Cyber Security Report: Cyber Cafe Security Plan and Training
VerifiedAdded on 2022/08/14
|11
|2254
|14
Report
AI Summary
This report provides a comprehensive analysis of cyber security threats and vulnerabilities within a cyber cafe environment. It begins with an executive summary, followed by an introduction that highlights the importance of cyber security in today's digital landscape. The report identifies key employees, including the director and network manager, and presents interview questions to gather insights into the cafe's current security posture. It then identifies organizational holdings at risk, such as customer data and network infrastructure, and discusses various threats, including malware infections, identity theft, and the impact of competitors. The report emphasizes the need for a robust security plan, including policies for authorized software, anti-virus measures, and password management. It concludes with a detailed security training program designed to educate employees on recognizing and mitigating cyber threats. The report underscores the importance of continuous training and awareness to protect the cyber cafe from evolving cyber attacks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: CYBER SECURITY
CYBER SECURITY
Name of the Student
Name of the University
Author Note
CYBER SECURITY
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1CYBER SECURITY
Executive Summary
Due to the rising concern over the security of information, information assurance and the
concerns of the security of network of the cyber cafe needs to be examined. The cyber cafe
has been subjected to cyber attacks and viruses. Therefore, the report focuses on the
evaluation of threats of the cyber cafe and the mitigation strategies that needs to be developed
for the company. The report also focuses on the security awareness and the training of the
employees so that they can take sufficient measures during any of the cyber attacks and data
breach.
Executive Summary
Due to the rising concern over the security of information, information assurance and the
concerns of the security of network of the cyber cafe needs to be examined. The cyber cafe
has been subjected to cyber attacks and viruses. Therefore, the report focuses on the
evaluation of threats of the cyber cafe and the mitigation strategies that needs to be developed
for the company. The report also focuses on the security awareness and the training of the
employees so that they can take sufficient measures during any of the cyber attacks and data
breach.

2CYBER SECURITY
Table of Contents
Introduction:...............................................................................................................................3
Identification of the Employees of Organization.......................................................................3
Identification of Organizational holdings at Risk......................................................................5
The Other Possible Threats........................................................................................................5
Security Plan for Cyber Cafe.....................................................................................................6
Security Training Programme....................................................................................................7
Conclusion..................................................................................................................................7
References..................................................................................................................................9
Table of Contents
Introduction:...............................................................................................................................3
Identification of the Employees of Organization.......................................................................3
Identification of Organizational holdings at Risk......................................................................5
The Other Possible Threats........................................................................................................5
Security Plan for Cyber Cafe.....................................................................................................6
Security Training Programme....................................................................................................7
Conclusion..................................................................................................................................7
References..................................................................................................................................9

3CYBER SECURITY
Introduction:
Cyber security is the practice of safeguarding the networks, systems and programs
from the digital attacks. These cyber attacks are aimed in order to access, change or destroy
the sensitive information, extortion of money from the user or interrupting the normal
business procedures. Implementation of effective measures of cyber security is specifically
challenging today as there are more devices than the people and the hackers are becoming
more distinctive.
The report deals with a cyber cafe whose director was concerned about the network
security in the systems of the cafe. The report focuses on the employees of the organization
that will conduct the interviews in order to gather information about the complaints. The
report focuses on the holdings of the organization that are at risk. The report provides an
overview of the risks of the organization and a security plan in order to address the threats of
the organization. Lastly, the report discusses about a information security training program
for the employees of the organization.
Identification of the Employees of Organization
Few employees of the cyber cafe can be recognised and interviews can be conducted
in order to gather information regarding the major complaints and the threats in the cyber
cafe (Pham et al 2019). The employees of the organization include the director of the cyber
cafe and the network manager of the cyber cafe. These two are the main person of the cyber
cafe that can be interviewed in order to gather information.
Interview Questions for the Director
What are threats that the cyber cafe is facing right now?
Does your cyber cafe have a proper security policy?
Introduction:
Cyber security is the practice of safeguarding the networks, systems and programs
from the digital attacks. These cyber attacks are aimed in order to access, change or destroy
the sensitive information, extortion of money from the user or interrupting the normal
business procedures. Implementation of effective measures of cyber security is specifically
challenging today as there are more devices than the people and the hackers are becoming
more distinctive.
