Use of Cybersecurity within office and home systems

Verified

Added on  2023/03/23

|15
|4011
|74
AI Summary
The report discusses the nature of the ABCT Company and the different forms of security vulnerabilities and emerging threats affecting the systems. It also provides recommendations for increasing the level of security.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
Use of Cybersecurity within office and home systems
Name of the Student
Name of the University
Author note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
Executive Summary
The report discusses the nature of the ABCT Company. The company is based on the
introduction of various kind of technical aspects such as hardware and software systems. Various
forms of vulnerability could be affecting the systems of the company. Different kind of emerging
threats has also been detected within the report. Based on the different forms of emerging threats,
there are various forms of recommendations that would need to be implemented by the systems.
Hence, from the discussion of the report, the various kind of security that would be implemented
within the systems would be understood, which would be useful for the company.
Document Page
2USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
Table of Contents
1. Introduction..................................................................................................................................3
2. Discussion the Cybersecurity Systems of ABCT........................................................................4
2.1 Vulnerabilities within the ABCT System..............................................................................4
2.2 Emerging Threats affecting ABCT System and type of Damage created.............................5
2.3 Responsibility for each form of attack and techniques followed..........................................7
3. Conclusion...................................................................................................................................9
4. Recommendation.......................................................................................................................10
References......................................................................................................................................11
Document Page
3USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
1. Introduction
Cybersecurity is also defined as the form of security that would be meant for different
home and office systems. The protection of computer systems would be considered as to be most
important for securing the areas of hardware, software or different kind of electronic data. The
use of such form of security would lead to the security of computer systems from different forms
of disruption and misdirection of computer services (Buczak & Guven, 2015). The field of
computer security can be considered to have growing forms of importance based on the
increasing form of reliance for computer systems. With the introduction of such kind of services,
the different forms of wireless networks that would be installed within home, office and
businesses would be highly protected.
The report in this discussion would focus on the aspects of cyber security that would be
important for ABCT organisation. The different forms of security vulnerabilities would also be
discussed in the report. The report would also help in understanding the emerging threats that
could affect the systems. With the help of such kind of discussion over the attacks, the immediate
cause of such kind of damage would be described in the report (Elmaghraby & Losavio, 2014).
The different forms of damage that would be created from the various conducted attacks would
be considered. The techniques of attack would also be considered based on the discussion
supported on cyber-security. The report would also provide some recommendations that would
be included within the ABCT for protecting the end systems and increase the level of security for
the systems.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
2. Discussion the Cyber security Systems of ABCT
2.1 Vulnerabilities within the ABCT System
As per the discussion from the case, the different forms of security vulnerabilities that
could affect the security systems of ABCT Company are:
1. Injection Flaws – The flaws in the security systems of ABCT could result from the
classical form of failure that has been resulted from the filtering of untrusted input. This kind of
security vulnerability could occur whenever the user would pass any form of unfiltered data to
the SQL server, the LDAP server and to the browser (Deepa & Thilagam, 2016). The primary
problem that would be present in such kind of vulnerability is that the attacker would be able to
intend to inject command to certain entities and thus result to loss of data and thus also hijack the
browser for the client.
2. Cross Site Scripting – In this form of vulnerability within the IT systems, the attacker
would supply the JavaScript tag to the web application used by the intended use based on a
certain form of inputs (Hydara, Sultan, Zulzalil & Admodisastro, 2015). Whenever the input
would be returned to the user in an unsanitized form, the browser of the user would execute it.
On loading of the page, the internal script would run and thus the user would be able to post the
cookies to the attacker.
3. Insecure Direct Object References – In this attack, a direct form of reference to the
object would be created. This would mean that the internal object such as a database or file
would be left exposed to the user. The primary problem with this attack is that the attacker would
be able to supply the references (Rafique et al., 2015). If there is a proper form of authorization,
the attacker would be able to access or perform illegal things over the website of the user.
Document Page
5USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
2.2 Emerging Threats affecting ABCT System and type of Damage created
In recent times, there have been different forms of emerging threats that could affect the
security systems of the ABCT Company. The company focuses on the use of technology and
they mainly deal with the different forms of aspects of computer hardware and software. Each of
the computer resources that are used within the company are highly vulnerable to getting
attacked from the emerging threats within the ICT sector (Jang-Jaccard & Nepal, 2014). The
company also supports the prospect of providing their employees with the facility of work from
home. This has been made possible with the help of VPN connections. They have also
introduced the Bring Your Own Device (BYOD) policy for their various employees who would
work onsite and serve the company.
