Cybersecurity Issues and Solutions for ABC Technologies

Verified

Added on  2025/05/03

|12
|2993
|393
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Assessment 3—report
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Executive summary
In this assignment, the cybersecurity issues have shown. Along with this assignment paper, the
author helps to understand the entire solutions to resolve the security issues. To understand the
entire scenario the author has proposed took an example for an Australian company whose name
is ABC technologies and answered some question in the context of ABC's current scenario. The
author helps us to understand the cybersecurity and helps to understand the importance of in the
context of such abct organization. It provides some better justifications and ways to secure the
network and devices form attackers and hacker. It helps in, to find some other security
vulnerabilities and provide some solutions deal such type of issues. Along with providing more
than five latest threats which affect to the abct and its server. It also provides solutions to deal
with entire threats which are shown in the context of abct. In the end, it has taken some
suggestions and recommendations to secure the home and office network to protect from cyber
attackers.
Document Page
Contents
Different types of emerging threats.............................................................................................................7
Document Page
Introduction
Cybercrime is global; for the entire internet user. The cybersecurity term is used in computer
science department which offers and provides some online services to protect the user
information which can be confidential and must be protected from cyber attacks to prevent from
data leak and data theft. Nowadays the internet user increases rapidly because helps in to connect
people with each other. Hence by the increasing, the number of users the probability of data theft
also increases. The security issue can occur with any individual user or with an organization also
such large multination companies, government sectors, hospital and can be banks also (Conteh,
& Schmick, 2016).
There is an Australian organization whose name is ABC technologies. It works to provide
cybersecurity through the help of some high tech devices and introducing some new hardware
and software. ABCT is a multi-region organization there. Along with it have two overseas
branches also. ABCT provides virtual private network (VPN) for their employs to get work from
home and also it has a policy of bringing your own device (BYOD) at office site to work more
efficiently. Along with it provide LAN (Local Area Network) to every visitors and employee for
high-speed internet facility. Abct used the cloud-based database to prevent form cipher attacks
because it was found several time victims in recent cipher attacks (Varkonyi, 2017).
Explain what cyber-security is and why it is important for abct?
Cybersecurity is related to human, process and new emerging technologies, when all these works
together and encompass with the full range of threat deduction and provide incident response,
recovery, resiliency to detect entire activities related to computer network operations.
Cybersecurity is the way of protection internet related and internet connected systems. The
connected system can be hardware and software. The cybersecurity term is made by the two
different words the fist is cyber and second is security. The cyber term refers to the technology
which can be network, devices, data or information and at the other end, the security refers to the
security system, information, and application security (Montgomery, & Wendt, Donnie, 2017).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
In other words, cybersecurity is a set of protocols and principles which are designed to protect
computer and computing devices and helps to protect from online threats of information and
data. Nowadays there is very heavy dependency over the over computers and networks to store
and share the data which can be confidential and highly protective related to the people.
Cybersecurity is a very crucial function hence it needs insurance for online related businesses
(Conteh, & Schmick, 2016).
Nowadays all the internet user lives in the digital era hence it needs to be understood that the
shared information is more valuable than ever before. Hence the ABCT also needs cybersecurity
to serve such important security to share information by h help of internet. ABCT is a service
provider hence the user or client data can be related to finance, personal information and can be
some intellectual property details which can be exposed without providing the security layers.
Now cyber attack becomes an international issue hacks and some other security attacks can be
very harmful to the global economy. Any organization shares its entire data with the help of the
internet from one to another device. In this process, the cybersecurity helps to protect the
information and data and system also to process or store data in its database. Hence abct needs a
good security system to protect the user or client data.
Security vulnerabilities in ABCT’s system
There is a web security pitfalls form which every client needs to be aware, even it includes how
the security issue can be deal and mitigate. Hence there are some vulnerabilities has been
explained below and to identifies open web application security project (OWASP) along with it
helps in for any organization for the improvement of the software security. Before coming over
the vulnerabilities of the security there are two terms which need to clarify:
Authentication: it helps in to verify the specific user by using their security credentials
such as user name/ email and password, fingerprint scan and etc.
Authorization: it helps in for confirming the specific user or client or it helps to identify
the specific user to perform a particular action.
The vulnerabilities of the network are mentioned below:
Document Page
Broken authentication: the broken authentication over ABCT server is a collection of the
multiple problems which occur at the same time. There are several causes of this situation:
the related URL (uniform resource locator) might be forgetting the session id a leak the
data over some other's header. The client password might not be encrypted or not in the
form of transit. Sometime session ids might not be predictable at every time. There could
be session can be hijacked by attackers by which authentication will get broke
(Montgomery, & Wendt, Donnie, 2017).
Cross-site scripting (XSS): it is a type of sensitization failure. To perform such scripting
over ABCT’s database the attacker uses a web-based JavaScript tag in the input section.
When the scripted code reaches to the unsanitized web browser then it executes it. It is
very simple crafting of cross-site scripting for persuading their sinister. By the page load
script suns automatically and cookies will be theft by the attacker (Kosseff, 2018).
