Secure the Network from Common Threats and Attacks

Verified

Added on  2023/06/18

|9
|2638
|334
AI Summary
This report discusses the possible security breaches faced by Olive Oyl Company and provides guidelines for responsible usage of digital space. It covers threats, vulnerabilities, and attacks in detail, along with their significance in a network. The report also suggests ways to remove the .meds file format attack and secure the network from malware and cyber crimes.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Secure the network
from common threats
and attack

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
TASK 1............................................................................................................................................1
Possible Security Breach 1: Malware.....................................................................................2
Possible Security Breach 2: Disgruntled Employees.............................................................2
Possible Security Breach 3: too much permission to network...............................................2
TASK 2............................................................................................................................................3
Threats:...................................................................................................................................3
Vulnerabilities........................................................................................................................4
Attacks....................................................................................................................................4
“.meds” file format attack.......................................................................................................4
TASK 3............................................................................................................................................5
TASK 4............................................................................................................................................5
CONCLUSION................................................................................................................................5
References:.......................................................................................................................................6
Books and Journals.................................................................................................................6
Document Page
INTRODUCTION
The businesses are growing itself with the adoption of IT network technology and also using it as
the source to communicate with their customers. Business applications are developed using the
advanced technology which helps the business organisations to store their information digitally
in form of digital codes. But with the growing usage of digital systems and internet network
technology such as open WIFI for different operations of the business the businesses are facing
the threat of breaching and cyber attacks. Data breaching, cyber attacks all the form of stealing
and destroying the personal information through unauthorized access into the computer system.
The hackers are the illegal people with huge knowledge about computer network system and
coding and through which they unethically and illegally breach some else data (Grosch, 2020).
The present report will discuss the network threat and attack of the Olive Oyl Company – a
medium size retail showroom of the Popeye. The report will discuss the reasons of possible
security breaches held to the network of Olive Oly. Further in the report types of threats,
vulnerabilities and attacks are discussed. At last, the guideline for Olive Oly staff members and
customers to responsibly use their digital space is drafted in the report.
MAIN BODY
TASK 1
Data breaching is considered as one of the cyber crimes in which there is stealing of
information unauthorised for authorised system. This is either done intentionally or
unintentionally which means release of a secured and confidential information as an
unintentional disclosure of information or data leak or spill of data. There is a another term
related to the data breach that is a security breach which is a incident which results in to a
unauthorised access to the network of an organisation thereby causing an access to the computer
application, business application, networks and devices (Jurcut and et. al., 2020). The basic
difference between the security breach and data breach is that insecurity breeds the criminal
effectively breaks in into the system but the data breach is a cyber crime there a criminal gets
away with the information. Olive Oyl a medium size retail showroom also faced a problem of
security breaching when company use the technique of providing open Wi-Fi connectivity in the
premises of the coffee shop in order to increase the number of customers but this action led to
access for unauthorised system into the network causing the situation of security breaching.
1
Document Page
Based on the scenario of Olive Oyl Company there can be several reasons of security breaching
that are outlined below:
Possible Security Breach 1: Malware
Reason: In the case of Olive Oyl Company the first reason of security breaches is
competitive rivalry which led to the hiring of a hacker which is commonly known as a Malware
in which the outside company hire a hacker which has IT skills (Bond, 2021). This was the form
of Ransomeware attack in which the workstation of the Olive Oyl which has all the information
and necessary documentation was transformed to Med. file format. Hacker creates the on access
point to illegally get the authorisation of a legitimate data of another business application and to
their information. As the report of Verizon's 2020 there is 22% security breaches are caused due
to the social attack. The attack by Bluto a competitor of a Popeye's business is one of such type
of breaches.
Possible Security Breach 2: Disgruntled Employees
Reason: In the case of Olive Oyl Company the second possible breach is caused to the
disgruntled employee or the internal actor. According to the Verizon's 2020 DBIR, 30% of data
breach involves internal actors. This is the type of data breach in which a person already an
employee or was the existing employee of the organisation who has been disgruntled carry out
security breaching in order to take the revenge from the organisation (Aljumah and Ahanger,
2020). With the good performance of Wimpy Popeye the owner of Olive Oyl decided to
withdraw the position of sales head due to which was lay off front he job. Later Jack was hired
by competitor of Popeye's and they together led the breaching of security.
Possible Security Breach 3: too much permission to network
Reason: In order to increase the sales of the Olive Oyl showroom Wimpy a newly appointed
marketing head adopted a business tactic in which you are offered a complimentary Wi-Fi with
high speed internet to the customers sitting out at coffee shop of showroom. As human error it is
not segregated the network used by the business applications of the company the Wi-Fi provided
to the customers. This access to permission to too many people became a gift to a hacker causing
exploitation of security of network of Olive Oyl information stored business application (Pan and
et. al., 2020).
2