The company also supports the facility of free access to wireless LAN for its guests and
visitors. However, with the providing of such kind of services to its customers, it has been seen
that the company had been prone to several forms of threats that have pervaded within the
internal systems. However, with the implication of such kind of technology, the different kind of
emerging threats that might affect the internal systems of ABCT Company are:
1. Phishing attacks – The attacks based on phishing could be considered as the greatest
form of risks that could be affecting the integrity systems of ABCT. Phishing can be considered
as a form of social engineering attack that would be used for stealing user data. This would
include the credit card numbers and login credentials for the user. This kind of attack could occur
when an attacker, who would be masquerading as a form of trusted entity will dupe a particular
victim into the opening of email content (Wright et al., 2014). The recipient would be tricked
into the opening of the malicious link and thus unknowingly would permit the access for
installation of malware into the device.
Document Page
6USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
2. Hacking attacks – One of the other major concern for the ABCT systems is based on
the hacking of the internal systems. Hacking is defined as the activity and practice based on the
bypassing of the computer system and the security levels. Different kind of attacks based on
hacking could be included within the sector of hacking. These would include – DDoS attacks,
Trojan horses, malicious websites, Worm and many others (Huang et al., 2014). These kinds of
techniques are mostly developed by highly efficient hackers and their primary intention is to
break into the security systems of the intended host.
3. Botnet – The term botnet is a combination of the term ‘robot’ and ‘network’. The
cybercriminals employ the use of a special form of Trojan viruses that would be able to breach
into the secure servers of ABCT and thus would infect the computer of the intended user. The
main intention of the cybercriminal is to infect a single computer at one point of time and thus
move on to another computer by following the chain of networks (Bertino & Islam, 2017). This
kind of attack based on the use of botnet would have the capability by delivering the Distributed
Denial of Service (DDoS) attack.
4. BYOD – The Bring Your Own Device (BYOD) could be defined as a growing form of
trend within the business world. With the rise of internet technology, different organisations have
permitted their employees to make use of their personal mobile devices in order to ensure
productivity and job satisfaction within the industry (French et al., 2014). However, with the
implications of such kind of technology, BYOD would be able to create flexibility in the
conditions of work and thus also lead to satisfaction in the job performed by the employees. The
security architecture based on the IT domain would mostly rely on the infrastructure of software
and hardware (Eslahi et al., 2014). As employees would bring their personal devices, the
organisation would have less form of control over the factor of the flow of information. Issues in

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
relation to privacy aspects and securing the endpoint devices of the organisation have been seen
as a critical factor within the organisation.
5. Ransomware – In recent times, there has been a major rise in the number of attacks
based on the use of ransomware. Different IT security based governing officials has discussed
the factor of protecting the computer and internal data of the organisation based on cyber-attacks
(Kharaz et al., 2016). The matter of ensuring security within the internal systems is a matter of
high concern. Every organisation should decide on their own ways of securing their end systems
from the devastating attacks posed by ransomware. In recent years of 2015 and 2016, the rise of
attacks from ransomware could be considered to be highly critical in nature (Continella et al.,
2016). The main purpose of the ransomware is to detect the internal flaws within the software
systems of the company and thus inject the malicious codes into the systems.
2.3 Responsibility for each form of attack and techniques followed
The discussion in the above section of the report mainly focuses on the emerging threats
that could affect the internal software systems of ABCT. The discussion discusses the various
kind of attacks that might be prone to the systems and which might prove to have a negative
impact on the ABCT systems (Ali, Khan & Vasilakos, 2015). The following section would
discuss the serious forms of implications that would be made with the effect of the emerging
threats on the systems. It would also detail the person or computer system who would be held
responsible for the attack. The technique based on the creation of such kind of attacks has also
been discussed in this section.
