logo

Cyber Security Assignment - Gigantic Corporation

   

Added on  2020-05-16

13 Pages5221 Words102 Views
Running head: CYBER SECURITY Cyber SecurityName of the StudentName of the UniversityAuthor Note

1CYBER SECURITYTable of ContentsExecutive Summary.............................................................................................................2Risk Assessment..................................................................................................................3Risk Register....................................................................................................................3Protection mechanism..........................................................................................................9References..........................................................................................................................11

2CYBER SECURITYExecutive SummaryGigantic Corporation conducts several online activities, and it includes backing up ofdata in the cloud. That is why they will have to consider the security and the privacy issuesassociated with the business activities. Gigantic Corporation must assure security and privacy oftheir existing system. The organization will have to take the responsibility to secure theemployees confidential data those who are working in the organization. The report explains theappropriate project plan by which the security system can be implemented within theorganization. The project is quite difficult as it will have to identify all the threats residing withinthe system also it will have to provide the solutions to mitigate those risks. The report illustratesin details the possible threats that generally occur while Gigantic Corporation conducts thebusiness operations. The IT Risk Management report explains all the threats in details, thereport’s aim is to identify the threats first, then analyze the risks and lastly the mitigation of allthe risks. The project plan can only become successful if Gigantic Corporation deploys thesystem applying appropriate intrusion detection system. Gigantic Corporation must have toanalyze threats and risks well in order to build an efficient intrusion detection system. It is quitedifficult and complicated to assure cybersecurity in an organization. Gigantic Corporation willhave to understand the tools, vectors and mechanism of security exploitation and will have topredict the outcome of the system. The risks that are analyzed must be managed well, in this waythe project can become successful. Gigantic Corporation must establish a secured network withinthe organization to ensure security of the organization. Gigantic Corporation must implementappropriate project plan that is capable to mitigate the risks and threats. The project plan mustanalyze the risks and the threats deeply taking considerable amount of time. Then they shouldpropose a plan by which Gigantic Corporation can conduct the online activities safely andsecurely. Gigantic Corporation must be aware of the insider threat as this threat can prove to bedangerous. These insider threats are quite difficult to predict beforehand as the employees of theorganization are involved. The employees of the organizations generally have access to all theconfidential data. Therefore, they can steal the data, they can modify the data and can even deletethe data. The report also explains external threat that can prove to be disastrous for GiganticCorporation. The intruders send emails to the employees and conduct the malicious activities.The employees reply those emails and fall into the trap. The intruders get to know all the detailsof the company through these malicious activities. Gigantic Corporation thus can face severeloss, can lose money, can lose reputation, and can lose the customer base as well. The reportdiscusses about the various protection mechanisms following which Gigantic Corporation cansafeguard their system.

3CYBER SECURITYRisk Assessment Risk Assessment is a procedure by which the risks and threats associated with onlineactivities can be well analyzed. Risk Assessment consists of procedures by which GiganticCorporation can detect the issues beforehand. The procedures will help Gigantic Corporation toknow the various levels of risks. Proper risk management process is divided into several stages-first of all, it includes the identification of risks, the detailed analysis of risks and the controlmeasures to mitigate all those risks (Burley, Eisenberg & Goodman, 2014). The identification ofrisks involves the analysis of all the risks that can attack the system and the database. Theanalysis of risks involves the harmful impact of all the risks to Gigantic Corporation system andthe database. After appropriate accessing of risks, the control measures can help GiganticCorporation to mitigate the risks. The control measures ensure that the data does not get lostfrom the database. The control measures can help Gigantic Corporation to ensure that thefinancial data and the confidential data of the clients remain safe (Glantz et al., 2016). Theorganization can safeguard their system from potential virus and malware attack. The online activities contain a large number of risks. The project analysis helps inidentifying, analyzing and evaluation of risks. The primary objective of the project is to design asecure network for Gigantic Corporation that can help to ensure the security of the organization(Manuel, Cordeiro & Silva, 2017). The project will make sure that the cybersecurity can protectthe existing system of Gigantic Corporation from several threats and risks. Gigantic Corporationmust have to take effective cybersecurity control measures so that Gigantic Corporation cancarry out business activities over the cloud platform effectively. IT Risk Management reportleads to the design of Risk Register, the risk register is helpful to provide details of the risks,their likelihood, their impact and their priority (Miller, 2016). The Risk Register can helpGigantic Corporation to find out the best solution. Risk Register NumberCyber threatsExplanation of the risks and thethreatsPossibility Impact Priority1. Threat Insider threatsThreat insider attack leads to loss of confidential data (Keller, 2015)HighSevereHigh2.Phishing attackThe users are directed to a malicious website which looks like a real website, but in reality, it is not. The attack is carried out sending emails to users or victims(McGettrick et al., 2014)HighSevereHigh

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Assessment and Cyber Security Lead Consultant for Gigantic Corporation
|10
|3551
|91

Network Security Analysis: Cyber Security
|10
|1925
|30

IT Risk Management: Threats, Vulnerabilities and Prevention Methods
|21
|4785
|434

Risk Assessment based on Cloud Security
|11
|4088
|214

Project Dissertation Proposal: Next Generation Cybertrap
|12
|4471
|188

Risk Assessment based on Cloud Security
|13
|4730
|351