that they can interact with
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/87b6e52e-af13-47bc-ac9b-a8d910a95861-page-10.webp)
9PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
employees of ABCT and can collect the desired information. This is completely possible by
using authentication of hijack site without any kind of use of credential.
Geopolitical risk: ABCT need to take into account the needed product and services
which is to be implemented. In this scenario, data is completely stored with respect to risk and
regulation of cyber-security (Safa, Von Solms & Furnell, 2016). Firms like ABCT do not take
into consideration of the present location and any kind of geographical risk. All the stolen data
will be there for even third party or even for some other nation. It has come into picture as a
result of vital data which make use of threat and national resources.
Threats as a result of IoT devices: ABCT is adding much more number of devices which
has come into picture as a result of device infrastructure. ABCT need to have some security
solution implementing some of devices like cameras and chip (Steinbart et al., 2018). The whole
idea of maintenance is taken into account that has IoT into picture. Firms like ABCT is planning
to reply safety that has IoT devices which can be easily managed at the time of updating.
Crypto-jacking: Ransomware has become as one of the growing threats which can affect
the ABCT firm. All kind of exploiting of the present vulnerabilities comprises of certain number
of network based segments (Hettiarachchi & Wickramasinghe, 2016). Currently, there are many
threat actors who are coming with the plan to employ similar kind of ransomware that is needed
for data encryption. Both organization and system at ABCT is affect by ransomware, the
complete practice of crypto mining has come into picture.
Conclusion
It can be concluded that the report highlights the need of cyber-security for ABCT
organization. Cyber-security can be used for bringing security to the system present in both the
location that is office and home location. ABCT is a well-known firm which aims to business
employees of ABCT and can collect the desired information. This is completely possible by
using authentication of hijack site without any kind of use of credential.
Geopolitical risk: ABCT need to take into account the needed product and services
which is to be implemented. In this scenario, data is completely stored with respect to risk and
regulation of cyber-security (Safa, Von Solms & Furnell, 2016). Firms like ABCT do not take
into consideration of the present location and any kind of geographical risk. All the stolen data
will be there for even third party or even for some other nation. It has come into picture as a
result of vital data which make use of threat and national resources.
Threats as a result of IoT devices: ABCT is adding much more number of devices which
has come into picture as a result of device infrastructure. ABCT need to have some security
solution implementing some of devices like cameras and chip (Steinbart et al., 2018). The whole
idea of maintenance is taken into account that has IoT into picture. Firms like ABCT is planning
to reply safety that has IoT devices which can be easily managed at the time of updating.
Crypto-jacking: Ransomware has become as one of the growing threats which can affect
the ABCT firm. All kind of exploiting of the present vulnerabilities comprises of certain number
of network based segments (Hettiarachchi & Wickramasinghe, 2016). Currently, there are many
threat actors who are coming with the plan to employ similar kind of ransomware that is needed
for data encryption. Both organization and system at ABCT is affect by ransomware, the
complete practice of crypto mining has come into picture.
Conclusion
It can be concluded that the report highlights the need of cyber-security for ABCT
organization. Cyber-security can be used for bringing security to the system present in both the
location that is office and home location. ABCT is a well-known firm which aims to business
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/d60ab2c2-72c4-41bc-9954-94bc6aa1f3c1-page-11.webp)
10PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
products that is merely inclusive of both kind of parts that is either software and hardware.
ABCT provides a wonderful opportunity which allow them to completely work them from their
home location. The organization is promoting the idea of use of Bring your own device (BYOD)
policy which will help their employee to easily work from onsite location. At present, ABCT
comes up with existing customer base of 10,000 customers. Various kind of information with
respect to customer and information of product is completely stored in the cloud platform. In the
recent times, the organization was a victim of cyber-attack. The organization is in the threat of
losing some of the vital information of their existing customer. ABCT is in the fear of losing
some of trust of the customers that will ultimately result in loss in the overall revenue. The
organization is very much focused in improving their policies with respect to system security. To
tackle this particular issue, ABCT is preparing a document on cyber-security so they can easily
train their staff members with respect to cyber-security details. A discussion has been given on
cyber-security and an its importance for ABCT firm. Three of the security vulnerabilities in the
system of ABCT has been provided in details. The last section of the report deals with five kind
of emerging threats which can affect ABCT. A description has been provided in detail with
respect to each of the cyber-security.
