Cyber Security Vulnerabilities and Threats in the ABCT System

Verified

Added on  2022/12/22

|14
|3763
|23
Report
AI Summary
This report provides an in-depth analysis of the cyber security issues faced by the ABCT system, an Australian organization. It identifies key vulnerabilities, including the BYOD policy, open network access, and reliance on a virtual network. The report explores emerging threats such as spear phishing, malware, ransomware, insider threats, and mobile device vulnerabilities. It also details the potential damage caused by cyber-attacks, including reputational damage, financial losses, and disruption of operations. The report underscores the importance of implementing risk management strategies and recommends measures to mitigate the impact of attacks. The report concludes that the ABCT system should consider cyber security providers to add to the growth and profit of the organization.
Document Page
Running head: CYBER SECURITY ISSUES IN ABCT SYSTEM
CYBER SECURITY ISSUES IN ABCT SYSTEM
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
CYBER SECURITY ISSUES IN ABCT SYSTEM
Executive Summary
The aim of the report is to describe the cyber security issues that an organization faces. The
organization faces various vulnerabilities that are related to the cyber security issues. The
report describes the problems that arises in the ABCT organization that is an Australian
organization. The organization adapted several steps to ensure that the issues can be resolved
and the risks can be diminished. The organization adapted help of some of the cyber security
provider to add to the growth and profit of the organization.
Document Page
2
CYBER SECURITY ISSUES IN ABCT SYSTEM
Table of Contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................4
Importance of cyber security for ABCT....................................................................................4
Three security vulnerabilities in ABCT’S system.................................................................5
Different types of emerging threats........................................................................................6
Damage to the cyber attacks..................................................................................................7
Recommendation........................................................................................................................9
Conclusion................................................................................................................................10
References................................................................................................................................11
Document Page
3
CYBER SECURITY ISSUES IN ABCT SYSTEM
Introduction
Cyber security is defined as the technology body that includes the processes and that
practice the design for the protection of the networks, network devices, different types of
programming, damages and accessing by unauthorized means. The definition of cyber
security can be given as the security for the information technology. Cyber security is a very
important aspect of all the organization (Cherdantseva et al., 2016). The information are the
sensitive data that is the property of an individual, financial data, personal information can
get a threat from the attack of the malicious worms. There are many transmission of the
sensitive data in an organization that can be hacked by many cyber criminals. So the
organization need to employ proper set of strategies that will help the organization in doing
the certain course of activities. Managing the cyber security department in an organization
help in enhancing the existing condition of the organization.
Cyber security focuses on providing data security to as well as the security of the
money transaction that is there in the organization. Providing cyber security to the
organization help in the development of the infrastructure of the organization (Buczak &
Guven, 2015). Due to the increase in the use of the interconnected devices through internet,
computing in cloud, web services, big data analysis have increased the probability of the
cyber-attack within an organization. Cyber security is an important factor in the age of
digitalization where every organization uses digitalized processes for conducting their
business (Abawajy, 2014). In these report ABCT is an organization that seek service related
to the cyber security issues from the organization that provide this type of service of security
consultancy.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
CYBER SECURITY ISSUES IN ABCT SYSTEM
Discussion
Importance of cyber security for ABCT
ABCT is an Australia based company that uses different type of high-tech product
that incorporates both hardware and the software parts. There are many branches of the
organization in the whole nation and it has two overseas branches. The networks of the
organization that are private and are provided through virtual network that are maintained in
Canberra. ABCT also provide an opportunity to their employees to work by staying at their
homes (Cavelty, 2014). They ask their employees to bring their own device for whom
working onsite. They store the information of their product in cloud. In the recent years the
organization have faced several attacks for different types of malware that seize their
activities. There is a probability that the attackers have got a path to enter the internal data
processing of the organization and hence they can think of a re-attack. The hackers might
have got the information of the customers that are there previously and can result in data theft
(Knowles et al., 2015). There is a need that the company improves the existing infrastructure
of the cyber security issues in the organization.
The organization have many devices that support then internet of things that can
increase the risk, thereat and the vulnerabilities of cyber theft within the organization. There
are several malwares. The malwares enter the organization by entering a particular system
and spreading through all the systems of the organization. Malware attacks are of different
types which can be in the hardware and the software parts (Fielder et al., 2016). The
malwares have the capability to steal the electronic data of the organization. The organization
takes the required steps that can ensure that the stealing of the organizational data is stopped.
