COIT20249 Cybersecurity Report: ABCT Threats and Protection

Verified

Added on  2022/11/13

|13
|3502
|179
Report
AI Summary
This report focuses on cybersecurity for the ABCT organization, addressing vulnerabilities, emerging threats, and protection strategies. The introduction highlights the importance of cybersecurity for ABCT, an Australian technology company dealing with hardware and software products, and its need to secure customer data. The report identifies and explains three key security vulnerabilities: insecure cryptography, security misconfiguration, and phishing attacks, emphasizing the risks associated with these issues. It then details five emerging threats, including cryptojacking, cross-site scripting, identity theft, search engine filter bubble poisoning, and anti-AI activist attacks, explaining how they can impact ABCT. The report concludes with recommendations for protecting both home and office environments from cyberattacks, providing practical steps to mitigate the identified risks. The paper utilizes research and analysis to provide a thorough understanding of cybersecurity challenges and solutions for ABCT.
Document Page
Running head: CYBERSECURITY
Cyber security
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
CYBERSECURITY
Table of Contents
1. Introduction.........................................................................................................................2
2. Explanation about cyber security and its importance in ABCT.............................................2
3. Identification as well as explanation of three security vulnerabilities...................................3
4. Five different types of emerging threats................................................................................5
5. Recommendation for protecting both home and office from cyber attack............................7
6. Conclusion..............................................................................................................................9
Bibliography.............................................................................................................................10
Document Page
2
CYBERSECURITY
1. Introduction
The paper mainly reflects on ABCT organization whose business line generally stars from
various types of tech products including the hardware as well as software. The main aim of
the organization is to secure the data of the customers and for this the organization wants to
prepare a proper document on cybersecurity for training their staffs on cybersecurity. It is
found that the information associated with cybersecurity not only helps in reducing security
related issues but will also be helpful in improving the entire security system. The paper
mainly reflects on the importance of cybersecurity as well as about the three security
vulnerabilities that is present within the ABCT system. In addition to this, proper research is
generally done in order to list five various types of threats that are emerging with appropriate
recommendations that are generally helpful in protecting both the office and home from the
problem of cybersecurity.
2. Explanation about cyber security and its importance in ABCT
According to Furfaro et al. (2017), cyber security is defined as one of the important
technique that is used for protecting the integrity of the network as well as programs from
damage and authorized access. It is also considered as one of the practice that is generally
utilized in order to properly defend the servers as well as the computers from different types
of malicious attacks.
It is found that the organization “ABCT” which is one of the Australian technology
companies that ranges from different types of high tech products that include both software as
well as hardware. It is found that the organization generally helps in allowing its employees
the facility of work from home and additionally utilizes policy of having Bring your Own
Device. Currently the organization has 10,000 customers and the data as well as information
of the customers are generally stored within the cloud. As the organization is the victim of
Document Page
3
CYBERSECURITY
different types of cyber security and therefore the organization is always concerned about the
ways through which a keep the data of the customers secure which further be helpful in
maintaining their revenue. In order to keep the data secure, the organization wants cyber
security related measures that would be helpful in improving the entire security systems as
well as security related policies.
3. Identification as well as explanation of three security vulnerabilities
The three different types of cybersecurity vulnerabilities that generally occur within
the ABCT organization are generally illustrated with proper explanation.
Insecure cryptography: Cryptography based algorithm generally requires different
types of random number generators that generally utilizes different types of unpredictable
sources of information and data for generating proper random numbers that is generally
needed for obtaining large entropy ad it is analyzed that the number can be brute forced (Ani,
He & Tiwari, 2017). Within the client computers, it is found that main sources that are related
with randomization is by key presses or with the help of the mouse movement however, it is
identified that the servers generally without the interaction of the user that further creates
randomization (Clark et al., 2017). It is found that these types of insecure cryptography can
increase security related vulnerabilities in ABCT organization as all the data are stored in the
cloud.