The report deals with a cyber cafe whose director was concerned about the network
security in the systems of the cafe. The report focuses on the employees of the organization
that will conduct the interviews in order to gather information about the complaints. The
report focuses on the holdings of the organization that are at risk. The report provides an
overview of the risks of the organization and a security plan in order to address the threats of
the organization. Lastly, the report discusses about a information security training program
for the employees of the organization.
Identification of the Employees of Organization
Few employees of the cyber cafe can be recognised and interviews can be conducted
in order to gather information regarding the major complaints and the threats in the cyber
cafe (Pham et al 2019). The employees of the organization include the director of the cyber
cafe and the network manager of the cyber cafe. These two are the main person of the cyber
cafe that can be interviewed in order to gather information.
Interview Questions for the Director
What are threats that the cyber cafe is facing right now?
Does your cyber cafe have a proper security policy?
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4CYBER SECURITY
How are the systems in the cyber cafe protected from unauthorized access?
Do the clients play a role in the recent cyber attacks in your Cyber cafe?
As a Director of the cafe what is your role in minimizing the attacks in the cafe?
Interview Questions for the Network Manager
As a network manager what are the measures for unauthorized access to the system of the
Cyber Cafe?
How have you protected the network of the cyber cafe?
What is your say regarding the latest cyber attack in your Cyber cafe?
What are the safety measures that you have taken in order to minimize the attacks that
have taken place?
What are the major complaints that you generally hear from the clients regarding the
system and the internet services at the Cyber cafe?
What is your plan to for recognising and addressing the cyber attacks?
What are the types of firewalls that the cyber cafe is using?
The director of the Cyber Cafe indicated that there were 2 main complaints from the
Cyber Cafes. The first and the foremost complaint was the configuration of the workstations,
which was not consistent, the second number workstation had the similar software installed
(Denning and Odlyzko 2019). The second complaint was the time that many workstations
were own as the infections from the virus or inappropriate installations of softwares those are
unauthorized.
There are 2 technicians that were accountable in order to maintain the workstations.
However, they had knowledge about the practices of information security and they did not
have any type of training. Several attendants were accountable in order to maintain a manual
How are the systems in the cyber cafe protected from unauthorized access?
Do the clients play a role in the recent cyber attacks in your Cyber cafe?
As a Director of the cafe what is your role in minimizing the attacks in the cafe?
Interview Questions for the Network Manager
As a network manager what are the measures for unauthorized access to the system of the
Cyber Cafe?
How have you protected the network of the cyber cafe?
What is your say regarding the latest cyber attack in your Cyber cafe?
What are the safety measures that you have taken in order to minimize the attacks that
have taken place?
What are the major complaints that you generally hear from the clients regarding the
system and the internet services at the Cyber cafe?
What is your plan to for recognising and addressing the cyber attacks?
What are the types of firewalls that the cyber cafe is using?
The director of the Cyber Cafe indicated that there were 2 main complaints from the
Cyber Cafes. The first and the foremost complaint was the configuration of the workstations,
which was not consistent, the second number workstation had the similar software installed
(Denning and Odlyzko 2019). The second complaint was the time that many workstations
were own as the infections from the virus or inappropriate installations of softwares those are
unauthorized.
There are 2 technicians that were accountable in order to maintain the workstations.
However, they had knowledge about the practices of information security and they did not
have any type of training. Several attendants were accountable in order to maintain a manual

5CYBER SECURITY
log of who is accessing the system (Kizil and Doğan 2017). The attendants have no training
of computer.
Identification of Organizational holdings at Risk
The Cyber Cafe Umbrella has been subjected to cyber attacks and virus through
email. There are various types of holdings in the cyber cafe that are at risk. Various
customers use the systems of the cyber cafe, so the systems of the Cyber cafe can be risk
(Blagden 2020). The networks that are used by the cyber cafe in order to connect to the
internet can be at risk from the hackers as they can enter the systems through the network.
The Wi-Fi those are used by the employees of the Cyber cafe can be hacked by the hackers
and they can access important information from them (Larcker, Reiss and Tayan 2017). The
details of the customers those are taken by the employees before they allow the customers to
access the systems can be risk as the attackers can access it. The unencrypted devices can
also be at risk.