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TASK 2
Threats:
What is a Threat?
A threat is a potential negative intention that might cause damage, injury or pain to someone or
something. In language of computer network the cyber security threat is the malicious activity
that has an aim of correcting for stealing or disrupting the computer system and network of an
entire organisation (Tabrizchi and Rafsanjani, 2020).
Types of Threats
There are several types of cyber security threats some of them are discussed below:
Malware: most commonly known threat is Malware pictures malicious software. In this
the user clicks a malicious link or an attachment received through an email is activate the
malicious software leading to the damage of information or blocking the access of key network
components.
Hackers: The hackers are the IT specialists that have all the skills and knowledge related
to advanced computer but tend to use it for illegal activity causing threat to the information of
organisations like Olive Oyl.
Virus: Viruses are like the computer software that is capable in infecting and destroying
the functions of computers. They are the common security threat transmitted mostly through
USB drivers or over the network.
Spam: the spam are common threat to the security of information, it is the form of
unsolicited junk SMS or mail. It is mainly occurred through advertisements which mainly have
capability to consume the network bandwidth (Papaioannou and et. al., 2020).
Significance of threats in a Network
Many organisations install threats to their network as the purpose of security. Installation
of threads into a network help the organisation to protect their internal information’s that are
confidential as well as private related to their employees, finance, operations etc. Because when
any kind of security breaches into the network the person accessing the network may not able to
crack information inside that network as the threats installed into the network in main lead to the
crash of authorisation or create exam thereby causing a block to the information.
3
Document Page
Vulnerabilities
Vulnerabilities of the network are the loopholes or flaws in the processes networks,
software, hardware’s of a computer system that threatens for this function is the normal functions
of a organisations network. The network vulnerability can be broken into different types such as
software, hardware, firmware and human vulnerability. The vulnerabilities are the flaws into a
system which are exported by the attackers (Xu and et. al., 2021). the vulnerability vary from
organisation to organisation in terms of complexity therefore it is very important to be aware of
all the world and it is associated with the organisation for which company must regularly review
their security policies practices and protocols in order to prevent recurring network vulnerability.
The main reasons behind the network vulnerabilities are unauthorised access, weak passwords,
poor user tracking and unsecure backup methods.
Attacks
The attacks are the most common type of cyber crime which is also known as the cyber
attacks. Cyber attack with the most offensive and an illegal cyber crime in which there is an
illegal and unwelcoming attempt of exposing, disappoint, stealing, altering the personal
information another organisation on your person through the unauthorised access into a computer
system (Alhayani and et.al., 2021). There are different types of cyber attacks suggest phishing
attack, denial of service attack, cross site attack etc. Common reasons of the attacks is the
competition of one organisation with another, a psychological destruction of an hacker, a
personal cause to harm the reputation of a person image of an another person, to exploit someone
else data for personal advantage etc. Different types of attacks phishing attack is the most
common and the oldest attack method in which there is a social engineering in which the victim
receives email or a message that ask for the sensitive data observe the click link through which
attack that enters into the computer system.
“.meds” file format attack
The extension .meds is considered to be the attack of ransomware infection also called as STOP.
The purpose of this type of malicious files to lock the data through Ransomeware virus which
infects the computer system with the purpose of encrypting the personal files and data with a
strong cypher algorithm. This corrupt the personal target files leaving the information in the
format of dot meds files which are inaccessible to the user (Zhenhua, 2020). The Olive
workstation where also breached in the format of .Med file format. There are the possible ways
4
Document Page
to remove the maid virus for which one must install spyware system and antivirus software.
After that run the setup file into the anti-virus software in order to finish the downloading double
click and again install the file wait for the scanning and clean the corrupted files this will decrypt
.med file into the original file format.
TASK 3
TASK 4
With the open access of digital space in the Olive Oyl Company there is increase threat of
Malware and cyber crimes therefore in order to secure the network and the information of the
staff members, organisation and customers it is very important to draught some of the guidelines
regarding the responsible usage of the digital space (Barykin and et.al ., 2021). A guideline for
Olive-Oyl staff members and customers to responsibly use their digital space are stated below:
Uses of the digital space must have a detailed licence related to their personal information
and with the Authorization of head of network department.
The users of the distributed open digital space network must contain the emblem and
their personal authorised passwords off the network so the company is not responsible for
any data breach of the customers by using the open space network.
Employees who have permission to access the digital space and the business applications
update their devices with appropriate security in order to avoid any kind of misconduct
also game files are required to register themselves with their personal information into
the system of business application in order to avoid fraud and stealing.
Any customer or employee court with the act of security breaching and is committed to
conduct a fraud or identified will be answerable to the legal actions under the Data
protection and security act.
Employees using the open space digital network must consistently update their antivirus
software and also keep their operating systems passwords protected and must not share it
with anyone in order to maintain protection of data (Campisi and et. al., 2021).
CONCLUSION
From the above information it is concluded that with the growing technology organisations
has become the victim of cyber attacks and information breaching. It is analysed to that day by
day the rate of cybercrime is spiking up despite of hiring cyber security professionals and
5