Security misconfiguration: Security misconfiguration generally includes different
types of vulnerabilities as well as issues that are generally cantered based on the lack of
proper maintenance or due to the lack of attention within the entire web application related
configuration (Kshetri, 2015). It is found that a secured configuration within the website of
ABCT organization generally needs to be deployed for the frameworks, application servers as
well as web servers as well as database servers. Moreover, it is analyzed that the security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
CYBERSECURITY
based misconfiguration generally helps in providing the hackers for private data as well as
features that would further results the entire system compromise due to which the data as well
as important related related with both the customers as well as the organization can get
hampered negatively (Saleem et al., 2016).
Phishing (Social engineering) attacks: Within the phishing attack, the attackers
generally take the attempt of tricking the employees within the system off the victim
organization by giving away the important credentials or by downloading it (Dorsey et al.,
2017). It is found that the most common type of attack generally comes from email
mimicking the identification of one of the company vendors with someone that generally has
lot of authority within the company. The main goal of the strategy is to properly exploiting an
organization for the employees for bypassing more security layers so that they generally can
access data much more easily (Oyelere et al., 2015).This type of attacks within the ABCT
organization can occur.
IoT Devices: It is found that the IoT generally encompasses various types smart
devices as it is found that the smart devices that are utilized by the ABCT organization can be
utilized by the hackers for hijacking information from the network that comprised devices for
carrying out various types of attacks. It is found that the entire business does not generally
realize the significance of the IoT devices (Ghernaouti & Wanner, 2018). It is found that the
smart devices that are utilized by the ABCT organization generally help in providing a
number of opportunities to the attackers. In order to reduce the risks that are associated with
the IoT devices, it is very much important to undertake proper security based audit for
determining all the different types of disparate assets that are generally based on the network
as well as within the running operating system (Rakitin, 2016).
Document Page
5
CYBERSECURITY
4. Five different types of emerging threats
The five different types of emerging threats that generally can serious impact on the
business of the ABCT organization are generally elaborated below:
Cryptojacking: Ransomware is one of the biggest threats that generally creates
impact on the business of ABCT organization that generally exploits the basic types of
security vulnerabilities including segmentation, lack of network as well as backups. It is
considered as one of the ways of in which the computer is used unauthorized (De Bruijn &
Janssen, 2017). It is found that the hackers generally does this by lacking the victim within
the malicious link within the email that further helps in loading the crypto minimizing within
the computer by properly infecting the website with the help of the JavaScript. It is found that
the hackers generally have two types of ways through which the hackers can be able to reach
to the computer (Szabo, 2017). The first way is to trick the cryptomining code within the
computers that is generally done with the help of the tactics of phishing. Furthermore the
victims generally receive legitimate types of email that further encourages them to click on
the given link. The link which is generally provides generally runs on the cryptomining script
on the entire computer.
Cross-site scripting: The ABCT organization generally struggles for avoiding the
cross-sites scripting attacks within the entire development cycle. The attacks helps the
adversaries for using the business websites for executing the untrusted code within the
browser of the victim that further makes its quite easy for the criminal that makes it is quite
difficult for stealing the cookie related information that is generally utilized for the purpose of
authentication for further hijacking the entire site without using any type of credentials (Cruz
et al., 2016). It is found that due to the problem off cross site scripting is considered as one
of the most prevalent risk within the entire web application that is generally overlooked by
Document Page
6
CYBERSECURITY
the developers. The issues that generally occurs due to the emerging cross scripting threats
generally includes account hijacking, stealing of various types of credentials as well as
capture of various types of sensitive data. It is found that with the help of this threat the
attacker generally aims to properly executing the malicious scripts within the web browser of
the victims that generally includes malicious code within the legitimate web application. It is
found that the actual attack generally occurs when the victim generally visits the web page
for executing the entire malicious codes (Lu & Da Xu, 2018).
Identity theft: Identity theft is considered as one of the crime that uses the personal
information, credit history as well as identification characteristic for making the purchases
without the permission of the individual. It is found that the identity theft generally occurs
when the criminals have the access of personal information including name, address as well
as details associated with the bank that is used for stealing money. In addition to this, it is
found that the identity that is stolen can generally be utilized for making fake identity
(Morris, Madzudzo & Garcia-Perez, 2018). This risk can generally occur within the ABCT
organization and it must be considered as one of the major threat so that the issue that occurs
due to the identity theft can generally get resolved effectively. Moreover, the criminals
mainly attempts to gain the personal information with the help of a number of techniques
including phishing, hacking the online accounts retrieving the personal information that is
related with the social media as well as illegally accessing the information that is generally
stored within the database of the business (Tabasum et al., 2018).