The Other Possible Threats
Despite the usefulness of the cyber cafe, the nature of the cyber cafe and the way by
which they function creates a number of threats to the information that are stored in the cyber
cafe that is the details of the customers (Rashid and Chauhan 2020). The other possible
threats include:
The systems in the cyber cafe are shared among various users that may insert their
removable media such as pen drives, SD cards and it can lead to a high risk of infection
of malware (Olatunbosun, Edwards and Martineau 2018).
There are different users who forget to log out of their accounts properly and they dispose
off their history of browsing and cookies. It leaves them vulnerable to the theft of
identity.
log of who is accessing the system (Kizil and Doğan 2017). The attendants have no training
of computer.
Identification of Organizational holdings at Risk
The Cyber Cafe Umbrella has been subjected to cyber attacks and virus through
email. There are various types of holdings in the cyber cafe that are at risk. Various
customers use the systems of the cyber cafe, so the systems of the Cyber cafe can be risk
(Blagden 2020). The networks that are used by the cyber cafe in order to connect to the
internet can be at risk from the hackers as they can enter the systems through the network.
The Wi-Fi those are used by the employees of the Cyber cafe can be hacked by the hackers
and they can access important information from them (Larcker, Reiss and Tayan 2017). The
details of the customers those are taken by the employees before they allow the customers to
access the systems can be risk as the attackers can access it. The unencrypted devices can
also be at risk.
The Other Possible Threats
Despite the usefulness of the cyber cafe, the nature of the cyber cafe and the way by
which they function creates a number of threats to the information that are stored in the cyber
cafe that is the details of the customers (Rashid and Chauhan 2020). The other possible
threats include:
The systems in the cyber cafe are shared among various users that may insert their
removable media such as pen drives, SD cards and it can lead to a high risk of infection
of malware (Olatunbosun, Edwards and Martineau 2018).
There are different users who forget to log out of their accounts properly and they dispose
off their history of browsing and cookies. It leaves them vulnerable to the theft of
identity.

6CYBER SECURITY
The systems are owned and managed by the people who own or administer the cafe, they
can track the activities of each of the computers that consists of the websites that are
browsed by the users
The cafe wants the users to provide identification in order to access the computer and it
means that identity of the user can be associated to the activities of the user on the
computer (Ahmad et al 2017). The identity of the user can be accessed if the systems of
the cafe gets hacked
The most important threats that the Cyber Cafe Umbrella can face is the falling cost of the
internet access and the emerging of the local competitors.
Security Plan for Cyber Cafe
There were no information security policies for the Cyber Cafes (Caparino 2018). The
only thing that resembled the policy were some stickers that were placed on the monitors of
the cyber cafes and letting every customer know that they were not permitted to download
any materials those were related to adults.
The policies are very important to any of the programs of Information Assurance. The
Cyber cafes had no policies but the Cyber Cafes are not a part of the network of the company
and the workstations are the resources of the Company (Maddel 2016). The policies of the
organization include:
1. The procedures and the policies associated to the authorized software. This policy
consists of :
The operating systems should be authorized
The application software those are used by the organization should be authorized
The Company should properly install the softwares of applications and the operating
systems
The systems are owned and managed by the people who own or administer the cafe, they
can track the activities of each of the computers that consists of the websites that are
browsed by the users
The cafe wants the users to provide identification in order to access the computer and it
means that identity of the user can be associated to the activities of the user on the
computer (Ahmad et al 2017). The identity of the user can be accessed if the systems of
the cafe gets hacked
The most important threats that the Cyber Cafe Umbrella can face is the falling cost of the
internet access and the emerging of the local competitors.
Security Plan for Cyber Cafe
There were no information security policies for the Cyber Cafes (Caparino 2018). The
only thing that resembled the policy were some stickers that were placed on the monitors of
the cyber cafes and letting every customer know that they were not permitted to download
any materials those were related to adults.
The policies are very important to any of the programs of Information Assurance. The
Cyber cafes had no policies but the Cyber Cafes are not a part of the network of the company
and the workstations are the resources of the Company (Maddel 2016). The policies of the
organization include:
1. The procedures and the policies associated to the authorized software. This policy
consists of :
The operating systems should be authorized
The application software those are used by the organization should be authorized
The Company should properly install the softwares of applications and the operating
systems
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CYBER SECURITY
The company should appropriately install the security updates and the packs of services.
