Cybersecurity in the Modern Workplace: An ABCT Analysis

Verified

Added on  2025/05/03

|12
|2983
|62
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Assessment 3: Cyber Security
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Executive Summary
Cybersecurity becomes a crucial factor for technologically based companies. Companies are
required to use appropriate aspects and techniques so that they can proclaim effective security
to their system and protect user's information. Cybersecurity and its importance play a vital
role in a business to manage their customer information confidential for a longer duration.
Various threats have been imposed on IT sector which need clear and appropriate utilization
of technology to minimize the issues and problems.
Thus, a clear aspect has been assessed related to cybersecurity like data theft, lack of data
protection, etc. ABCT case study has defined that business mainly provides work from home
which can work as a major threat of data theft. Along with this, guest and visitors can easily
access the internet in ABC Technology which also works as another potential of data theft
and security. A clear security-based system is required where the company needs to take
phones of their employees, allow them to use some standard of security by using anti-virus
software so that their systems remain protected. Try to not to share the password of a LAN
system to guest and visitors or implement some other system. All these factors have been
contributed to control data theft and enhance cybersecurity frame as well. Thus, all such
aspects have been discussed to make a valid and appropriate report so that ABCT can protect
their user's information and manage loyal towards them.
2
Document Page
Contents
Executive Summary...................................................................................................................2
Introduction................................................................................................................................4
Discussion..................................................................................................................................5
Explain what cybersecurity is and why it is important for ABCT?.......................................5
Identify and explain at least 3 security vulnerabilities in ABCT’s system............................6
Find and list 5 different types of emerging threats (that might affect ABCT) and describe
each of them in detail.............................................................................................................7
Analyze the information and give your recommendations (at least 3) how to protect home
and office from cyber attack..................................................................................................9
Conclusion................................................................................................................................11
References................................................................................................................................12
3
Document Page
Introduction
Cybersecurity is a process through which business can protect system, network and their
different programs from the digital attacks. It mainly contributes the network from attacks so
that the company can manage loyalty towards their users with the protection of their
confidential information. This report is focused on cybersecurity concept with its essence in
the context of the ABCT. It is a famous technological company which provides software and
hardware to their ultimate users. Company head office is in Canberra with multiple numbers
of locations. This report is focused on cybersecurity and other essence associated with it. It
will be covered the cybersecurity and its importance to the IT business firms. 3 security
vulnerabilities will be discussed in the context of ABC technologies with a clear evaluation of
case assessment. 5 emerging threats will be assessed so that business can prepare advance
strategies to cover them effectively. Some recommendations will be reflected so that ABCT
can use them and implement it to protect their data.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Discussion
Explain what cybersecurity is and why it is important for ABCT?
Cybersecurity refers to the process of protecting and securing the network and process of a
company from digital attacks. In this changing digital world, cybersecurity is an important
term to consider so that business can protect their important documents. Various methods and
aspects have been assessed relate to cybersecurity so that business can secure their
confidential and information (Von Solms and Van Niekerk, 2013). Many cyber-attacks are
taking place in this modern world which not only harms an organization but also influences
the company's reputation. Effective and efficient cybersecurity is helpful to minimize the
chances of cyber-attacks. ABC Technology is a famous technological provider in Australia.
They work in hardware and software both. ABC Technologies has assessed that cybersecurity
becomes a vital part of a business. Thus, to control cyber-attacks, the company wants to
understand and assess the importance of cybersecurity. Following are some important aspects
of cyber security which need to assess by a company for longer duration:
Cybersecurity is really essential for a company so that they can protect data breach
activities. Cybersecurity is helpful to control the data breach in a firm with the use of
a relevant and suitable system (Bordoni, 2018). ABC Technology has provided work
from home which enhances chances of data breach easily. Thus, the company needs
to protect all systems to reduce the chances of the data breach.
Another importance of cybersecurity is to protect data leak activities. Data leak is a
damaging aspect for an individual and for an organization. Thus, companies found
that with the use of cybersecurity they can minimize activities of a data leak. ABC
Technology is using a cloud system which mainly protects their documents. Thus, it
already reduces the chances of data leak factor. Thus, data protection is important
with the use of cybersecurity concept.
Ransomware protection is really essential and considers as a part of the cyber security
process (Bailetti and Zijdemans, 2014). Companies use this software so that they can
protect the system from malware attack and protect cloud aspects. Ransomware attack
mainly harms the cloud storage of companies and present in any form. ABC
Technology is required to install such feature and process in their systems so that they
can reduce chances of ransomware attacks.
5
Document Page
Various cybersecurity software's are developing on a regular basis so that they can easily cop
up with threats. Hence, business firms become more active and appropriate so that they can
protect their users' information with the assistance of software. These aspects are required to
facilitate in business to manage long term assurance about cybersecurity.
Identify and explain at least 3 security vulnerabilities in ABCT’s system.