Search engine filter bubble poisoning: It is found that the hackers generally
compromise the system of the user by properly getting them for visiting them proper
malicious site that further helps in exploiting different types of vulnerabilities within the
browser or other type of different software. It is found that the problem for the ackers is
generally getting the users to visit different types of sites that further helps in adding links
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
CYBERSECURITY
from different types of sites from the various types of malicious destinations (Al-Muhtadi et
al., 2017). This type of links generally give the malicious sites that helps in providing is
better page ranking that further appear earlier within the search engine results. It generally
can also create a number of security related issues within the ABCT organization and
therefore this issue must be considered as one of the emerging cybersecurity threat which
must be resolved effectively by adopting proper mitigation related strategies.
Anti Ai activist attack: It is found that the advances in context to machine learning
as well as automation are generally set for printing continued benefits for the entire business
as well as consumers. It is analyzed that the displacement of various types of workers can
generally lead to different types of social issues that further create proliferation of data
collection that generally can create a number of security as well as privacy concerns which
will bring worries (Kshetri, 2016). It is analyzed that due to the anti Ai activist generally
creates a number of problems as well as issues in making proper decisions for the business.
Moreover, it is found that emergence of the groups generally have the concerns with the
potential for the AI revolution as well as negative impacts. It is found that such groups
generally begin for deploying the tactics for countering systems (Szabo, 2017). Moreover, it
is found that this cybersecurity related threats can generally occur within the ABCT
organization and therefore it should be considered as one of the emerging threat and therefore
the ABCT organization must take proper actions for mitigating such types of issues and
challenges from the organization.
5. Recommendation for protecting both home and office from cyber attack
It is found there are a number of recommendations that must be provided to both the
office as well as home from different types of cyber-attacks so that issues related with the
cyber security attacks can generally be resolved:
Document Page
8
CYBERSECURITY
E-mail security tips: It is found that as email is generally used as one of the UCLA
however some individuals generally overlook the sense measures that generally can put at
risk and therefore it is quite necessary to follow email related security tips in order to resolve
or mitigate the occurrence of cybersecurity threats within the home and home. It is quite
necessary to select one password that must be of 10 characters that must include different
types of alphabets, numbers as well as symbols so that no one can easily break the passwords.
It is found that the password should be changed at least within the 6 months of time.
Moreover, utilization of password manager for all the different types of websites are
generally helpful. It is found that there are a number of passwords for each of the website for
the entire application that is generally used. Moreover, any type of phishing attempt generally
creates trick for revealing the confidential, financial information as well as password.
Furthermore, it is necessary not to transmit sensitive as well as restricted type of information
with the help of email.
Training employees: It is quite necessary to train the employees about the various
principles of cybersecurity so that the employees of the organization generally knows the root
cause of the problem so that the issues as well as challenges that are associated with
cybersecurities can generally get identified in the initial phase. It is found that proper training
facilities to the employees generally helps them in taking appropriate steps for properly
handling the cybersecurity related issues as well as challenges. This further helps them to
take appropriate steps for mitigating the issues and challenges that are associated with
cybersecurity.
Social media angler phishing must be automated: It is quite necessary to properly
understand the social media footprint for the risks that are related with the user’s fraudulent
accounts. It is found that proper fraudsters must automate the accounts that are one need to be
automated. While angler phishing is mainly concentrated to Twitter that generally sans
Document Page
9
CYBERSECURITY
Facebook, Google as well as social media networks. Moreover, it is found that appropriate
adoption of the solution helps in proactively scanning the newly created web domains for
various types of phishing attacks that generally include angler phish.
