COIT20249 Assessment 3: Cybersecurity in ABCT Company

Verified

Added on  2025/05/04

|14
|3077
|114
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
COIT20249: ASSESSMENT 3
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Executive Summary
The chief purpose of this report is to show the significance of the cybersecurity in today's era
where the use of technology is increasing day by day and most of the population doing the things
with the help of Internet. Everything is going digital nowadays and with the rapid use of
technology and the internet, there is an increment in the risks of cybercrime. Cybercrime can be
explained as stealing someone's personal information like its bank account details, credit card
details, and other personal information. In order to secure these details and to make use of
technology without facing any financial losses, it is important to have cybersecurity of your
personal data. In this report, the importance of cybersecurity is discussed for the company ABCT
which is a technology company in Australia which produces high tech products that consist of
hardware and software. It is essential for the ABCT Company to implement cybersecurity in
their process in order to overcome any cybercrime. With the help of cybersecurity, ABCT can
secure their personal information and also secure the personal data of the customers due to which
customers will not have to face any cyber-attack in the future. This will not only provide safety
to the personal information of the company but also secure customers data.
2
Document Page
Contents
Executive Summary.......................................................................................................................2
Introduction....................................................................................................................................4
Definition of Cybersecurity and its importance in ABCT Company........................................5
Security Vulnerabilities in the system of ABCT.........................................................................7
Different types of Emerging threats.............................................................................................9
Conclusion....................................................................................................................................11
Recommendations........................................................................................................................12
References.....................................................................................................................................13
3
Document Page
Introduction
This report shows the significance of cybersecurity in today’s world where the use of technology
is increasing on a daily basis. ABCT is a technology company which is located in Australia.
Most of the work of ABCT is done online due to which there is a lot of risk of stealing the data
of the company by hackers. It is essential for the ABCT to secure its private and important data
in order to overcome any cyber-attacks. This will assess the company to save itself from any
kind of financial crisis. ABCT is a big technology company in Australia which has two offices in
other countries as well. In Canberra, the company's main headquarter is located. The
organization also allow its employees to do their work from home using VPN connections. This
will also increase the risk of stealing private documents which is also a reason the company
needs cybersecurity in their system. There are several recommendations which are made to the
ABCT Company in order to secure their data from any kinds of cyber attacks. These
recommendations are the use of various methods of cybersecurity such as external intelligence
and physical security. The main objective of this study is to show the significance of
cybersecurity in the expansion of the business. In this report, there is also a discussion of
different types of emerging threats which can affect t the business of ABCT and also various
securities vulnerabilities in the system of ABCT.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Definition of Cybersecurity and its importance in ABCT Company
Cybersecurity can be explained as the best method to secure the important data like personal
information of the individual or company, bank account details, credit card details and details of
the private documents form any kind of cyber-attacks. There are lots of hackers who are ready to
steal the data of the big companies in order to make money. With the evolution of technology,
there is an increment of cyber-attacks in the world. Many techniques like “bring your own device
and Inter of things” can be used in order to secure the data from hackers (Craigen, et. al., 2014).
Cybersecurity not online provides security to the data but also secure programs and network.
Various methods can be used in order to provide safety to the major areas of the data. These
methods are explained below:
Security of application- This method is used to secure the applications from any kind of
attacks. These attacks can be overcome with the help of hardware and software.
Whenever there is a production of any application, it is essential for the developer to
secure the application with the help of cybersecurity so that customer's data will remain
secure throughout the usage of the application. Security measure can be constructed
under his application so that no hacker can steal the data of the customers.
Network Security- In order to secure the network of any device, network security can be
implemented in the system. This will secure the network from any kind of threats.
Different methods like Anti-virus, Intrusion Prevention Systems, Firewall, and Virtual
private network can be used in order to protect the network from any kinds of threats
(Sadeh-Koniecpol, et. al., 2017).