Computer security becomes an essential factor for a business so that the organization can
manage and execute their task properly. Computer security becomes the most important
factor for a business so that they can encourage growth and development (Cavelty, 2014). In
a computer system, vulnerability is assessed as a weakness or problem arise due to some
threat element. Only one factor is sufficient to work as a vulnerability for business and enter
into the system to crash the system and access clients file. It is a flaw which allows attackers
to develop threat and theft easily for the system and its work.
ABC technology is a famous IT firm which facilitates hardware and software services to
users for better work and coordination. They have more than 10000 customers around the
world and previously suffer from various cyber-attacks. Thus, the company wants to assess
security vulnerabilities which depict as a major reason for such attacks. Following are the 3
some most important security vulnerabilities depict for the ABC technology so that the
company can guide employees about it:
One of a security vulnerability is work from home for employees. The company
already attached all systems with a virtual private network (Ding, et. al., 2018). This
system is mainly connected in their head office as thus, all such can work easily from
home but a single threat of data interruption can take place. It is a first and major
security vulnerability as anyone can easily access employees system and enter into
company's system with the use of a VPN network of some employee. This problem is
required to assess by the senior managers so that they can initiate some effective steps
to minimize such an issue or problem in an appropriate manner.
Another security vulnerability for a company is Bring Your Own Device (BYOD)
policy mainly work at onsite locations. Employees are free to take their own device
and easily transcript personal information of a company. It is another aspect which
increases the chances of security vulnerability. All systems of employees are not
protected and can be easily accessible for attackers. Thus, it is another major reason
6
Document Page
for security vulnerability for ABC technology which needs clear evaluation and
proper understanding by the managers of a company to control chances of cyber-
attack.
Free LAN access to visitors and guest of the companies at every location. It is another
crucial reason for security vulnerability. Hackers or attackers can easily access such
LAN to enter into the system and access the information of a company. This is a
major problem which encounters from the case assessment of ABC technology.
All these are three major security vulnerability or weakness for a company. These problems
create chances of cyber-attacks and reduce the ability of a company to facilitate its
operations. Bring your own device policy and LAN access are two major factors which can
easily proclaim weakness to the business. Any hacker can easily use these two aspects to
access information. System protection software needs huge investment and the company does
not offer it to for all employees. ABC technologies are required to work on it so that they can
reduce the chances of cyber-attacks in their company.
Find and list 5 different types of emerging threats (that might affect ABCT) and
describe each of them in detail.
Ransomware is not only a single threat for business but there are various new threats assessed
for an organization. The cyber threat landscape is getting evolve day after day and thus
business needs to prepare some relevant goals so that they can control these problems and
threats in an appropriate and effective manner. Cybersecurity is required to assess on a
serious note by the global leaders so that they can protect their client's information and
employees information.
ABC Technologies wants to understand various types of emerging threats which easily harm
their system of work. It is essential for a firm to assess each one of them so that appropriate
actions can be listed to minimize them. Following are some of the emerging threats which
need to ascertain by the ABCT so that they can prepare a relevant and suitable policy to
control them effectively:
Cryptojacking: One of a major issue which determines in the modern world refer to
crypto jacking which is similar to ransomware threat. Ransomware was the biggest
threat in the business history but the same variants are determined in crypto jacking as
well (Rayome, 2019). It is mainly used to encrypt the data of a company and consider
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
as a name of crypto mining. It mainly enters in the firm system and encrypts entire
information easily and silently without any single activity. Thus, it is a major threat
for business which mainly targets small business so that they can access big client's
information easily. Thus, it is the most common and emerging threat for business
which needs to minimize with suitable steps. This issue is essential to minimize the
use of appropriate and suitable software.
Internet of things: Another issue is derived from the internet of things. All of the
system at the workplace are mainly connected to the central system for ease of work.
Leaders of the business are still unaware that it becomes one of a threat in the future
for the business (Tweneboah-Koduah, et. al., 2017). This problem is arising due to
lack of maintenance. Companies do not manage cameras, ships, biometric properly
which develop harm and threat for a business. Thus, an emerging threat for an
organization is the internet of things which need to manage properly. This threat
arises internally and needs a little focus on senior management.
Mobile malware: With the emergence of technology, mobile phones become one of
the best and great sources of connectivity. Many companies which use mobile phone
management system mainly restrict business to grow and develop privacy concern,
the Cell phone becomes of a major device on which companies need to focus as it is a
common source of sharing file and transfer project from one place to another easily.
Hacking chips and software can also increase the chances of entering into the system
via cell phones. Thus, ABC Technology needs to work on this factor as well as it
becomes another source of threat in the near future.
AI generated phishing emails: A new and emerging mode of threat is human-
generated mails. Many people just click on the link which automatically encrypts the
entire information of a user to the third party (Gupta, et. al., 2016). AI generated
emails are similar to human mails but consider as more dangerous than others. Thus,
it is a major emerging threat which leads to the personal emails of employees. ABC
technology needs to understand this threat properly so that they can minimize this
factor with appropriate and relevant knowledge and skills.