Security misconfiguration: the microcinfigured web application and web servers are very
common and must be configured properly. There could be an ongoing application which
must be debug enabled production. It can happen due to some unwanted running
application on subjected machine or device. There can be some old running software such
as old PHP admin, wardress plug-in (Yeboah-Ofori, & Brimicombe, 2018).
Phishing attacks: the phishing attacks are the most common way to hack any account or to
steal data of the related user. In the phishing attack attacker will send a link or email to the
user and when the user enters these details on his email or web page the entire data will be
gathered by the hacker. The phishing pages and emails are the replicas of the original
(Varkonyi, 2017).
SQL-injections attacks: the full name of the SQL is the structured query language. It is
also a type of a programming language which is used to connect with database of the
related application. There are many service providers to store their entire data whether it is
confidential or not stores over SQL based database. The SQL injection method targets the
kind of server by writing malicious code to get the server information which normally
never happens. If the server stores the user personal data such as credit card details,
password – username and some other confidential information which are always enticing
the hacker (Arapi, Riddell, Christopher, & Xhelilaj, Klean, 2018).
Document Page
Different types of emerging threats
In previous years billions of cipher attacks have been seen by the help of malicious software and
microchips. There was a lot of data breach and Ransome attacks have been seen in the previous
year. Hence here are some list of data losing threats:
Utilize ai developed fake video and audio-
Nowadays it is very easy to make some fake audio and video and that becomes very hard to
differentiate between real and fake. There are also available some AI (Artificial Intelligence)
generated phishing pages and emails which tricks the people and gather the password and other
information of a user. By collecting such data a hacker can make such realistic video and audio
to make some standalone tactic (Montgomery, & Wendt, Donnie, 2017).
Poisoning AI (Artificial Intelligence) defenses
There is a lot of security provide company's which helps to find the cyber attacks and anticipate
them. But the hacker can deal from such sophisticated defenses. Along with the hackers targets
the specific user by the help of specific labels. There is some malicious code which helps to find
the suspected client (Arapi, Riddell, Christopher, & Xhelilaj, Klean, 2018).
Hijacking contracts:
There are some smart contracts and software programs are stored over the block-chain which can
automatically execute all digital assets which encode them. But it's too early for its development
because researcher stills find some error in it. And the attacker has to steal million of a dollar in
the form of cryptocurrency (Kosseff, 2018).
Breaking encryption using quantum computers
In this type of threat, the security engineer will predict the quantum of the computer. This works
over safety harness exestuation phenomena by the help of quantum physics. It could crack the
encrypted file which helps to protect in e-commerce and money transactions to store health
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
records. The recent research over quantum physics says that the organization which used
encryption technique to avoid quantum attacks (Arapi, Riddell, Christopher, & Xhelilaj, Klean,
2018).
Attacking from the computing cloud
There are a lot of organizations which hosts other companies’ data and their servers for the
management of its client. Hence such system is super tempting for the attacks to steal the data
from their database. There is a lot of big cloud service providers such as Google and Amazon,
they can afford a higher security layer to defeat the cyber attacks. But it doesn't mean that they
are completely immune from cipher attacks, sometimes they also face the data breach and
another issue. Hence attackers used to target only smaller firms to steal data and confidential data
(Miedema, 2018).
Recommendations to protect home and office from cyber attack
There is no guideline set the researcher to prevent cyber attacks and to make such an
organization. Hence there are some security protocols available to reduce such kind of cyber
attacks. More secure the home offices and small organization is the basic target of the attackers
because they know that the small business doesn't spend their budget over cybersecurity. In the
home offices, entire devices such as computers, mobile, and printers are connected with a single
network. It's hard to manage the personal network whichever is used in the household offices.
Hence there are basic guidelines to protect their home based form cyber attacks which help in to
protect data and confidential information as below:
Remove an unwanted application: at the very first user must be release entire unwanted
application from subjected computer and Smartphone because such devices can help to find a
path of attacks to reduce unwanted traffic over the network (Yeboah-Ofori, & Brimicombe,
2018).
Setup for auto-update: there must a setup can be arranged for automatic update of the subjected
application. Hence they help the user to live in the present updated era. Updated software helps
in to reduce data theft and the data leak from any organization or personal user data (Miedema,
2018).
Document Page
Installation of anti-virus software: the antivirus and anti-malware software must be installed by
the user to protect their devices (computer and smartphone) form malware attacks and helps in to
protect data from attackers. The antivirus software also helps in to protect the device from
phishing attacks and shows an alert to the user to protect his data. Sometimes the antivirus
software blocks the suspicious URL to protect the system of the user (Kosseff, 2018).
Using good strength password: the user can use a good quality password which may contain one
lower case and one upper case letter, numeric number, and symbol. A strong password always
helps in to reduce the attack over the user id. By using the user id and password the subjected
software or application permits the only authentic user to access the data (Montgomery, &
Wendt, Donnie, 2017).