Information Security- Information Security can be used in order to protect the data of
the user from any kind of unauthorized access. Methods like verification of the user,
agreements, and cryptography can be used in order to protect the data of the user.
Cybersecurity is necessary for the ABCT so that the company data will remain secure and the
company does not have to face any kind of trouble in the future. Implementation of cybersecurity
will not only protect the data of the company but also secure the personal information of its
customers. It is necessary for the ABCT to implement the various security methods because
5
Document Page
ABCT has a high revenue and also high customer's rate. Cybersecurity will ensure the company
that they do not have to face any problem in the future and also assess them in expanding their
business more in the global market. It is a significant aspect for any business to protect their data
from any kind of threats (Adams & Makramalla, 2015). The organization can strengthen their
security due to which it will be impossible for hackers to steal the private data of the firm.
Stealing of private data not only affects the growth of the business but also create a bad image if
the company in the international market.
6
Document Page
Security Vulnerabilities in the system of ABCT
There is various vulnerability in the system of ABCT, these vulnerabilities and its effects are
explained below:
Insecure Direct Object Reference- It is the major vulnerability in the system of the
ABCT. AS the ABCT is a customer base company due to which many customers have
their user id on the website of the company. As a result, the workforce of the company
has to deal with many user ids so that the employees can save their details in the system
of the company. An attacker can make use of this process in order to steal the data of the
company (Sadeghi, et. al., 2015). Many times employees fail to recognize the id of the
users and mistakenly save the database of the attacker in the system. This will allow the
attacker to access all the data of the other users and also the data of the company. In
order to access the data of the users, an attacker can create a fake reference and submit
their data in the system of the company. Due to which an attacker can access all the
private documents of the company as well as the confidential data of the customers. This
will affect the growth of the company. ABCT can avoid this scenario by doing the
authorization of every customer with care on a daily basis. The company can also store
all the data of the customers internally so that they do not have to do the authorization of
users every time.
Broken Authentication- It is another vulnerability in the system of the ABCT. The
organization has its own websites so that the customers can fill their details in the system
of the company with the help of setting a username and the password. Due to which their
data will remain secure in the system of the company (Cadariu, et. al., 2015). Many
times, working on these websites can automatically generate a cookie session. This
cookie session will consist of the username and password of the users. Many times, users
forgot to log out session then at that point of time these cookies remain to exist in the
system. This will be the helpfully for the hackers as they can make use of these cookies in
order to steal the private data of the users. A hacker can access the important data of the
user like its credit card details and bank account information.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Exposure of sensitive data- Sensitive data can be explained as that type of data which
contains the confidential information of the users like their credit card details and all the
details of their online transaction and the source of their online payment. ABCT is known
for its high technology and ability to develop high tech products. Due to which, many
customers purchase their products from the organization. Many a time's customers prefer
online payment in order to do the payment of the products they purchase from the
company. Customers make use of the credit card and other online payment methods
(Furdek, et. al., 2014). Due to which sensitive data of the customers got saves in the
system of the company. A hacker can steal the sensitive data of the customers by
attacking the system of the corporation. This can affects the development of the company
in the international market.
8
Document Page
Different types of Emerging threats
In today's world where the use of digital technology is increasing on a daily basis. As a result,
most of the organizations are finding are various methods in order to provide security to their
system against the various cyber threats. A good security system not only secure the company
from any kind of threats but also it is an important factor for the growth of the business. The
arrival of several cyber threats not only harmful to the productivity of the corporation but also
affects the growth of the association. ABCT can provide various security methods in order to
protect their confidential data from any kind of emerging threats (Jang-Jaccard & Nepal, 2014).
These new emerging threats and their effects on the company ABCT are mentions below:
Manipulation Algorithm- This is the big threat to the companies as the hackers can
manipulate the algorithm of the several devices which are connected to the server of the
company. This will allow the attackers to get access to the system and due to which
hacker can perform the various vulnerabilities in the system of the company. This will
not only affect the system but also cause various damage to the profits of the
organization.