Cloud computing attacks: Many small companies register themselves as cloud
service providers. Mainly these firms direct some clients and share their personal
information with local host servers. Such attacks not only harm an organization IT
related aspects publically but also misuse the client's information. Thus, it is a major
8
Document Page
sort of attack which determines from past few years. ABC technology has to assess
this threat as well so that they can protect their information properly.
Analyze the information and give your recommendations (at least 3) how to protect
home and office from cyber attack
Home and office cyber-attacks are getting an increase in a rapid manner. It is really essential
to assess some recommendations or suggestions so that such issues and problems lead to
minimizing properly. ABC Technologies need to assess and work on these recommendations
so that business can facilitate appropriate work and minimize emerging threats of cyber-
attacks. It can be assessed in terms of installation of software to the system, use appropriate
cloud services from reputed companies. Following are some number of suggestions or
recommendations which need to initiate by ABC Technology so that they can minimize
potential harm from such wide and major issues:
Cloud computing is also not safe for companies and easily access by hackers. Now,
Google is has become one of an only and major company which provide secure cloud
services to users. Thus, it is recommended for the ABC technology and other IT
companies to use Google and AWS companies to ascertain cloud services
(Chukwube, 2019). It not only supports ABC Technology to securely put information
at the cloud but also encourage business loyalty towards the company. Thus, it is a
major and convenient aspect to control the attacks on a cloud system.
Software development is another factor which can control attacks of virus and
emerging threats. Threats in IT are a virus which not only reduces the ability of the
system to work properly but also breach the information. Thus, one of the best ways
to minimize this aspect includes the use of antivirus software so that such attacks get
minimize effectively. It is the best method to control the chances of cyber-attacks and
develop a proper environment and protected systems. ABC Technology can use
various softwares for their company system to reduce chances of ransom ware attacks.
These software's are costly for a firm but consider under one-time investment with
installation in all workplace systems. Thus, this factor is helpful to minimize the
chances of malware attacks.
Ban cryptocurrency as it becomes one of a major source of hacking to earn and
generate money. It is really essential for the world government to make the value of
cryptocurrency equivalent to zero so that business cannot lead harm from it. ABC
9
Document Page
Technology needs to decline the use and acceptance of cryptocurrency and convince
other firms as well so that they can control the attack via crypto mining. It is another
major and essential source to control the chances of such cyber-attacks in the most
innovative manner.
ABC Technology needs to work on these recommendations or suggestions so that they can
deal with emerging threats properly. It is essential to use every single factor into a business so
that ABC technology can lead the IT sector properly.
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Conclusion
It gets concluded from the assessed report that cybersecurity becomes an important part of
regular business operations. Cybersecurity is important to protect data, maintain
confidentiality and ascertain long term clientele base. Company has assessed some
vulnerabilities refer to security include VPN sharing of data, own gadgets to operate internet
and work files with LAN accesses to guest or visitors. Some emerging threats have been
assessed in terms of access to LAN, cloud due to the modernization of world and anticipation
of new trends of hacking. The best way has assessed to install anti-virus software and update
it on time. It has supported the systems to protect from data attacks which avoid chances of
data theft. All these aspects have been discussed in the assessment so that IT companies can
implement it at the workplace.
11
Document Page
References
Bailetti, T., & Zijdemans, E. (2014). Cybersecurity startups: the importance of early
and rapid globalization. Technology Innovation Management Review, 4(11).
Bordoni, S. (2018). Importance of maintaining Cyber Security. [Online] IT Portal.
Retrieved from: https://www.itproportal.com/features/the-importance-of-maintaining-
cyber-security-in-your-business/.
Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs
and removing vulnerabilities. Science and engineering ethics, 20(3), 701-715.
Chukwube, J. (2019). 6 Emerging Cyber Threats to Lookout for in 2019. Retrieved
from: https://readwrite.com/2019/03/22/6-emerging-cyber-threats-to-lookout-for-in-
2019/.
Ding, D., Han, Q. L., Xiang, Y., Ge, X., & Zhang, X. M. (2018). A survey on security
control and attack detection for industrial cyber-physical
systems. Neurocomputing, 275, 1674-1683.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on
modern cryptographic solutions for computer and cyber security. IGI global.
Kingori, D. (2019). Top 10 Cybersecurity Risks For 2019. [Online] US Cyber
security. Retrieved from: https://www.uscybersecurity.net/risks-2019/.
Rayome, A, D. (2019). Five emerging cybersecurity threats you should take very
seriously in 2019. [Online] ZD Net. Retrieved from:
https://www.zdnet.com/article/five-emerging-cybersecurity-threats-you-should-take-
very-seriously-in-2019/.
Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cyber security threats
to IoT applications and service domains. Wireless Personal Communications, 95(1),
169-185.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38, 97-102.
12
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]