1. Phishing attacks – Different cybercriminals who have a strong sense of programming
languages and who have a broad reach towards attacking the networked systems are primarily
responsible for the phishing attacks. These cybercriminals have extensive knowledge of social
Document Page
8USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
engineering techniques. They thus make use of such kind of systems for luring the user into
clicking on several forms of links, attachments and disclosing of user information (Shahriar,
Klintic & Clincy, 2015). The cybercriminals could impersonate themselves to be trusted service
providers of any company or any other service. These cybercriminals could also design spoofed
websites. The main aim of such cybercriminals is to gain access to private data of their targets. In
recent times, the different techniques, which are used to conduct phishing attacks, have
continued to evolve and grow in recent years.
2. Hacking attacks – The attacks based on hacking could be performed by different
social groups of hackers. These hackers would mainly aim to detect the internal flaws within the
computer system of the intended user. The hackers who are responsible for performing the
various methods of hacking attacks would make use of technical skills. the most common
technique of hacking based attacks includes key logger, eavesdropping, virus, Trojan,
clickjacking attacks, phishing, waterhole attacks and many others (Hamdare, Nagpurkar &
Mittal, 2014). The skilled hackers who intend to get into the security systems of companies
would find different forms of advantages from the flaws within the end systems of users. These
include the finding of ambiguities within the user interfaces and finding the number of mistakes
that could be found within the passwords.
3. Botnet The use of different kind of botnets for the purpose of mining
cryptocurrencies can be defined as a growing form of business that is primarily used by
cybercriminals. Different trends in the extraction of passwords can be discussed as the trend that
would continue. It would thus result that with the rise of differently used techniques based on the
spread of botnets (Alieyan et al., 2017). These botnets are widely being used by cybercriminals
for infecting the computers with the help of specialised mining software for infecting the digital
Document Page
9USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
wallets of individuals. The other techniques that are used by cybercriminals to infect other
computers with the help of botnets are possible with the help of a Trojan horse virus. These kinds
of autonomous bots would make use of the techniques such as seek-and-infect missions, which
constantly search into the web for finding lacks within the operating system.
4. BYOD – Security risks can be defined as the most critical risk in terms of BYOD. The
network intruders can access the network by breaking the passwords and compromising the
security of the clients (Cvijetic, 2014). The techniques that are used by cybercriminals for
breaking into the security aspects of the intended users is based on spoofing attacks, loss of
devices that can lead to theft of data (Moussouri & Roussos, 2014). Different malware
techniques could be injected within the mobile devices of the user, which would lead to several
kinds of problems for the devices.
5. Ransomware – This kind of emerging that could affect the internal systems of ABCT
could be performed by the NSA. Another hacker group known as Shadow Group have also held
the responsibility for breaching the security of the computers (Kang, Oh & Im, 2014). These
hacker groups have leaked the use of Eternal Blue and different other cyber weapons have
beared the entire responsibility for the attacks based on ransomware. These ransomware have
greatly hampered the growth of networked systems.
3. Conclusion
Based on the supported discussions from the above report, it could be concluded that the
use of cyber security measures would prove to be highly helpful for protecting the end systems
of ABCT. The company is responsible for dealing with the different forms of technical materials
such as hardware and software. The discussion in this report discusses about the core

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
functionalities that are performed by ABCT. From the discussion, it has been seen that ABCT
has brought about the use of different forms of networking devices and other computer devices
that could help them in increasing the efficiency of the business. However, these kinds of devices
might be vulnerable to several forms of attacks over the systems.
The discussion focuses on the different forms of vulnerabilities that might affect the
system. These vulnerabilities have been focused greatly in order to ensure that such kind of
systems should be needed to be protected. Different forms of emerging threats have also been
discussed for the current system employed at ABCT. Hence, the discussion supported from the
above discussion helps in understanding the different forms of techniques that are used for
creating the attacks. Hence, such measures should be implied within the industry to protect and
secure the end systems.
4. Recommendation
However, with the main focus of improving the cybersecurity systems of the ABCT, it
could be discussed that there could be some form of recommendations that could be
implemented. The ABCT Company should highly invest in training based on cyber security and
thus they should also educate the employees. The company should also implement the factor of
two-factor authentication that would help in implementing access to different mode of controls.
Passwords are also considered as an important aspect to the security of the computer systems.