Malware- It is a technique by which attackers can access the information of the user with
the help of a downloadable file. This file is provided by the attackers to the users.
Whenever the user downloads this file, their system gets malicious and the hacker able to
access all the data of the user. User is unaware of the fact that an attacker is accessing all
its data. Trojan horse is the best example to understand the process of Malware (Ling, et.
al., 2017).
Ransomware- It is a type of threat in which an attacker can attack the core of the system
and lock the several functions of the system. As a result, the file gets encrypt and no other
person can be able to access the file anymore. The ransomware is known to be the most
damaging threat. A hacker can lock the function of the system so that employees of the
company will not perform those actions. It can cause a huge loss to the profits of the
company and also affects the growth of the association.
Phishing- Phishing is the technique through which a hacker can access the confidential
data of the company. This can be done with the help of social sites and phishing emails.
9
Document Page
Hackers can generate lots of phishing emails at the platform of emails and social sites.
Whenever the employees of the company click on this phishing mail then the attacker
will be able to access all the data of their system. These phishing emails generally consist
of various scams in which they offer various benefits to the employees (Choucri, et. al.,
2014). In order to avail those offers, a person can click on those phishing emails. This
will allow the attacker to download the contents which are available in the system of that
user.
Brute Force- It is a type of attack in which a hacker can attempt to access the data of the
user through the various program which is connected with the password. Due to the
repetitive use of the same passwords in all other places, it will be quite easy for hackers
to steal the data of the users. Therefore, is it important for the users to set a strong and
different password
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Conclusion
The significance of cybersecurity has been illustrated in this report in order to determine the
several aspects of cybersecurity in the development of the business. In this report, several main
issues have been concluded which showed a high impact on the growth of the business. In order
to assess the ABCT Company In securing the sensitive data of the company, several finding has
been examined in this study. For the development of any organization in the international
market, it is necessary to protect the confidential data of the company from any kind of cyber-
attacks and to protect that data several safety measures have been concluded in this report.
Cybersecurity not only protects the confidential data but also it will ensure the company that the
online activities like online payments of the customers, connectivity of mobile and Internet of
things also remain secure. Different types of security measure have been illustrated in this
segment in order to accomplish the main motto of this report. For the future aspect of the
Company, ABCT can adopt different security measures in their system so that all the data of the
organization remain secure from hackers. Several emerging threats also concluded in this report
which can affect the business of any company. These emerging threats can be overcome with
different security methods and several recommendations have been illustrated in this report in
order to secure the confidential information of the corporation from any kind of cyber-attacks.
11
Document Page
Recommendations
There are several recommendations which can be made in order to protect the data of office and
home from cyber-attacks. These recommendations are mention below:
Detection of sensitive data- The Company can detect the location of the sensitive data
and store that data at a secure place (Reddy & Reddy, 2014). A sensitive data is the
collection of confidential data of the customers and also of the company. A company can
protect this sensitive data with the help of various security measure. In the system of
every company, there is a presence of an immense amount of data but the percentage of
sensitive data from all the data is only 5-7%. The company can store that data at a secure
place by various security measure in order to avoid any cyber-attacks.
Limitation of data- In many cases, the company gives the freedom to all the employees
to access the data of the company. Due to which risk of leaking the sensitive data of the
company gets increased. It is recommended to the organization to limit the access of the
employees so that the employees can access that data only which is required by them
(Samtani, et. al., 2017). This will avoid the risk of confidential data of the company
Strong Passwords- It is recommended to the company to set strong passwords in order
to lock the data of the customers. Setting strong passwords will be helpful for the
company as no third person can be able to guess the password and access the information.
Data backup and update- It is the most important recommendation to the company to
create a backup of all the data and also update the data on a regular basis. Creation of
data backup will allow the organization to generate the previous data again in the system
in the case of a cyber-attack. This method is important for any company in order to
achieve success without facing any issue in the future (Shafqat & Masood, 2016).
12
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]