2. The processes and the policies related to the anti-viruses
3. The policies and the procedures associated with the passwords and User-ID’s
The other policies of the company can also be applicable (Olatunbosun, Edwards and
Martineau 2018). One of the policies that would require to be altered for Cyber Cafe would
be the policy of acceptable use.
Security Training Programme
The organization should provide proper training to the employees so that they can
understand if any of the cyber security attacks occur in the organization (He et al 2019). The
Security training programme should consist of the following steps:
The training should start on day one when the new employees are recruited to the
company.
The company should make them watch the threats those are emerging in the company like
phishing, data breach and many more
The company should make the employees practice the measures that they should take
when a security breach or any of the cyber security attacks take place, as practice makes
perfect (Dawson 2019).
The company should explain the employees why cyber security programme or the
employee training is important for the company.
The company should make the employees understand about the issues of password and
they should give strong passwords on the systems that they are using.
The company should make the employee security training engaging so that they can learn
about the measures of the cyber security attacks in the company.
The company should appropriately install the security updates and the packs of services.
2. The processes and the policies related to the anti-viruses
3. The policies and the procedures associated with the passwords and User-ID’s
The other policies of the company can also be applicable (Olatunbosun, Edwards and
Martineau 2018). One of the policies that would require to be altered for Cyber Cafe would
be the policy of acceptable use.
Security Training Programme
The organization should provide proper training to the employees so that they can
understand if any of the cyber security attacks occur in the organization (He et al 2019). The
Security training programme should consist of the following steps:
The training should start on day one when the new employees are recruited to the
company.
The company should make them watch the threats those are emerging in the company like
phishing, data breach and many more
The company should make the employees practice the measures that they should take
when a security breach or any of the cyber security attacks take place, as practice makes
perfect (Dawson 2019).
The company should explain the employees why cyber security programme or the
employee training is important for the company.
The company should make the employees understand about the issues of password and
they should give strong passwords on the systems that they are using.
The company should make the employee security training engaging so that they can learn
about the measures of the cyber security attacks in the company.

8CYBER SECURITY
The subjects that are to be covered on the training program include phishing, physical
security, desktop security, security of passwords and the malware (McIlwraith 2016).
Conclusion
Cyber security is very important in this era because the hackers are using advanced
technology to get into the systems of the user and can access the sensitive information those
are important. The report discusses about the cyber cafe that has been subjected to cyber
attacks. Therefore, they need to identify the threats that will disturb them in the future and
they should mitigate them before they harm the organization. The report focuses on the
security plan of the company so that they can minimize the threats of the company. Security
plan is very important for the company. The company should take initiative in order to train
the employees in the cyber security attacks so that they can understand and take sufficient
measures during any cyber attacks or data breach.
The subjects that are to be covered on the training program include phishing, physical
security, desktop security, security of passwords and the malware (McIlwraith 2016).
Conclusion
Cyber security is very important in this era because the hackers are using advanced
technology to get into the systems of the user and can access the sensitive information those
are important. The report discusses about the cyber cafe that has been subjected to cyber
attacks. Therefore, they need to identify the threats that will disturb them in the future and
they should mitigate them before they harm the organization. The report focuses on the
security plan of the company so that they can minimize the threats of the company. Security
plan is very important for the company. The company should take initiative in order to train
the employees in the cyber security attacks so that they can understand and take sufficient
measures during any cyber attacks or data breach.

9CYBER SECURITY
References
Ahmad, M.S., Danbatta, S.J., Abdullahi, A.A., Darma, A.A. and Ahmad, A.M., 2017. Issues
Engulfing Operation of Internet Café in Kano State. International Journal, 7(5).
Blagden, D., 2020. Deterring Cyber Coercion: The Exaggerated Problem of
Attribution. Survival, 62(1), pp.131-148.
Caparino, E.T., 2018. Teachers’ Perception on Cyber Security. Advanced Science
Letters, 24(11), pp.8471-8475.
Dawson, A.R., 2019. Exploring Strategies for Implementing Information Security Training
and Employee Compliance Practices.
Denning, P.J. and Odlyzko, A., 2019. An interview with Andrew Odlyzko on cyber
security. Communications of the ACM, 62(9), pp.28-30.
He, W., Anwar, M., Ash, I., Li, L., Yuan, X., Xu, L. and Tian, X., 2019. Effects of Evidence-
Based Malware Cybersecurity Training on Employees.