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
individuals in the securing the network. Therefore with the compliance of the technology and IT
networks within the systems of business, the top priority of the today's business operations is to
install with secure in network that has a high potential of maintaining data security. The
organisations mast set and appropriate guidelines for their employees staff members regarding
the use of responsible digital systems and network authorised to them and in case of breaching
the consequences should be stated in relation to legal regulatory.
6
Document Page
References:
Books and Journals
Alhayani, B and et.al., 2021. Best ways computation intelligent of face cyber attacks. Materials
Today: Proceedings.
Aljumah, A. and Ahanger, T.A., 2020. Cyber security threats, challenges and defence
mechanisms in cloud computing. IET Communications, 14(7), pp.1185-1191.
Barykin, S.Y and et.al ., 2021. Developing the physical distribution digital twin model within the
trade network. Academy of Strategic Management Journal, 20, pp.1-18.
Bond, C.S., 2021. Ransomware: Economic Impact Analysis (Doctoral dissertation, Utica
College).
Campisi, T and et. al., 2021. The Development of the Smart Cities in the Connected and
Autonomous Vehicles (CAVs) Era: From Mobility Patterns to Scaling in
Cities. Infrastructures, 6(7), p.100.
Grosch, A.N., 2020. Library information technology and networks. CRC Press.
Jurcut, A and et. al., 2020. Security considerations for Internet of Things: A survey. SN
Computer Science, 1, pp.1-19.
Pan, X and et. al., 2020. Privacy-preserving multilayer in-band network telemetry and data
analytics: For safety, please do not report plaintext data. Journal of Lightwave
Technology, 38(21), pp.5855-5866.
Papaioannou, M and et. al., 2020. A survey on security threats and countermeasures in internet of
medical things (IoMT). Transactions on Emerging Telecommunications Technologies,
p.e4049.
Tabrizchi, H. and Rafsanjani, M.K., 2020. A survey on security challenges in cloud computing:
issues, threats, and solutions. The journal of supercomputing, 76(12), pp.9493-9532.
Xu, X and et. al., 2021. A new day-to-day dynamic network vulnerability analysis approach with
Weibit-based route adjustment process. Transportation Research Part E: Logistics and
Transportation Review, 153, p.102421.
Zhenhua, C.H.E.N., 2020. Significance of exhaled breath temperature monitoring during and
after acute attack of asthma in children. , 24(19), pp.59-62.
7
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]