Installation of a web service tool: by the help of web security tool user data may secure while
surfing over the web by the help of internet. It provides a firewall to filter the data while fetching
it from the internet and helps in to find the threat and attacks. Along with the user must be used
only trusted service provider for security reason because from the trusted service provider the
data can't be theft by the attacker so easily(Varkonyi, 2017).
There are other guidelines to protect data from hacker and hackers:
While sharing the data or information with one to another user, the connection channel
must be secured (Miedema, 2018).
There must be controls and protocols set by the user to the home network for more secure
connection channel and it helps to protect in cipher attacks
While online money transfer and amount pay must be done by the help fo only trusted
user.
While using the internet facility the children must be kept outside from the router because
it releases very harmful radiation (Varkonyi, 2017).
Conclusion
The cyber threats changes every time. In this assessment, current threats and trends will be
identified. Whenever it is needed the cyber theft and security examine every time. The
cybersecurity issue is not only for an individual person or a group but it is a very entire available
Document Page
internet user. Along with as well as it affects businesses at the same time. Most of the
cybersecurity issue can be deal by through increasing some awareness and practices to to reduce
the operation of the cyber threat exploit and become so successful because the cyber security
engineer rooted and exploit the current scenario or user and their social pattern to understand
how they live their social life, hence this helps in to reduce the vulnerabilities which must be
formed technical side (Yeboah-Ofori, & Brimicombe, 2018). While dealing with the
cybersecurity there must be some operations are performed which tries to remember some social
elements for threat actors. There is a lot of cybercrime are available surrounding us which may
the international issue also for some time. Hence the available multileveled legal infrastructure
and some national laws vary at every time which helps in to reduce the criminalization. Hence
such threats are depended over its geographic region and their applicability (how they can be
used ). Hence it finds some obstacles and helps to deal with such an issue with a more effective
manner. Hence the investigation can be prepared by the related to the cybercrime and its
presentation in front of the user. Hence all the people whoever is available over the internet. The
attacker performs various attacks over user data to steal them and use them illegally. There is no
age bar be a hacker or attacker a 12 year and sometimes a 67years old person has been founded
who performs attacker over the internet related application. By the increment, in technology, the
criminal doesn't need to rob any bank or organization directly. They can commit such crime by
the help of stealing their bank details and rob them online. Nowadays criminals don't need any
gun or another weapon they need a laptop to perform such crime and break the cybersecurity
breaches (Yeboah-Ofori, & Brimicombe, 2018).
Recommendations
There are many recommendations to resolve the cybersecurity issues which are mentioned
below:
Installing good antivirus software to keep secure the device or system from malicious
attacks and other virus attacks.
User must use a strong password for each and every website r applications.
Most phishing attacks are attempted by the email therefore before clicking over any link
user must check its credibility.
Don’t use unsecured WiFi networks while using credential based sites.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Arapi, K., Riddell, Christopher, & Xhelilaj, Klean. (2018). The Healthcare Industry:
Evolving Cyber Threats and Risks, ProQuest Dissertations and Theses.
Conteh, N., & Schmick, P. (2016). Cybersecurity: risks, vulnerabilities, and countermeasures
to prevent social engineering attacks. International Journal of Advanced Computer
Research, 6(23), 31-38.
Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: A narrative review of
trends, threats, and ways forward. Maturitas, 113, 48-52.
Doddi, S. (2018). Understanding industrial control systems security basics: It's critical to
implement an in-depth cybersecurity plan to help protect industrial control systems
(ICSs) against a cyber attack. Identify threats, vulnerabilities, standards, and
documents. Control Engineering, 65(4), 18,20.
Kosseff, J. (2018). Developing collaborative and cohesive cybersecurity legal
principles. 2018 10th International Conference on Cyber Conflict (CyCon), 2018,
283-298.
Miedema, T. (2018). ENGAGING CONSUMERS IN CYBER SECURITY. Journal of
Internet Law, 21(8), 3-15.
Montgomery, C., & Wendt, Donnie. (2017). New Security for a New Era: An Investigation
into Law Enforcement Cybersecurity Threats, Obstacles, and Community
Applications, ProQuest Dissertations and Theses.
Pelton, J., Singh, I., & SpringerLink. (2015). Digital Defense A Cybersecurity Primer (1st ed.
2015.. ed.).
Shindell, R. (2018). Wearable Devices: The Next Wave of Cybercrime. Journal of
AHIMA,89(3), 24-27.
Document Page
Varkonyi, I. (2017). CYBER SECURITY-Combatting the Weakest Link-Highlighting
Transportation Academy at the Fall Meeting. Defense Transportation Journal, 73(4),
8,26.
Waschke, M., & SpringerLink. (2017). Personal Cybersecurity How to Avoid and Recover
from Cybercrime.
Yeboah-Ofori, A., & Brimicombe, A. (2018). Cyber Intelligence & OSINT: Developing
Mitigation Techniques Against Cybercrime Threats on Social Media A Systematic
Review July 2017. International Journal of Cyber-Security and Digital
Forensics, 7(1), 87.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]