Comprehensive Cyber Security Assessment and Recommendations for ABCT
VerifiedAdded on 2022/11/18
|15
|3371
|3
Report
AI Summary
This report provides a comprehensive analysis of cyber security within the ABCT organization. It begins with an executive summary outlining the core aspects of cyber security, including network, application, data, and cloud security. The report emphasizes the importance of cyber security for ABCT, which offers high-tech products and operates globally. It details detected vulnerabilities such as ransomware attacks, eavesdropping, and spoofing, explaining their potential impact on the organization. Furthermore, the report identifies emerging threats like serverless vulnerabilities, IoT threats, and cryptojacking, which can compromise the organization's security posture. The report offers recommendations for implementing effective cyber security policies to enhance system performance and protect sensitive data. It highlights the benefits of cyber security, including reduced risks, improved productivity, and better data protection. The analysis covers the organization's current security practices, potential weaknesses, and the need for continuous improvement in cyber security measures to safeguard against evolving threats. The report concludes with a discussion of the importance of training employees on cyber security best practices and awareness of potential threats.

Running head: ASSESSMENT ON CYBER SECURITY
ASSESSMENT ON CYBER SECURITY
Name of the Student
Name of the University
Author Note
ASSESSMENT ON CYBER SECURITY
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
ASSESSMENT ON CYBER SECURITY
Executive summary
The main focus of cyber security is to provide better security towards the network, provides
better application security, and enhances data and cloud security. The cyber security also
includes the elements of database and infrastructure security for managing the performance of
the organization. The report will focus on describing the main concepts related to cyber security
and the importance of cyber security within the ABCT organization. The report will also focus
on describing the security vulnerabilities within the system of ABCT. The report has also
provided better way of implementing cyber security policies within the organization for the
purpose of enhancing the performance of the system. Lastly the will focus on explaining the five
emerging threats that have the ability to impact overall performance of an organization.
ASSESSMENT ON CYBER SECURITY
Executive summary
The main focus of cyber security is to provide better security towards the network, provides
better application security, and enhances data and cloud security. The cyber security also
includes the elements of database and infrastructure security for managing the performance of
the organization. The report will focus on describing the main concepts related to cyber security
and the importance of cyber security within the ABCT organization. The report will also focus
on describing the security vulnerabilities within the system of ABCT. The report has also
provided better way of implementing cyber security policies within the organization for the
purpose of enhancing the performance of the system. Lastly the will focus on explaining the five
emerging threats that have the ability to impact overall performance of an organization.

2
ASSESSMENT ON CYBER SECURITY
Table of Contents
Introduction......................................................................................................................................3
About cyber security and importance in ABCT organization.........................................................4
Detected cyber security vulnerabilities within the ABCT organization..........................................5
Recommendation.............................................................................................................................9
Conclusion.....................................................................................................................................10
Bibliography..................................................................................................................................12
ASSESSMENT ON CYBER SECURITY
Table of Contents
Introduction......................................................................................................................................3
About cyber security and importance in ABCT organization.........................................................4
Detected cyber security vulnerabilities within the ABCT organization..........................................5
Recommendation.............................................................................................................................9
Conclusion.....................................................................................................................................10
Bibliography..................................................................................................................................12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
ASSESSMENT ON CYBER SECURITY
Introduction
Cyber security is mainly referred to the activity that helps in protecting the computer
systems of an organization from external theft and damages. This ensures that proper policies are
implemented within the organization for the purpose of enhancing the performance of the
system. It becomes essential to protect the system from these types of thefts as these possess the
ability to impact the overall performance of the organization. Thus analysis and implementation
of proper cyber security rules becomes essentials.
The main aim of the report is to describe the cyber security components associated with
ABCT organization. ABCT organization aims at providing different high tech products that
includes both hardware and software data. The organization has multiple bases throughout the
world. The organization mainly focuses on performing the activities based on the virtual private
network that is being maintained by the head office of Canberra. The organization allows the
employees with all facilities including bring your own device policy for enhancing the
performance of each employee (Salah, Hammoud & Zeadally, 2015). At present the organization
focuses on having 10,000 customers and the product related data are stored within the cloud. The
report will analyze the cyber security concepts in detail and will helps in relating with the ABCT
organization. The ABCT organization has faced several challenges while performing the
business activities. Thus it becomes essential to understand the concept of cyber security so that
proper measures can be implemented within the organization for the purpose of enhancing the
activities. This will also ensure that proper protection is maintained towards the organizational
data.