Recommendation
Cyber-security is developing at a very fast rate and in parallel there is needed for overall
improvement of technologies. This particular step has become an important step which requires
proper kind of improvement. ABCT requires to a list of steps that will ultimately help hackers
and cyber-criminal’s in exploiting any kind of issue with respect to security of stored data.
ABCT needs to take up following steps which is needed for protecting the system at both office
and home like:
products that is merely inclusive of both kind of parts that is either software and hardware.
ABCT provides a wonderful opportunity which allow them to completely work them from their
home location. The organization is promoting the idea of use of Bring your own device (BYOD)
policy which will help their employee to easily work from onsite location. At present, ABCT
comes up with existing customer base of 10,000 customers. Various kind of information with
respect to customer and information of product is completely stored in the cloud platform. In the
recent times, the organization was a victim of cyber-attack. The organization is in the threat of
losing some of the vital information of their existing customer. ABCT is in the fear of losing
some of trust of the customers that will ultimately result in loss in the overall revenue. The
organization is very much focused in improving their policies with respect to system security. To
tackle this particular issue, ABCT is preparing a document on cyber-security so they can easily
train their staff members with respect to cyber-security details. A discussion has been given on
cyber-security and an its importance for ABCT firm. Three of the security vulnerabilities in the
system of ABCT has been provided in details. The last section of the report deals with five kind
of emerging threats which can affect ABCT. A description has been provided in detail with
respect to each of the cyber-security.
Recommendation
Cyber-security is developing at a very fast rate and in parallel there is needed for overall
improvement of technologies. This particular step has become an important step which requires
proper kind of improvement. ABCT requires to a list of steps that will ultimately help hackers
and cyber-criminal’s in exploiting any kind of issue with respect to security of stored data.
ABCT needs to take up following steps which is needed for protecting the system at both office
and home like:
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/e4357463-1cdb-4828-92f3-d752938c8360-page-12.webp)
11PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
Making use of unique password for each and every department in ABCT: Various kind
of sensitive information is completely stored for ABCT whose access can be prevented by the
help of unique and strong password. All the issues with respect to hacking tools can be easily
tackled by the help of password.
Reducing data access: ABCT organization aims to provide easy data access to important
data to all the staff members. There are various kind of executive of organisation which are not
aware of the detail of the employee. It merely aims to provide easy kind of access to some of the
vital data. Due to poor security, the data of ABCT is at high risk that is hacking and theft.
Keeping a track of some of the sensitive information: ABCT comes up with huge
amount of vital data which needs to be protected. The organization need to restrict the access to
some of the vital information by making use of various kind of resources. The mere focus is all
about protecting some of vital and sensitive information for ABCT.
Making use of unique password for each and every department in ABCT: Various kind
of sensitive information is completely stored for ABCT whose access can be prevented by the
help of unique and strong password. All the issues with respect to hacking tools can be easily
tackled by the help of password.
Reducing data access: ABCT organization aims to provide easy data access to important
data to all the staff members. There are various kind of executive of organisation which are not
aware of the detail of the employee. It merely aims to provide easy kind of access to some of the
vital data. Due to poor security, the data of ABCT is at high risk that is hacking and theft.
Keeping a track of some of the sensitive information: ABCT comes up with huge
amount of vital data which needs to be protected. The organization need to restrict the access to
some of the vital information by making use of various kind of resources. The mere focus is all
about protecting some of vital and sensitive information for ABCT.