Malware is an infectious worms that can spread through email attachments, advertisement,
and various malicious website and can enter internal system of the organization. There are
Document Page
5
CYBER SECURITY ISSUES IN ABCT SYSTEM
different types of cyber-attacks which can be from various means. The Denial of service
attack stops the user from accessing the data and they demand a ransom for giving back the
access of the data. There is man in the middle attack that can also affect the organization
(Abomhara, 2015). There are several many attacks that the organization is prone to that
include phishing attack, data driven attack, attack by hacking the password and many more.
The organization faces several attacks that can severely damage the data and can cause the
loss of revenue. Cyber attackers target a same organization several times because they
already know the structure of the security platform of that organization. That become easy for
them to attack that organization because the structure and the functioning of the organization
is known to them (Liu et al., 2015). That is the reason behind that ABCT is facing a severe
threat from the attacks because the attackers have already targeted the organization once.
Three security vulnerabilities in ABCT’S system
There are some vulnerabilities to the cyber-attacks for the ABCT organization that
can affect the functioning of the organization. The threats that the organization suffers from
the malware or the infectious worms can also affect the workability of the organization. The
three main vulnerabilities that is faced by the organization is as follows:-
1. The organization allow the system of BYOD (Bring Your Own Device) that will
make the organization more prone to the attack. Bring your own device cannot
provide security to the individual system. The different types of services that are
available to stop the attack in organization cannot be possible in the system of the
individual (French, Guo & Shim, 2014). The organization faces the issues if the
employees are nor well trained about accessing the illicit content in the website.
These can increase the threat of an attack in an organization.
2. The large area access of the organization is open to the visitors, guests and the
clients of the organization which make it more prone to the attacks. The attackers
Document Page
6
CYBER SECURITY ISSUES IN ABCT SYSTEM
can enter the organization system through the wireless connection of the
organization (Garba et al., 2015). This increases the vulnerability of the attacks
that are taking place within the organization by means of the network
connectivity. By providing a free are several vulnerability and threats that the
organization faces by providing free network access to the unknown visitors. The
organization have 10000 customers who visit the organization and it is not
possible for the organization to keep a look on every network access. These will
make the hacking simpler.
3. The computer systems get the network access from Canberra that is a virtual
network which can be responsible for increasing threat (Olalere et al., 2015). By
taking the network access from a different source will also increase the tendency
of the organization to get hacked.
Different types of emerging threats
1. Attacks from the spear phishing and malware:- There is a wide range o digitalized
technologies that are used in an organization. These include the interference of the
malicious content in the system of the organization (Chaudhry, Chaudhry &
Rittenhouse, 2016). Spear phishing means that if one of the hacker get the access to
the network then the other hacker can easily access to the organization and the chain
will continue and thus it can be a great threat. In such cases discontinuing the chain is
hard.
2. Use of internet of things:-The connectivity that is offered by the internet of things is
not private that increases the mal activities. The business install the smart devices that
provide advantages but also increases the threat (Patton et al., 2014). The security
protocols of such devices can be a great opportunity to the attacker and a threat to the
organization.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
CYBER SECURITY ISSUES IN ABCT SYSTEM
3. Ransomware: - These type of attacks take place within the organization through
malicious worm that are incorporated in the system of the organization that have the
capability to spread through the whole system. The attackers keep the data that belong
to the organization hostage and use them to demand for an amount of ransom from the
owner of the organization (Scaife et al., 2016). They sometime also deny to give back
the data access after providing the amount of money they are demanding.
4. Threat from the insiders: - The Company prevent the attacks in the company from
several external sources. They undertake several processes to ensure that their data are
not hacked. They get a protection from various sources that are arising from the
malware attacks. But if there is an attack from the internal environment of the
organization that will be unpredictable (Sittig & Singh, 2016). The employee who
have the knowledge about the data of the organization have the potential to create
harm to the system of the organization. So the organization faces threat from both the
external and internal environment.
5. Threat from Mobiles: - The threat that comes from using the private system or
mobiles within the organization increases the rate of this type of attacks. The
employees can conduct several illegal activities with their personal equipment that
can cause harm to the organization (Park et al., 2019). There are several disadvantages
when the employees can use their social account and an employee with a criminal
mind can use these s a way to affect the system of the organization.
Damage to the cyber attacks
The cyber-attack have the potential to affect the business. These is a very critical issue
is the reputation of the business come to stake. The organization can also suffer a loss of
customer or loss of fan base can loss take place (Yampolskiy et al., 2015). The business will
suffer a huge loss due to theft of the corporate data, financial information loss, money loss,
Document Page
8
CYBER SECURITY ISSUES IN ABCT SYSTEM
trading disruption and many more that can bring the organization in a devastating stage. The
organization do not loss only revenue and money but also it suffer from the loss of clients and
customers. The scar on the reputation of the organization can result in impact on the supplier
to the organization. The relationship of the organization with the investors, shareholders and
the third parties can also affect the organization (Watkins, 2014). The organization need to
take proper steps to reduce the effect of the attacks or to face the consequences of the attacks.