ASSESSMENT ON CYBER SECURITY
Introduction
Cyber security is mainly referred to the activity that helps in protecting the computer
systems of an organization from external theft and damages. This ensures that proper policies are
implemented within the organization for the purpose of enhancing the performance of the
system. It becomes essential to protect the system from these types of thefts as these possess the
ability to impact the overall performance of the organization. Thus analysis and implementation
of proper cyber security rules becomes essentials.
The main aim of the report is to describe the cyber security components associated with
ABCT organization. ABCT organization aims at providing different high tech products that
includes both hardware and software data. The organization has multiple bases throughout the
world. The organization mainly focuses on performing the activities based on the virtual private
network that is being maintained by the head office of Canberra. The organization allows the
employees with all facilities including bring your own device policy for enhancing the
performance of each employee (Salah, Hammoud & Zeadally, 2015). At present the organization
focuses on having 10,000 customers and the product related data are stored within the cloud. The
report will analyze the cyber security concepts in detail and will helps in relating with the ABCT
organization. The ABCT organization has faced several challenges while performing the
business activities. Thus it becomes essential to understand the concept of cyber security so that
proper measures can be implemented within the organization for the purpose of enhancing the
activities. This will also ensure that proper protection is maintained towards the organizational
data.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
ASSESSMENT ON CYBER SECURITY
About cyber security and importance in ABCT organization
The importance of cyber security has increased with the increasing demand of people.
Thus it becomes essential to implement proper technology within the organization so that it can
provide better way to protect the functionality. With time it has been observed that the number of
cyber threats has increased towards the organization hugely. Thus it becomes essential to
implement proper measures that will provide proper protection towards the organization and will
ensure a better performance throughout the functioning of the organization. The different types
of cyber attacks that have grown rapidly include denial of service attacks, phishing, malware
attack and ransomware attacks and many more. Hence with the increase in attacks the need of
implementing proper measures for protecting the organization also increases. Cyber security
concept offers different techniques for the purpose of protecting the organization from further
threats and impacts (Kogiso & Fujita, 2015). The main reason behind implementing proper
technology is to enhance the performance effectively so that they can overcome the damages and
losses that are faced by the organization while managing the activity. The methodologies need to
be implemented effective, within the organization so that it can ensure better performance of the
system.
ABCT organization is having high tech product for the purpose of better productivity and
security towards the performance of the system. The organization provides the employees with
several facilities to carry their system wherever they want to use. This leads to increase in
chances of threats towards the organization. Thus there is a high need to have an effective
structure of managing cyber security so that they can provide better benefits towards the
organization. There are several benefits that come along with proper implementation of cyber
security within the business. This helps in minimizing the errors and ensures a better flexibility
ASSESSMENT ON CYBER SECURITY
About cyber security and importance in ABCT organization
The importance of cyber security has increased with the increasing demand of people.
Thus it becomes essential to implement proper technology within the organization so that it can
provide better way to protect the functionality. With time it has been observed that the number of
cyber threats has increased towards the organization hugely. Thus it becomes essential to
implement proper measures that will provide proper protection towards the organization and will
ensure a better performance throughout the functioning of the organization. The different types
of cyber attacks that have grown rapidly include denial of service attacks, phishing, malware
attack and ransomware attacks and many more. Hence with the increase in attacks the need of
implementing proper measures for protecting the organization also increases. Cyber security
concept offers different techniques for the purpose of protecting the organization from further
threats and impacts (Kogiso & Fujita, 2015). The main reason behind implementing proper
technology is to enhance the performance effectively so that they can overcome the damages and
losses that are faced by the organization while managing the activity. The methodologies need to
be implemented effective, within the organization so that it can ensure better performance of the
system.
ABCT organization is having high tech product for the purpose of better productivity and
security towards the performance of the system. The organization provides the employees with
several facilities to carry their system wherever they want to use. This leads to increase in
chances of threats towards the organization. Thus there is a high need to have an effective
structure of managing cyber security so that they can provide better benefits towards the
organization. There are several benefits that come along with proper implementation of cyber
security within the business. This helps in minimizing the errors and ensures a better flexibility

5
ASSESSMENT ON CYBER SECURITY
towards the organization. After assessing the cyber security components it becomes essential to
train each employee about the benefit that comes along with the cyber security. The major
benefit that is offered with the concept of cyber security is that it helps in reducing the risks. This
also helps the organization in managing the organization’s funding and also ensures better
backup towards the organization (Kharraz et al., 2015). Apart from this one more benefit that is
observed with the help of proper cyber security awareness is that it helps in providing better
safety and also saves the time saved. The main reason behind implementing proper cyber
security measure is that it helps in storing critical information effectively without any serious
damages. The benefits that will come along with the implementation of proper cyber security are
as follows:
It is expected with an effective cyber security technique the productivity of the
organization will be increased and the production can be expected to grow rapidly.