Kizil, C. and Doğan, E., 2017. Audit Techniques for Protecting against Cyber Attacks: A
Bilateral Approach of Case Studies and Interview. Societal Complexity, Data Mining and
Gaming, State-of-the-Art, pp.125-135.
Larcker, D.F., Reiss, P.C. and Tayan, B., 2017. Critical update needed: Cybersecurity
expertise in the boardroom. Rock Center for Corporate Governance at Stanford University
Closer Look Series: Topics, Issues and Controversies in Corporate Governance No. CGRP-
69, pp.17-70.
Maddel, M.M., 2016. Critical study of security management system of Cyber Cafes in Pune
City (Doctoral dissertation, Tilak Maharashtra Vidyapeeth).
References
Ahmad, M.S., Danbatta, S.J., Abdullahi, A.A., Darma, A.A. and Ahmad, A.M., 2017. Issues
Engulfing Operation of Internet Café in Kano State. International Journal, 7(5).
Blagden, D., 2020. Deterring Cyber Coercion: The Exaggerated Problem of
Attribution. Survival, 62(1), pp.131-148.
Caparino, E.T., 2018. Teachers’ Perception on Cyber Security. Advanced Science
Letters, 24(11), pp.8471-8475.
Dawson, A.R., 2019. Exploring Strategies for Implementing Information Security Training
and Employee Compliance Practices.
Denning, P.J. and Odlyzko, A., 2019. An interview with Andrew Odlyzko on cyber
security. Communications of the ACM, 62(9), pp.28-30.
He, W., Anwar, M., Ash, I., Li, L., Yuan, X., Xu, L. and Tian, X., 2019. Effects of Evidence-
Based Malware Cybersecurity Training on Employees.
Kizil, C. and Doğan, E., 2017. Audit Techniques for Protecting against Cyber Attacks: A
Bilateral Approach of Case Studies and Interview. Societal Complexity, Data Mining and
Gaming, State-of-the-Art, pp.125-135.
Larcker, D.F., Reiss, P.C. and Tayan, B., 2017. Critical update needed: Cybersecurity
expertise in the boardroom. Rock Center for Corporate Governance at Stanford University
Closer Look Series: Topics, Issues and Controversies in Corporate Governance No. CGRP-
69, pp.17-70.
Maddel, M.M., 2016. Critical study of security management system of Cyber Cafes in Pune
City (Doctoral dissertation, Tilak Maharashtra Vidyapeeth).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10CYBER SECURITY
McIlwraith, A., 2016. Information security and employee behaviour: how to reduce risk
through employee education, training and awareness. Routledge.
Olatunbosun, S.B., Edwards, N.J. and Martineau, C.D., 2018. Capturing the Existential Cyber
Security Threats from the Sub-Saharan Africa Zone through Literature Database.
Olatunbosun, S.B., Edwards, N.J. and Martineau, C.D., 2018. Capturing the Existential Cyber
Security Threats from the Sub-Saharan Africa Zone through Literature Database.
Pham, H.C., Brennan, L., Parker, L., Phan, T.N., Ulhaq, I., Nkhoma, M.Z. and Nguyen,
M.N., 2019. Enhancing cyber security behavior: an internal social marketing
approach. Information & Computer Security.
Rashid, T. and Chauhan, K., 2020. Cyber Security in the Public Sector: Awareness of
Potential Risks among Public Policy executives. Security Analytics for the Internet of
Everything, p.67.
McIlwraith, A., 2016. Information security and employee behaviour: how to reduce risk
through employee education, training and awareness. Routledge.
Olatunbosun, S.B., Edwards, N.J. and Martineau, C.D., 2018. Capturing the Existential Cyber
Security Threats from the Sub-Saharan Africa Zone through Literature Database.
Olatunbosun, S.B., Edwards, N.J. and Martineau, C.D., 2018. Capturing the Existential Cyber
Security Threats from the Sub-Saharan Africa Zone through Literature Database.
Pham, H.C., Brennan, L., Parker, L., Phan, T.N., Ulhaq, I., Nkhoma, M.Z. and Nguyen,
M.N., 2019. Enhancing cyber security behavior: an internal social marketing
approach. Information & Computer Security.
Rashid, T. and Chauhan, K., 2020. Cyber Security in the Public Sector: Awareness of
Potential Risks among Public Policy executives. Security Analytics for the Internet of
Everything, p.67.
1 out of 11
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.