Proper measures need to be taken by the organization to avoid the chances of a repeat attack.
The managers of the organization need to take the accountability of cleaning the
affected system that will ensure that the worm do not able to attack by the same entry means
that is an easy target. The organization need to implement decision that can bring back the
original functioning of the organization within a short time span. The organization need to
report the malicious activity that is faced by the organization to some relevant security offices
so that the tendency of the future attack can be reduced (Xiang, Wang & Liu, 2017). It is very
important for the organization to ensure the risk management strategies within the
organization. The malicious worms or any kind of cyber-attacks have the capability to ruin
down a business.
After the attack or a series of attack the organization fails to recover the losses and get
dissolve. Thus the vectors of the attack need to be identified for ensuring that the attack
stopped. In the ABCT organization there is a use of many sources that increases the chances
of a cyber-attack within the organization. The organization allow several activities that affect
the data security of the organization. ABCT have face many issues about the protocols that
are existing (Bendovschi, 2015). The use of VPN, BYOD make it more prone to the theft of
data and money. The higher authority that includes the top executives and the managers of
the organization. Cyber-attack can ruin the organization and the tendency for such type of is
repetitive.
Document Page
9
CYBER SECURITY ISSUES IN ABCT SYSTEM
Recommendation
There can be several measures that the organization can undertake to prevent the
attack. The organization have to undertake several strategies that will help the organization to
improve the existing condition of the cyber safety of the organization. These type of actions
regarding the cyber security includes:-
Managing the risk that re related to the cyber security. The managing the risk and the
vulnerabilities that are engaged with the activities that are going inside the organization. Risk
management is an very important factor that ensure that the cyber-attack can be stopped. The
employees of the organization need to get a proper training that will ensure that they do not
access any illicit website that will increase the tendency of the attack. To protect the
repetition of the attack within the organization they need to report the attack to any reporting
center. That will ensure that the attack will not take place in the future from the same source.
Employee training is very important so that the employees need to be aware of the malicious
activities so that they can report to the higher authority whenever they face such issues or
they detect malicious activities within the organization. The organization also need to consult
some organization for ensuring the security. They will provide a platform to the victim
organization to ensure that they have a strong base of security. These cyber issues consultant
help the organization to create a strong system that will provide security to the electronic data
of the system. These will enable the organization to carry out with its work without et
affected by the cyber issues. They provide a proper pan to the organization to develop a
infrastructure that will ensure the privacy of the data. These will also protect the losses that
are incurred due to the attacks. The organization will able to enhance their performance if
they do not face the threat of cyber-attack.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
CYBER SECURITY ISSUES IN ABCT SYSTEM
Conclusion
From the above report it can be concluded that a organization faces several issues that
are related to the cyber security of the organization. The organization faces problems for the
threat, risk and vulnerabilities that are associated with the cyber-attacks. The different
functioning of the organization provides a huge scope to the cyber attackers to attack the
internal system of the organization and demand for the money. The organization faces
vulnerability to many attacks that can reduce the performance of the organization. The
organization incurred several processes in the functioning of the business process that will
ensure that the attack cannot affect the organization. Implementing cloud computing will also
help the organization to ensure the data backup within their systems. The threats that are
established due to different internal and external factors can affect the organization. The
organization undertake certain measures to ensure that the functioning and business operation
is not affected. Thus cyber security is a very important aspect for the infrastructure of the
organization.
Document Page
11
CYBER SECURITY ISSUES IN ABCT SYSTEM
References
Abawajy, J. (2014). User preference of cyber security awareness delivery
methods. Behaviour & Information Technology, 33(3), 237-248.
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
Bendovschi, A. (2015). Cyber-attacks–trends, patterns and security
countermeasures. Procedia Economics and Finance, 28, 24-31.
Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications Surveys &
Tutorials, 18(2), 1153-1176.
Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities. Science and engineering ethics, 20(3), 701-715.
Chaudhry, J. A., Chaudhry, S. A., & Rittenhouse, R. G. (2016). Phishing attacks and
defenses. International Journal of Security and Its Applications, 10(1), 247-256.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K.
(2016). A review of cyber security risk assessment methods for SCADA
systems. Computers & security, 56, 1-27.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., & Smeraldi, F. (2016). Decision support
approaches for cyber security investment. Decision Support Systems, 86, 13-23.
French, A. M., Guo, C., & Shim, J. P. (2014). Current status, issues, and future of bring your
own device (BYOD). Communications of the Association for Information
Systems, 35(1), 10.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]