Proper cyber security technique will help in providing better protection towards the
business. This is the main advantage that can be obtained by the organization.
Protects the personal information within the organization and helps in managing personal
information.
Cyber security helps in performing the tasks effectively within the organization and also
ensures that the tasks are being completed within time.
This ensures proper support towards the IT expert and ensures better performance
throughout the organization.
ASSESSMENT ON CYBER SECURITY
towards the organization. After assessing the cyber security components it becomes essential to
train each employee about the benefit that comes along with the cyber security. The major
benefit that is offered with the concept of cyber security is that it helps in reducing the risks. This
also helps the organization in managing the organization’s funding and also ensures better
backup towards the organization (Kharraz et al., 2015). Apart from this one more benefit that is
observed with the help of proper cyber security awareness is that it helps in providing better
safety and also saves the time saved. The main reason behind implementing proper cyber
security measure is that it helps in storing critical information effectively without any serious
damages. The benefits that will come along with the implementation of proper cyber security are
as follows:
It is expected with an effective cyber security technique the productivity of the
organization will be increased and the production can be expected to grow rapidly.
Proper cyber security technique will help in providing better protection towards the
business. This is the main advantage that can be obtained by the organization.
Protects the personal information within the organization and helps in managing personal
information.
Cyber security helps in performing the tasks effectively within the organization and also
ensures that the tasks are being completed within time.
This ensures proper support towards the IT expert and ensures better performance
throughout the organization.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
ASSESSMENT ON CYBER SECURITY
Detected cyber security vulnerabilities within the ABCT organization
Cyber security is referred to the concept of enhancing the security within the
organization. This offers several ways to protect the performance of an organization. The main
reason behind having a proper cyber security implementation within the organization is that it
ensures better safety towards the data stored within the organization. The cyber security concept
is one of the important factors that helps in managing the security concern related to the
organization. This is one of the most important concepts that are needed to be understood
effectively so that they can perform functions with fewer errors (Humayed et al.,2017). Cyber
security protects the organization from cyber crimes constantly and ensures that the system has
the potential to complete the task effectively. Cyber security has implemented better techniques
for the purpose of enhancing the business solutions. ABCT organization is one of the main
organizations and operates at different branches. Hence the chances of issues also increase. The
major vulnerabilities that are identified within the organization are described below:
Ransomware attack: this attack is mainly referred to the type of attack that is being
performed for the purpose of impacting the activity of the organization. The data are being
accessed by the attackers through loop holes. The attacker further threatens the victim and
demands for huge amount of ransom. Ransomware malware prevents the users from getting the
access over system and blocks the user from accessing important data.
Eavesdropping: Eavesdropping is referred to the way in which the attacker secretly
overhears the private conversation made between two users. These are the conversations that are
mainly made between the network and the host. The organization ABCT mainly performs it all
activity with the help of LAN connection. Thus there is a high chance that the system may get
impacted by some unauthorized person. The attackers even use the machine for the purpose of
ASSESSMENT ON CYBER SECURITY
Detected cyber security vulnerabilities within the ABCT organization
Cyber security is referred to the concept of enhancing the security within the
organization. This offers several ways to protect the performance of an organization. The main
reason behind having a proper cyber security implementation within the organization is that it
ensures better safety towards the data stored within the organization. The cyber security concept
is one of the important factors that helps in managing the security concern related to the
organization. This is one of the most important concepts that are needed to be understood
effectively so that they can perform functions with fewer errors (Humayed et al.,2017). Cyber
security protects the organization from cyber crimes constantly and ensures that the system has
the potential to complete the task effectively. Cyber security has implemented better techniques
for the purpose of enhancing the business solutions. ABCT organization is one of the main
organizations and operates at different branches. Hence the chances of issues also increase. The
major vulnerabilities that are identified within the organization are described below:
Ransomware attack: this attack is mainly referred to the type of attack that is being
performed for the purpose of impacting the activity of the organization. The data are being
accessed by the attackers through loop holes. The attacker further threatens the victim and
demands for huge amount of ransom. Ransomware malware prevents the users from getting the
access over system and blocks the user from accessing important data.
