Use of Cybersecurity within office and home systems
Verified
Added on  2023/03/23
|15
|4011
|74
AI Summary
The report discusses the nature of the ABCT Company and the different forms of security vulnerabilities and emerging threats affecting the systems. It also provides recommendations for increasing the level of security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS Use of Cybersecurity within office and home systems Name of the Student Name of the University Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS Executive Summary The report discussesthe nature of the ABCT Company.The company is based on the introduction of various kind of technical aspects such as hardware and software systems. Various forms of vulnerability could be affecting the systems of the company. Different kind of emerging threats has also been detected within the report. Based on the different forms of emerging threats, there are various forms of recommendations that would need to be implemented by the systems. Hence, from the discussion of the report, the various kind of security that would be implemented within the systems would be understood, which would be useful for the company.
2USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS Table of Contents 1. Introduction..................................................................................................................................3 2. Discussion the Cybersecurity Systems of ABCT........................................................................4 2.1 Vulnerabilities within the ABCT System..............................................................................4 2.2 Emerging Threats affecting ABCT System and type of Damage created.............................5 2.3 Responsibility for each form of attack and techniques followed..........................................7 3. Conclusion...................................................................................................................................9 4. Recommendation.......................................................................................................................10 References......................................................................................................................................11
3USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS 1. Introduction Cybersecurity is also defined as the form of security that would be meant for different home and office systems. The protection of computer systems would be considered as to be most important for securing the areas of hardware, software or different kind of electronic data. The use of such form of security would lead to the security of computer systems from different forms of disruption and misdirection of computer services (Buczak & Guven, 2015). The field of computer security can be considered to have growing forms of importance based on the increasing form of reliance for computer systems. With the introduction of such kind of services, the different forms of wireless networks that would be installed within home, office and businesses would be highly protected. The report in this discussion would focus on the aspects of cyber security that would be important for ABCT organisation. The different forms of security vulnerabilities would also be discussed in the report. The report would also help in understanding the emerging threats that could affect the systems. With the help of such kind of discussion over the attacks, the immediate cause of such kind of damage would be described in the report (Elmaghraby & Losavio, 2014). The different forms of damage that would be created from the various conducted attacks would be considered. The techniques of attack would also be considered based on the discussion supported on cyber-security. The report would also provide some recommendations that would be included within the ABCT for protecting the end systems and increase the level of security for the systems.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS 2. Discussion the Cyber security Systems of ABCT 2.1 Vulnerabilities within the ABCT System As per the discussion from the case, the different forms of security vulnerabilities that could affect the security systems of ABCT Company are: 1.Injection Flaws– The flaws in the security systems of ABCT could result from the classical form of failure that has been resulted from the filtering of untrusted input. This kind of security vulnerability could occur whenever the user would pass any form of unfiltered data to the SQL server, the LDAP server and to the browser (Deepa & Thilagam, 2016). The primary problem that would be present in such kind of vulnerability is that the attacker would be able to intend to inject command to certain entities and thus result to loss of data and thus also hijack the browser for the client. 2.Cross Site Scripting– In this form of vulnerability within the IT systems, the attacker would supply the JavaScript tag to the web application used by the intended use based on a certain form of inputs (Hydara, Sultan, Zulzalil & Admodisastro, 2015). Whenever the input would be returned to the user in an unsanitized form, the browser of the user would execute it. On loading of the page, the internal script would run and thus the user would be able to post the cookies to the attacker. 3.Insecure Direct Object References– In this attack, a direct form of reference to the object would be created. This would mean that the internal object such as a database or file would be left exposed to the user. The primary problem with this attack is that the attacker would be able to supply the references (Rafique et al., 2015). If there is a proper form of authorization, the attacker would be able to access or perform illegal things over the website of the user.
5USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS 2.2 Emerging Threats affecting ABCT System and type of Damage created In recent times, there have been different forms of emerging threats that could affect the security systems of the ABCT Company. The company focuses on the use of technology and they mainly deal with the different forms of aspects of computer hardware and software. Each of the computer resources that are used within the company are highly vulnerable to getting attacked from the emerging threats within the ICT sector (Jang-Jaccard & Nepal, 2014). The company also supports the prospect of providing their employees with the facility of work from home. This has been made possible with the help of VPN connections. They have also introduced the Bring Your Own Device (BYOD) policy for their various employees who would work onsite and serve the company. The company also supports the facility of free access to wireless LAN for its guests and visitors. However, with the providing of such kind of services to its customers, it has been seen that the company had been prone to several forms of threats that have pervaded within the internal systems. However, with the implication of such kind of technology, the different kind of emerging threats that might affect the internal systems of ABCT Company are: 1.Phishing attacks– The attacks based on phishing could be considered as the greatest form of risks that could be affecting the integrity systems of ABCT. Phishing can be considered as a form of social engineering attack that would be used for stealing user data. This would include the credit card numbers and login credentials for the user. This kind of attack could occur when an attacker, who would be masquerading as a form of trusted entity will dupe a particular victim into the opening of email content (Wright et al., 2014). The recipient would be tricked into the opening of the malicious link and thus unknowingly would permit the access for installation of malware into the device.
6USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS 2.Hacking attacks– One of the other major concern for the ABCT systems is based on the hacking of the internal systems. Hacking is defined as the activity and practice based on the bypassing of the computer system and the security levels. Different kind of attacks based on hacking could be included within the sector of hacking. These would include – DDoS attacks, Trojan horses, malicious websites, Worm and many others (Huang et al., 2014). These kinds of techniques are mostly developed by highly efficient hackers and their primary intention is to break into the security systems of the intended host. 3.Botnet– The term botnet is a combination of the term ‘robot’ and ‘network’. The cybercriminals employ the use of a special form of Trojan viruses that would be able to breach into the secure servers of ABCT and thus would infect the computer of the intended user. The main intention of the cybercriminal is to infect a single computer at one point of time and thus move on to another computer by following the chain of networks (Bertino & Islam, 2017). This kind of attack based on the use of botnet would have the capability by delivering the Distributed Denial of Service (DDoS) attack. 4.BYOD– The Bring Your Own Device (BYOD) could be defined as a growing form of trend within the business world. With the rise of internet technology, different organisations have permitted their employees to make use of their personal mobile devices in order to ensure productivity and job satisfaction within the industry (French et al., 2014). However, with the implications of such kind of technology, BYOD would be able to create flexibility in the conditions of work and thus also lead to satisfaction in the job performed by the employees. The security architecture based on the IT domain would mostly rely on the infrastructure of software and hardware (Eslahi et al., 2014). As employees would bring their personal devices, the organisation would have less form of control over the factor of the flow of information. Issues in
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS relation to privacy aspects and securing the endpoint devices of the organisation have been seen as a critical factor within the organisation. 5.Ransomware– In recent times, there has been a major rise in the number of attacks based on the use of ransomware. Different IT security based governing officials has discussed the factor of protecting the computer and internal data of the organisation based on cyber-attacks (Kharaz et al., 2016). The matter of ensuring security within the internal systems is a matter of high concern. Every organisation should decide on their own ways of securing their end systems from the devastating attacks posed by ransomware. In recent years of 2015 and 2016, the rise of attacks from ransomware could be considered to be highly critical in nature (Continella et al., 2016). The main purpose of the ransomware is to detect the internal flaws within the software systems of the company and thus inject the malicious codes into the systems. 2.3 Responsibility for each form of attack and techniques followed The discussion in the above section of the report mainly focuses on the emerging threats that could affect the internal software systems of ABCT. The discussion discusses the various kind of attacks that might be prone to the systems and which might prove to have a negative impact on the ABCT systems (Ali, Khan & Vasilakos, 2015). The following section would discuss the serious forms of implications that would be made with the effect of the emerging threats on the systems. It would also detail the person or computer system who would be held responsible for the attack. The technique based on the creation of such kind of attacks has also been discussed in this section. 1.Phishing attacks– Different cybercriminals who have a strong sense of programming languages and who have a broad reach towards attacking the networked systems are primarily responsible for the phishing attacks. These cybercriminals have extensive knowledge of social
8USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS engineering techniques. They thus make use of such kind of systems for luring the user into clicking on several forms of links, attachments and disclosing of user information (Shahriar, Klintic & Clincy, 2015). The cybercriminals could impersonate themselves to be trusted service providers of any company or any other service. These cybercriminals could also design spoofed websites. The main aim of such cybercriminals is to gain access to private data of their targets. In recent times,the differenttechniques, which are used to conduct phishing attacks,have continued to evolve and grow in recent years. 2.Hacking attacks– The attacks based on hacking could be performed by different social groups of hackers. These hackers would mainly aim to detect the internal flaws within the computer system of the intended user. The hackers who are responsible for performing the various methods of hacking attacks would make use of technical skills. the most common techniqueofhackingbasedattacksincludeskeylogger,eavesdropping,virus,Trojan, clickjacking attacks, phishing, waterhole attacks and many others (Hamdare, Nagpurkar & Mittal, 2014). The skilled hackers who intend to get into the security systems of companies would find different forms of advantages from the flaws within the end systems of users. These include the finding of ambiguities within the user interfaces and finding the number of mistakes that could be found within the passwords. 3.Botnet–Theuseofdifferentkindofbotnetsforthepurposeofmining cryptocurrencies can be defined as a growing form of business that is primarily used by cybercriminals. Different trends in the extraction of passwords can be discussed as the trend that would continue. It would thus result that with the rise of differently used techniques based on the spread of botnets (Alieyan et al., 2017). These botnets are widely being used by cybercriminals for infecting the computers with the help of specialised mining software for infecting the digital
9USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS wallets of individuals. The other techniques that are used by cybercriminals to infect other computers with the help of botnets are possible with the help of a Trojan horse virus. These kinds of autonomous bots would make use of the techniques such as seek-and-infect missions, which constantly search into the web for finding lacks within the operating system. 4.BYOD– Security risks can be defined as the most critical risk in terms of BYOD. The network intruders can access the network by breaking the passwords and compromising the security of the clients (Cvijetic, 2014). The techniques that are used by cybercriminals for breaking into the security aspects of the intended users is based on spoofing attacks, loss of devices that can lead to theft of data (Moussouri & Roussos, 2014). Different malware techniques could be injected within the mobile devices of the user, which would lead to several kinds of problems for the devices. 5.Ransomware– This kind of emerging that could affect the internal systems of ABCT could be performed by the NSA. Another hacker group known as Shadow Group have also held the responsibility for breaching the security of the computers (Kang, Oh & Im, 2014). These hacker groups have leaked the use of Eternal Blue and different other cyber weapons have beared the entire responsibility for the attacks based on ransomware.These ransomware have greatly hampered the growth of networked systems. 3. Conclusion Based on the supported discussions from the above report, it could be concluded that the use of cyber security measures would prove to be highly helpful for protecting the end systems of ABCT. The company is responsible for dealing with the different forms of technical materials suchashardwareandsoftware.Thediscussioninthisreportdiscussesaboutthecore
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS functionalities that are performed by ABCT. From the discussion, it has been seen that ABCT has brought about the use of different forms of networking devices and other computer devices that could help them in increasing the efficiency of the business. However, these kinds of devices might be vulnerable to several forms of attacks over the systems. The discussion focuses on the different forms of vulnerabilities that might affect the system. These vulnerabilities have been focused greatly in order to ensure that such kind of systems should be needed to be protected. Different forms of emerging threats have also been discussed for the current system employed at ABCT. Hence, the discussion supported from the above discussion helps in understanding the different forms of techniques that are used for creating the attacks. Hence, such measures should be implied within the industry to protect and secure the end systems. 4. Recommendation However, with the main focus of improving the cybersecurity systems of the ABCT, it couldbediscussedthattherecouldbesomeformofrecommendationsthatcouldbe implemented. The ABCT Company should highly invest in training based on cyber security and thus they should also educate the employees. The company should also implement the factor of two-factor authentication that would help in implementing access to different mode of controls. Passwords are also considered as an important aspect to the security of the computer systems. Hence, the ABCT Company should have a strong policy for the setting of passwords that would help in securing the end systems. Based on the following of such kind of measures, the company would be able to secure their technical hardware and software systems and the various other services offered by them. Hence, with the help of such kind of systems and protection systems, it
11USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS would also help in securing the end systems of ABCT and thus improve the security of the customers.
12USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS References Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges.Information sciences,305, 357-383. Alieyan, K., ALmomani, A., Manasrah, A., & Kadhum, M. M. (2017). A survey of botnet detection based on DNS.Neural Computing and Applications,28(7), 1541-1558. Bertino, E., & Islam, N. (2017). Botnets and internet of things security.Computer, (2), 76-79. Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection.IEEE Communications Surveys & Tutorials,18(2), 1153-1176. Continella, A., Guagnelli, A., Zingaro, G., De Pasquale, G., Barenghi, A., Zanero, S., & Maggi, F.(2016,December).ShieldFS:aself-healing,ransomware-awarefilesystem. InProceedings of the 32nd Annual Conference on Computer Security Applications(pp. 336-347). ACM. Cvijetic, N. (2014, September). Optical network evolution for 5G mobile applications and SDN- based control. In2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks)(pp. 1-5). IEEE. Deepa, G., & Thilagam, P. S. (2016). Securing web applications from injection and logic vulnerabilities: Approaches and challenges.Information and Software Technology,74, 160-180. Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy.Journal of advanced research,5(4), 491-497.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS Eslahi, M., Naseri, M. V., Hashim, H., Tahir, N. M., & Saad, E. H. M. (2014, April). BYOD: Currentstateandsecuritychallenges.In2014IEEESymposiumonComputer Applications and Industrial Electronics (ISCAIE)(pp. 189-192). IEEE. French, A. M., Guo, C., & Shim, J. P. (2014). Current status, issues, and future of bring your own device (BYOD).Communications of the Association for Information Systems,35(1), 10. Hamdare, S., Nagpurkar, V., & Mittal, J. (2014). Securing SMS based one time password technique from Man in the middle attack.arXiv preprint arXiv:1405.4828. Huang, J. Z., Kunz-Jacques, S., Jouguet, P., Weedbrook, C., Yin, Z. Q., Wang, S., ... & Han, Z. F.(2014).Quantumhackingonquantumkeydistributionusinghomodyne detection.Physical Review A,89(3), 032304. Hydara, I., Sultan, A. B. M., Zulzalil, H., & Admodisastro, N. (2015). Current state of research on cross-site scripting (XSS)–A systematic literature review.Information and Software Technology,58, 170-186. Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity.Journal of Computer and System Sciences,80(5), 973-993. Kang, D., Oh, J., & Im, C. (2014, August). Context based smart access control on BYOD environments. InInternational Workshop on Information Security Applications(pp. 165- 176). Springer, Cham.
14USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS Kharaz, A., Arshad, S., Mulliner, C., Robertson, W., & Kirda, E. (2016). {UNVEIL}: A Large- Scale, Automated Approach to Detecting Ransomware. In25th {USENIX} Security Symposium ({USENIX} Security 16)(pp. 757-772). Moussouri, T., & Roussos, G. (2014). Mobile sensing, BYOD and big data analytics: New technologies for audience research in museums.Participations: journal of audience and reception studies,11(1), 270-285. Rafique, S., Humayun, M., Hamid, B., Abbas, A., Akhtar, M., & Iqbal, K. (2015, June). Web application security vulnerabilities detection approaches: A systematic mapping study. In2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)(pp. 1-6). IEEE. Shahriar,H.,Klintic,T.,&Clincy,V.(2015).Mobilephishingattacksandmitigation techniques.Journal of Information Security,6(03), 206. Wright, R. T., Jensen, M. L., Thatcher, J. B., Dinger, M., & Marett, K. (2014). Research note— influencetechniquesinphishingattacks:anexaminationofvulnerabilityand resistance.Information systems research,25(2), 385-400.