Hence, the ABCT Company should have a strong policy for the setting of passwords that would
help in securing the end systems. Based on the following of such kind of measures, the company
would be able to secure their technical hardware and software systems and the various other
services offered by them. Hence, with the help of such kind of systems and protection systems, it
Document Page
11USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
would also help in securing the end systems of ABCT and thus improve the security of the
customers.
Document Page
12USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and
challenges. Information sciences, 305, 357-383.
Alieyan, K., ALmomani, A., Manasrah, A., & Kadhum, M. M. (2017). A survey of botnet
detection based on DNS. Neural Computing and Applications, 28(7), 1541-1558.
Bertino, E., & Islam, N. (2017). Botnets and internet of things security. Computer, (2), 76-79.
Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2),
1153-1176.
Continella, A., Guagnelli, A., Zingaro, G., De Pasquale, G., Barenghi, A., Zanero, S., & Maggi,
F. (2016, December). ShieldFS: a self-healing, ransomware-aware filesystem.
In Proceedings of the 32nd Annual Conference on Computer Security Applications (pp.
336-347). ACM.
Cvijetic, N. (2014, September). Optical network evolution for 5G mobile applications and SDN-
based control. In 2014 16th International Telecommunications Network Strategy and
Planning Symposium (Networks) (pp. 1-5). IEEE.
Deepa, G., & Thilagam, P. S. (2016). Securing web applications from injection and logic
vulnerabilities: Approaches and challenges. Information and Software Technology, 74,
160-180.
Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety,
security and privacy. Journal of advanced research, 5(4), 491-497.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
Eslahi, M., Naseri, M. V., Hashim, H., Tahir, N. M., & Saad, E. H. M. (2014, April). BYOD:
Current state and security challenges. In 2014 IEEE Symposium on Computer
Applications and Industrial Electronics (ISCAIE) (pp. 189-192). IEEE.
French, A. M., Guo, C., & Shim, J. P. (2014). Current status, issues, and future of bring your
own device (BYOD). Communications of the Association for Information Systems, 35(1),
10.
Hamdare, S., Nagpurkar, V., & Mittal, J. (2014). Securing SMS based one time password
technique from Man in the middle attack. arXiv preprint arXiv:1405.4828.
Huang, J. Z., Kunz-Jacques, S., Jouguet, P., Weedbrook, C., Yin, Z. Q., Wang, S., ... & Han, Z.
F. (2014). Quantum hacking on quantum key distribution using homodyne
detection. Physical Review A, 89(3), 032304.
Hydara, I., Sultan, A. B. M., Zulzalil, H., & Admodisastro, N. (2015). Current state of research
on cross-site scripting (XSS)–A systematic literature review. Information and Software
Technology, 58, 170-186.
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of
Computer and System Sciences, 80(5), 973-993.
Kang, D., Oh, J., & Im, C. (2014, August). Context based smart access control on BYOD
environments. In International Workshop on Information Security Applications (pp. 165-
176). Springer, Cham.
Document Page
14USE OF CYBERSECURITY WITHIN OFFICE AND HOME SYSTEMS
Kharaz, A., Arshad, S., Mulliner, C., Robertson, W., & Kirda, E. (2016). {UNVEIL}: A Large-
Scale, Automated Approach to Detecting Ransomware. In 25th {USENIX} Security
Symposium ({USENIX} Security 16) (pp. 757-772).
Moussouri, T., & Roussos, G. (2014). Mobile sensing, BYOD and big data analytics: New
technologies for audience research in museums. Participations: journal of audience and
reception studies, 11(1), 270-285.
Rafique, S., Humayun, M., Hamid, B., Abbas, A., Akhtar, M., & Iqbal, K. (2015, June). Web
application security vulnerabilities detection approaches: A systematic mapping study.
In 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial
Intelligence, Networking and Parallel/Distributed Computing (SNPD) (pp. 1-6). IEEE.
Shahriar, H., Klintic, T., & Clincy, V. (2015). Mobile phishing attacks and mitigation
techniques. Journal of Information Security, 6(03), 206.
Wright, R. T., Jensen, M. L., Thatcher, J. B., Dinger, M., & Marett, K. (2014). Research note—
influence techniques in phishing attacks: an examination of vulnerability and
resistance. Information systems research, 25(2), 385-400.
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]