Eavesdropping: Eavesdropping is referred to the way in which the attacker secretly
overhears the private conversation made between two users. These are the conversations that are
mainly made between the network and the host. The organization ABCT mainly performs it all
activity with the help of LAN connection. Thus there is a high chance that the system may get
impacted by some unauthorized person. The attackers even use the machine for the purpose of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
ASSESSMENT ON CYBER SECURITY
operating the closed system (Eskandari et al.,2018). The closed system is also tracked sometimes
by the attacker for the purpose of obtaining confidential data. They monitor all the conversation
and processes taking place within the system with the help of faint electromagnetic transmissions
that are basically generated with the help of hardware components. TEMPEST is used for the
purpose of specifying these kinds of attacks by NSA referring.
Spoofing: The spoofing act is basically referred to the activity that is being performed by
the user for the purpose of falsification of user data. This allows the unauthorized person to get
the access and blocks the alternative users from getting access. Spoofing activity can be done by
different ways. The email spoofing is being performed by the attackers for purpose of gaining the
access over mails of an organization. Email of an organization tends to store confidential data
that needs benefits the attackers. IP address spoofing is another method of spoofing that is used
for the purpose of attacking someone computer system by hiding the original identity. The
attacker tends to alter the source IP address and attacks the victim’s system (Di Sarno et
al.,2016). With the growing technology it has been observed that the biometric has become one
of the major components of every organization and hence it becomes essential to ensure that
proper protection is maintained. Sometimes it is observed that the attacker tends to get into
within the organization and tries to access confidential data by using someone else’s biometric
sample. This is one of the activities that are likely to impact the performance of the ABCT
organization.
Emerging threats associated with cyber security
There have been huge technological improvements in the field of information technology
with the advent of internet technologies. However, with the development of technology and
ASSESSMENT ON CYBER SECURITY
operating the closed system (Eskandari et al.,2018). The closed system is also tracked sometimes
by the attacker for the purpose of obtaining confidential data. They monitor all the conversation
and processes taking place within the system with the help of faint electromagnetic transmissions
that are basically generated with the help of hardware components. TEMPEST is used for the
purpose of specifying these kinds of attacks by NSA referring.
Spoofing: The spoofing act is basically referred to the activity that is being performed by
the user for the purpose of falsification of user data. This allows the unauthorized person to get
the access and blocks the alternative users from getting access. Spoofing activity can be done by
different ways. The email spoofing is being performed by the attackers for purpose of gaining the
access over mails of an organization. Email of an organization tends to store confidential data
that needs benefits the attackers. IP address spoofing is another method of spoofing that is used
for the purpose of attacking someone computer system by hiding the original identity. The
attacker tends to alter the source IP address and attacks the victim’s system (Di Sarno et
al.,2016). With the growing technology it has been observed that the biometric has become one
of the major components of every organization and hence it becomes essential to ensure that
proper protection is maintained. Sometimes it is observed that the attacker tends to get into
within the organization and tries to access confidential data by using someone else’s biometric
sample. This is one of the activities that are likely to impact the performance of the ABCT
organization.
Emerging threats associated with cyber security
There have been huge technological improvements in the field of information technology
with the advent of internet technologies. However, with the development of technology and

8
ASSESSMENT ON CYBER SECURITY
improvement in internet technologies, the chances of security breaches have increased to a great
extent. The activeness of the attackers has increased on the internet and this has been a concern
for the organizations across the whole world (Buczak & Guven, 2015). The threats related to
cyber security are very innovative and they can potentially manipulate the data of the
organization. The data for the organization can be stolen and this can be helpful for the breaching
the data store of the organization. Hence it is essential that the organization that they develop
some cybersecurity vulnerability methods within their organization so that their data is not
breached repetitively. The major threats that are come up lately for the organizations are a
blockchain revolution, IOT threats, AI expansion, and serverless vulnerability.
Serverless Vulnerability: The invitations of a number of attacks are performed by the
serverless application vulnerabilities. The customer information is mainly affected by the
threat and as the user having access to the customer information can cause a great number
of problems for them (Van Schaik et al.,2017). As soon as the data is uploaded on the
cloud the attacker creates an attack and procures all the data which are related to the
customers. This can hamper the overall security constraints for the organization.