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/2a05da77-8dad-49d2-82d8-03f07199ace9-page-13.webp)
12PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
References
Akbari Roumani, M., Fung, C. C., Rai, S., & Xie, H. (2016). Value analysis of cyber security
based on attack types. ITMSOC: Transactions on Innovation and Business
Engineering, 1, 34-39.
Alshaikh, M., Maynard, S. B., Ahmad, A., & Chang, S. (2018). An exploratory study of current
information security training and awareness practices in organizations.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees'
cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.
Astani, M., & Ready, K. J. (2016). Trends and preventive strategies for mitigating cybersecurity
breaches in organizations. Issues in Information Systems, 17(2).
Awan, J., & Memon, S. (2016). Threats of cyber security and challenges for Pakistan.
In International Conference on Cyber Warfare and Security (p. 425). Academic
Conferences International Limited.
Glaspie, H. W., & Karwowski, W. (2017, July). Human factors in information security culture: A
literature review. In International Conference on Applied Human Factors and
Ergonomics (pp. 269-280). Springer, Cham.
He, Y., & Johnson, C. (2017). Challenges of information security incident learning: An industrial
case study in a Chinese healthcare organization. Informatics for Health and Social
Care, 42(4), 393-408.
Hettiarachchi, S., & Wickramasinghe, S. (2016). Study to Identify Threats to Information
Systems in Organizations and Possible Countermeasures through Policy Decisions and
Awareness Programs to Ensure the Information Security.
References
Akbari Roumani, M., Fung, C. C., Rai, S., & Xie, H. (2016). Value analysis of cyber security
based on attack types. ITMSOC: Transactions on Innovation and Business
Engineering, 1, 34-39.
Alshaikh, M., Maynard, S. B., Ahmad, A., & Chang, S. (2018). An exploratory study of current
information security training and awareness practices in organizations.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees'
cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.
Astani, M., & Ready, K. J. (2016). Trends and preventive strategies for mitigating cybersecurity
breaches in organizations. Issues in Information Systems, 17(2).
Awan, J., & Memon, S. (2016). Threats of cyber security and challenges for Pakistan.
In International Conference on Cyber Warfare and Security (p. 425). Academic
Conferences International Limited.
Glaspie, H. W., & Karwowski, W. (2017, July). Human factors in information security culture: A
literature review. In International Conference on Applied Human Factors and
Ergonomics (pp. 269-280). Springer, Cham.
He, Y., & Johnson, C. (2017). Challenges of information security incident learning: An industrial
case study in a Chinese healthcare organization. Informatics for Health and Social
Care, 42(4), 393-408.
Hettiarachchi, S., & Wickramasinghe, S. (2016). Study to Identify Threats to Information
Systems in Organizations and Possible Countermeasures through Policy Decisions and
Awareness Programs to Ensure the Information Security.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/c37357aa-2190-45d8-a783-d9502cb80770-page-14.webp)
13PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
Johnson, C., Badger, M., Waltermire, D., Snyder, J., & Skorupka, C. (2016). Guide to cyber
threat information sharing(No. NIST Special Publication (SP) 800-150 (Draft)). National
Institute of Standards and Technology.
Koppel, R., Smith, S. W., Blythe, J., & Kothari, V. (2015). Workarounds to computer access in
healthcare organizations: you want my password or a dead patient?. In ITCH (pp. 215-
220).
Kott, A., Blakely, B., Henshel, D., Wehner, G., Rowell, J., Evans, N., ... & Krutilla, K. (2018).
Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty
Organization (NATO) Workshop IST-153. arXiv preprint arXiv:1804.07651.
Loukaka, A., & Rahman, S. (2017). Discovering new cyber protection approaches from a
security professional prospective. International Journal of Computer Networks &
Communications (IJCNC) Vol, 9.
