logo

Cyber Security Vulnerabilities and Recommendations for ABC Technology

   

Added on  2022-12-26

10 Pages3323 Words1 Views
Windows User
[COMPANY NAME] [Company address]
PROFESSIONAL SKILLS IN
INFORMATION
COMMUNICATION
Cyber Security Vulnerabilities and Recommendations for ABC Technology_1
Executive summary:
Cyber-security, it is often referred to as the collection of policies, tools,
security safeguards, security concepts, risk management approaches,
guidelines, training, actions, assurance, technologies and best practices that
are used by the organizations to protect their cyber-environment and assets
such as customer data, information, applications, physical resources,
tangible resources, services and telecommunication system. With the
advancement of cyber-crimes, it has become essential for the organizations
that should evolve in the field of cyber security and implement practices and
policies that can provide complete prevention to them against any kind of
cyber-attack. ABC technology is a growing name in hardware and software
products and has multiple office in various areas where the employees
connect through and work on VPN. This document would investigate various
vulnerabilities in the current practices of the company such as use of BYOD
technology, Free Wi-Fi access to the visitors, utilization of cloud computing,
and would analyze how these vulnerabilities can attract Cyber-criminals to
perform various attacks on the company’s assets. The document briefly
describes the type and nature of this attack and how they can harm ABC
technology. At last the report presents some recommendations to the
company, such as importance of employee’s education, documentation of
the policies and backup of data, on the basis of investigation done on the
company’s security architecture. This document would serve the
organization and the employees to help them get a brief knowledge on the
cyber security paradigm and what are the basic requirements the company
should follow to avoid this security threats.
Cyber Security Vulnerabilities and Recommendations for ABC Technology_2
Contents
Executive summary:................................................................................................... 1
Introduction................................................................................................................ 3
Cyber-security............................................................................................................ 3
Identification and analysis of Vulnerabilities in the current architecture and practices
in ABC system............................................................................................................ 4
Bring Your Own device (BYOD) policy.....................................................................4
Free Wi-Fi for the guest/visitors............................................................................... 4
Cloud-based computing and storage of data...........................................................4
Security threats to ABC Company.............................................................................. 5
Denial of Service Attacks......................................................................................... 5
Social engineering................................................................................................... 5
Malware................................................................................................................... 6
Unauthorized access to the data.............................................................................6
Phishing................................................................................................................... 6
Conclusion.................................................................................................................. 7
Recommendation....................................................................................................... 7
References:................................................................................................................ 8
Cyber Security Vulnerabilities and Recommendations for ABC Technology_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Emerging Security Threats
|12
|3912
|46

Cybersecurity and its Importance to ABCT
|5
|959
|422

Professional skills for Information and Communication
|8
|1329
|480

Importance of Cybersecurity for ABCT
|15
|3960
|94

Importance of Cyber Security in ABC Technologies
|17
|3959
|429

Cybersecurity Threats and Recommendations for ABCT Organization
|12
|3497
|88