IOT threats: With the improvement in the technology the threats with the IOT devices
have been ever increasing and the threats posses the capability to damage the whole of a
system. The main problem with the IOT is that data sharing takes place in between a
large number of users and this does not happen in a controlled manner (Ben-Asher &
Gonzalez, 2015). There is a 70 percent chance that system efficiency is being affected by
the breach of the security factors of an organization due to IOT issues.
Cryptojacking: Cryptocacking is one of the ways in which hackers do Cryptocurrency
mining using the power/strength of your computer. In this manner, hackers earn a
ASSESSMENT ON CYBER SECURITY
improvement in internet technologies, the chances of security breaches have increased to a great
extent. The activeness of the attackers has increased on the internet and this has been a concern
for the organizations across the whole world (Buczak & Guven, 2015). The threats related to
cyber security are very innovative and they can potentially manipulate the data of the
organization. The data for the organization can be stolen and this can be helpful for the breaching
the data store of the organization. Hence it is essential that the organization that they develop
some cybersecurity vulnerability methods within their organization so that their data is not
breached repetitively. The major threats that are come up lately for the organizations are a
blockchain revolution, IOT threats, AI expansion, and serverless vulnerability.
Serverless Vulnerability: The invitations of a number of attacks are performed by the
serverless application vulnerabilities. The customer information is mainly affected by the
threat and as the user having access to the customer information can cause a great number
of problems for them (Van Schaik et al.,2017). As soon as the data is uploaded on the
cloud the attacker creates an attack and procures all the data which are related to the
customers. This can hamper the overall security constraints for the organization.
IOT threats: With the improvement in the technology the threats with the IOT devices
have been ever increasing and the threats posses the capability to damage the whole of a
system. The main problem with the IOT is that data sharing takes place in between a
large number of users and this does not happen in a controlled manner (Ben-Asher &
Gonzalez, 2015). There is a 70 percent chance that system efficiency is being affected by
the breach of the security factors of an organization due to IOT issues.
Cryptojacking: Cryptocacking is one of the ways in which hackers do Cryptocurrency
mining using the power/strength of your computer. In this manner, hackers earn a
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
ASSESSMENT ON CYBER SECURITY
Cryptocurrency easily by using JavaScript in the background, so it is called
Cryptocurrency. In this process, hackers do not have to do any kind of attack on your
computer or smart phone. CryptoJacking works via javascript. Whenever you are on an
unsecured, malicious website, using the JavaScript in the background, the hacker does
Cryptocurrency mining, using the power of your computer, smartphone, which is hidden.
Cryptocurrency does not mine bit coins, rather molecules like Cryptocurrency are mined.
Bringing own device at work: it is observed that several organization offers the facility of
using personal devices at work place. This increases the chances of threat and also affects
the performance of the organization (Ali & Awad, 2018). Hence these types of issues
become critical for the organization and possess the ability to hamper the overall
performance.
Malware attacks: it is observed that several malware are being designed in a way that it
can impact the performance of the system. These malware are infected within the mobile
phones and are further transmitted. These possess the ability to steal all the confidential
data stored within the devices. Thus serious damages can be caused towards the users.
Recommendation
The main aim behind developing a proper cyber security structure within the organization
is that it offers a better way of managing the activities. With proper management of activities
within the organization it becomes easy to handle the security. Thus the following
recommendation will help in increasing the effectiveness maintained within the organization and
will also ensure a better way of managing the cyber threats. The measures for enhancing cyber
security are as follows:
ASSESSMENT ON CYBER SECURITY
Cryptocurrency easily by using JavaScript in the background, so it is called
Cryptocurrency. In this process, hackers do not have to do any kind of attack on your
computer or smart phone. CryptoJacking works via javascript. Whenever you are on an
unsecured, malicious website, using the JavaScript in the background, the hacker does
Cryptocurrency mining, using the power of your computer, smartphone, which is hidden.
Cryptocurrency does not mine bit coins, rather molecules like Cryptocurrency are mined.
Bringing own device at work: it is observed that several organization offers the facility of
using personal devices at work place. This increases the chances of threat and also affects
the performance of the organization (Ali & Awad, 2018). Hence these types of issues
become critical for the organization and possess the ability to hamper the overall
performance.