Madnick, S., Jalali, M. S., Siegel, M., Lee, Y., Strong, D., Wang, R., ... & Mistree, D. (2016,
September). Measuring stakeholders’ perceptions of cybersecurity for renewable energy
systems. In International Workshop on Data Analytics for Renewable Energy
Integration (pp. 67-77). Springer, Cham.
Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National initiative for cybersecurity
education (NICE) cybersecurity workforce framework. NIST Special Publication, 800,
181.
Oyelami, J. O., & Ithnin, N. B. (2015). Establishing a sustainable information security
management policies in organization: a guide to information security management
practice (ISMP)[J]. Organization, 4-4.
Johnson, C., Badger, M., Waltermire, D., Snyder, J., & Skorupka, C. (2016). Guide to cyber
threat information sharing(No. NIST Special Publication (SP) 800-150 (Draft)). National
Institute of Standards and Technology.
Koppel, R., Smith, S. W., Blythe, J., & Kothari, V. (2015). Workarounds to computer access in
healthcare organizations: you want my password or a dead patient?. In ITCH (pp. 215-
220).
Kott, A., Blakely, B., Henshel, D., Wehner, G., Rowell, J., Evans, N., ... & Krutilla, K. (2018).
Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty
Organization (NATO) Workshop IST-153. arXiv preprint arXiv:1804.07651.
Loukaka, A., & Rahman, S. (2017). Discovering new cyber protection approaches from a
security professional prospective. International Journal of Computer Networks &
Communications (IJCNC) Vol, 9.
Madnick, S., Jalali, M. S., Siegel, M., Lee, Y., Strong, D., Wang, R., ... & Mistree, D. (2016,
September). Measuring stakeholders’ perceptions of cybersecurity for renewable energy
systems. In International Workshop on Data Analytics for Renewable Energy
Integration (pp. 67-77). Springer, Cham.
Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National initiative for cybersecurity
education (NICE) cybersecurity workforce framework. NIST Special Publication, 800,
181.
Oyelami, J. O., & Ithnin, N. B. (2015). Establishing a sustainable information security
management policies in organization: a guide to information security management
practice (ISMP)[J]. Organization, 4-4.
![Document Page](https://desklib.com/media/document/docfile/pages/professional-skill-for-information-and-c-yp9p/2024/09/08/00b7b5d5-692a-4bad-a57c-ae7b47e0c5c1-page-15.webp)
14PROFESSIONAL SKILL FOR INFORMATION AND COMMUNICATION
Parent, M., & Cusack, B. (2016). Cybersecurity in 2016: People, technology, and processes. Bus.
Horiz, 59, 567-569.
Raud, M. (2015, July). china and cyber: attitUde, strategies and organiZation. In cyber research
WorkshoP 2015 (p. 12).
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015).
Information security conscious care behaviour formation in organizations. Computers &
Security, 53, 65-78.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model
in organizations. Computers & Security, 56, 70-82.
Steinbart, P. J., Raschke, R. L., Gal, G., & Dilla, W. N. (2018). The influence of a good
relationship between the internal audit and information security functions on information
security outcomes. Accounting, Organizations and Society, 71, 15-29.
Parent, M., & Cusack, B. (2016). Cybersecurity in 2016: People, technology, and processes. Bus.
Horiz, 59, 567-569.
Raud, M. (2015, July). china and cyber: attitUde, strategies and organiZation. In cyber research
WorkshoP 2015 (p. 12).
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015).
Information security conscious care behaviour formation in organizations. Computers &
Security, 53, 65-78.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model
in organizations. Computers & Security, 56, 70-82.
Steinbart, P. J., Raschke, R. L., Gal, G., & Dilla, W. N. (2018). The influence of a good
relationship between the internal audit and information security functions on information
security outcomes. Accounting, Organizations and Society, 71, 15-29.
1 out of 15
Related Documents
![[object Object]](/_next/image/?url=%2F_next%2Fstatic%2Fmedia%2Flogo.6d15ce61.png&w=640&q=75)
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.