6. Conclusion
It can be concluded from the entire paper that cybersecurity related issue that
generally emerges should be mitigated properly. It is found that the organization ABCT
generally faces a lot of cybersecurity related issues and therefore the organization generally
helps in creating a proper document based on the principles of cybersecurity for resolving the
problems as well as issues related with cybersecurities. It is found that the paper generally
discuses three different types of security vulnerabilities that generally occurs within the
ABCT organization. Moreover, the paper also discusses the op five emerging threat that can
create impact on the ABCT organization negatively. Furthermore, proper recommendations
are generally provided that generally can be helpful for protecting both home and office from
cyber-attack.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
CYBERSECURITY
Bibliography
Al-Muhtadi, J., Shahzad, B., Saleem, K., Jameel, W., & Orgun, M. A. (2017). Cybersecurity
and privacy issues for socially integrated mobile healthcare applications operating in a
multi-cloud environment. Health informatics journal, 1460458217706184.
Ani, U. P. D., He, H., & Tiwari, A. (2017). Review of cybersecurity issues in industrial
critical infrastructure: manufacturing in perspective. Journal of Cyber Security
Technology, 1(1), 32-74.
Clark, G. W., Doran, M. V., & Andel, T. R. (2017, March). Cybersecurity issues in robotics.
In 2017 IEEE Conference on Cognitive and Computational Aspects of Situation
Management (CogSIMA) (pp. 1-5). IEEE.
Cruz, T., Rosa, L., Proença, J., Maglaras, L., Aubigny, M., Lev, L., ... & Simoes, P. (2016). A
cybersecurity detection framework for supervisory control and data acquisition
systems. IEEE Transactions on Industrial Informatics, 12(6), 2236-2246.
De Bruijn, H., & Janssen, M. (2017). Building cybersecurity awareness: The need for
evidence-based framing strategies. Government Information Quarterly, 34(1), 1-7.
Dorsey, D. W., Martin, J., Howard, D. J., & Coovert, M. D. (2017). Cybersecurity issues in
selection. In Handbook of employee selection (pp. 913-930). Routledge.
Furfaro, A., Argento, L., Parise, A., & Piccolo, A. (2017). Using virtual environments for the
assessment of cybersecurity issues in IoT scenarios. Simulation Modelling Practice
and Theory, 73, 43-54.
Ghernaouti, S., & Wanner, B. (2018). Research and education as key success factors for
developing a cybersecurity culture. In Cybersecurity Best Practices (pp. 539-552).
Springer Vieweg, Wiesbaden.
Document Page
11
CYBERSECURITY
Kshetri, N. (2015). Cybercrime and cybersecurity issues in the BRICS Economies. Journal of
Global Information Technology Management, 18(4), 245-249.
Kshetri, N., 2016. Global Cybersecurity: Key Issues and Concepts. In The Quest to Cyber
Superiority (pp. 1-24). Springer, Cham.
Lu, Y., & Da Xu, L. (2018). Internet of Things (IoT) cybersecurity research: a review of
current research topics. IEEE Internet of Things Journal.
Morris, D., Madzudzo, G., & Garcia-Perez, A. (2018). Cybersecurity and the auto industry:
the growing challenges presented by connected cars. International journal of
automotive technology and management, 18(2), 105-118.
Oyelere, S. S., Sajoh, D. I., Malgwi, Y. M., & Oyelere, L. S. (2015, November).
Cybersecurity issues on web-based systems in Nigeria: M-learning case study. In
2015 International Conference on Cyberspace (CYBER-Abuja) (pp. 259-264). IEEE.
Rakitin, S. R. (2016). What Can Software Quality Engineering Contribute to Cybersecurity?.
Software Quality Professional, 18(2), 31.
Saleem, K., Zeb, K., Derhab, A., Abbas, H., Al-Muhtadi, J., Orgun, M. A., & Gawanmeh, A.
(2016, September). Survey on cybersecurity issues in wireless mesh networks based
eHealthcare. In 2016 IEEE 18th International Conference on e-Health Networking,
Applications and Services (Healthcom) (pp. 1-7). IEEE.
Szabó, Z. (2017, September). Cybersecurity issues of pension payments. In 2017 IEEE 15th
International Symposium on Intelligent Systems and Informatics (SISY) (pp. 000289-
000292). IEEE.
Tabasum, A., Safi, Z., AlKhater, W., & Shikfa, A. (2018, August). Cybersecurity Issues in
Implanted Medical Devices. In 2018 International Conference on Computer and
Applications (ICCA) (pp. 1-9). IEEE.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]