Malware attacks: it is observed that several malware are being designed in a way that it
can impact the performance of the system. These malware are infected within the mobile
phones and are further transmitted. These possess the ability to steal all the confidential
data stored within the devices. Thus serious damages can be caused towards the users.
Recommendation
The main aim behind developing a proper cyber security structure within the organization
is that it offers a better way of managing the activities. With proper management of activities
within the organization it becomes easy to handle the security. Thus the following
recommendation will help in increasing the effectiveness maintained within the organization and
will also ensure a better way of managing the cyber threats. The measures for enhancing cyber
security are as follows:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
ASSESSMENT ON CYBER SECURITY
Providing limited data access towards the users. This will help in restricting the users and
will ensure that the data accessed by employees are monitored by supervisors. This will
ensure that the organization is able to detect in case any theft occurs at early stage.
Identifying the sensitive data and protecting them from further impacts. The sensitive
data needs to be addressed effectively so that no one can hamper them.
The organization needs to implement proper pre planned data security policies that will
safe guard the organization from further impacts.
The employee needs to implement strong passwords for the purpose of protecting the
data stored within the organization.
Data needs to be backed up effectively so that the organization can maintain proper
control over the essential data. This will also ensure proper protection towards the data.
The organization should implement two factor authentications for the purpose of
enhancing the organizational activities.
This becomes essential to provide better privileges towards the users.
Awareness among the employees needs to be done effectively so that they can perform
efficiently.
Conclusion
The above report has successfully described the important concept related to cyber
security. The main reason behind having a proper cyber security concept is that it helps in
managing the activities within the organization. This also ensures that proper security is provided
towards the data stored within the organization. Earlier the organization faced several threats due
to lack of proper cyber security within the organization. Thus it becomes essential to implement
proper measures within the organization so that the performance can be enhanced effectively. In
ASSESSMENT ON CYBER SECURITY
Providing limited data access towards the users. This will help in restricting the users and
will ensure that the data accessed by employees are monitored by supervisors. This will
ensure that the organization is able to detect in case any theft occurs at early stage.
Identifying the sensitive data and protecting them from further impacts. The sensitive
data needs to be addressed effectively so that no one can hamper them.
The organization needs to implement proper pre planned data security policies that will
safe guard the organization from further impacts.
The employee needs to implement strong passwords for the purpose of protecting the
data stored within the organization.
Data needs to be backed up effectively so that the organization can maintain proper
control over the essential data. This will also ensure proper protection towards the data.
The organization should implement two factor authentications for the purpose of
enhancing the organizational activities.
This becomes essential to provide better privileges towards the users.
Awareness among the employees needs to be done effectively so that they can perform
efficiently.
Conclusion
The above report has successfully described the important concept related to cyber
security. The main reason behind having a proper cyber security concept is that it helps in
managing the activities within the organization. This also ensures that proper security is provided
towards the data stored within the organization. Earlier the organization faced several threats due
to lack of proper cyber security within the organization. Thus it becomes essential to implement
proper measures within the organization so that the performance can be enhanced effectively. In

11
ASSESSMENT ON CYBER SECURITY
addition to this it becomes essential to aware the employees about the need of proper cyber
security measures. The report has described the concepts related to cyber security and the
importance of cyber security within the ABCT organization. The report has also described the
security vulnerabilities within the system of ABCT that has huge potential to impact the
performance of the system. It becomes essential for every organization to identify the possible
threats associated with the organization so that it can provide better way of dealing with the
issues. Proper implementation of cyber security policies will ensure better performance of the
system. Apart from these the report has also included five emerging threats that have the ability
to impact overall performance of an organization. Thus after analyzing all the threats it can be
stated that there is a high need to implement proper measures that will help in developing better
functionality of the organization.
ASSESSMENT ON CYBER SECURITY
addition to this it becomes essential to aware the employees about the need of proper cyber
security measures. The report has described the concepts related to cyber security and the
importance of cyber security within the ABCT organization. The report has also described the
security vulnerabilities within the system of ABCT that has huge potential to impact the
performance of the system. It becomes essential for every organization to identify the possible
threats associated with the organization so that it can provide better way of dealing with the
issues. Proper implementation of cyber security policies will ensure better performance of the
system. Apart from these the report has also included five emerging threats that have the ability
to impact overall performance of an organization. Thus after analyzing all the threats it can be
stated that there is a high need to implement proper measures that will help in developing better
functionality of the organization.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 15
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.