Cyber Security Case Study: ICT40118 - Cyber Security Analysis

Verified

Added on  2022/11/16

|11
|1615
|387
Case Study
AI Summary
This case study examines two scenarios: information loss due to cyber attacks and the identification and assessment of emerging technologies. The first case study analyzes the risks associated with email spoofing and data breaches, proposing short-term and long-term controls to mitigate these threats. It highlights the importance of employee education and updated security systems. The second case study focuses on the impact of emerging technologies like robotics, drones, and AI in the oil and gas industry, evaluating their potential benefits and threats to organizational practices and security. The solution includes the identification of valuable assets, potential risks, cyber security threats, current and proposed controls, and the strategies for the implementation of new technologies.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBER SECURITY
Cyber Security
Name of Student
Name of University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
CYBER SECURITY
Table of Contents
Case Study 1: Dealing with cyber attacks...........................................................................2
Task 1...............................................................................................................................2
Task 2...............................................................................................................................2
Task 3...............................................................................................................................4
Task 4...............................................................................................................................5
Case Study 2: Identify & assess emerging technologies.....................................................6
Task 5...............................................................................................................................6
Task 6...............................................................................................................................7
Task 7...............................................................................................................................8
Task 8...............................................................................................................................8
Task 9...............................................................................................................................9
Bibliography......................................................................................................................10
Document Page
2
CYBER SECURITY
Assessment 2: Case Study
Case Study 1: Dealing with cyber attacks
Task 1
The scenarios discussed involves the cases of information loss and lack of effective data
protection. The valuable assets in both the scenarios that requires protection along with the use
and the risk to the asset is indicated in the table below-
Scenario Valuable Assets that
requires protection
Use an intruder
might have for the
asset
Risks to the asset
1 Soft copy of
confidential file and
information
Monetary gain, on
having an access to
the confidential
information asset
Risk of unauthorized
access
2 The personal and
private data of the
customers of the
international financial
service organization
along with their
merger plan
The access to the data
of the customers
proves to be a source
of blackmail for the
attackers
The loss of
customers’ data and
revelation of the
merger plan will
incur a huge financial
loss and reputation
loss for the company.
Task 2
Document Page
3
CYBER SECURITY
In both the scenarios, there are certain amount of cyber security threats that are present in
both the cases. The details of the present cyber security threats and current controls which are in
place are indicated in the table below-
Scenario Cyber Security Threats Current Controls
1 Replying to any email
without checking its
authenticity is linked with the
risk of email spoofing
There is no active control of
detecting and eliminating the
risk of email spoofing in the
organization or else, the issue
could have been avoided.
As per the control, a security
system is needed to be
installed that will filter the
spam email. Also, the
employees are needed to be
educated about the process in
which the spam emails can be
detected.
2 The second scenario indicates
presence of a ransomware in
the system along with the
threat of inaccurate data
protection.
The data confidentiality can
be maintained by encryption
of the stored data so that the
attackers does not get an
access to the stored personal
data and details of the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
CYBER SECURITY
customers.
Task 3
For each scenario, certain additional short term controls are needed to be in place for
protecting the valuable assets of the organization. The short term controls that should be made to
counter the immediate threats for both the scenarios are discussed in the following table-
Scenarios Short Term Control Responses to be made
1 Installation of spam filter in
emails and installation of an
information security software
to protect the stored data from
the immediate threats
A disaster recovery plan is to
be made that will help in
easier control of the similar
cases in future
2 The information security
system that is present within
the organization is needed to
be updated so that any type of
malware in the system is
easily detected and removed
from the system.
As an immediate response to
the present scenario, data
encryption is to be enforced
so that the confidential data
of the organization are
secured in an effective
manner. If the data are
encrypted, the attackers may
not have an access to the
same even if they launch an
Document Page
5
CYBER SECURITY
attack to the system.
Task 4
Along with the identified short term goals, certain long term goals are to be in place so
that the threats and the issues in the organization can be effectively eradicated. For each of the
mentioned scenario, the proposed long term goals that are to be adopted by the said organizations
are indicated in the table below-
Scenario Long Term Goal that are to be put in place
Scenario 1 The long term goal that can be proposed on
basis of this particular scenario is educating
the staffs and employees about the various
data security threats and training the
employees regarding the process in which
these data security threats such as email
spoofing can be identified and accordingly
addressed.
Scenario 2 Certain long term goals can be proposed to
address and eliminate this type of situations in
future.
As per the long term goal, the information
system installed in the organization are
needed to be updated in regular interval so
Document Page
6
CYBER SECURITY
that similar attacks can be easily detected.
Case Study 2: Identify & assess emerging technologies
Task 5
Technology 1 Technology 2 Technology 3
Name Robotics Drones AI
Purpose To reduce the human
workload and human
interaction
Can be used for
inspection of ground
and underwater
For digitizing oil and
gas pipelines,
refineries and
exploration sites.
Features The use of robots in
oil and gas sector
helps in reducing the
human workload by
automating the
human workforce and
reducing the time
required to complete
a particular work
The use of drones in
oil and gas industry
can reduce the risk by
effective monitoring
and maintenance
Automation in oil and
gas industry can
make the number of
operation in oil and
gas industry quite
cheaper as it will
significantly reduce
the human workload.
Attributes Each to use Easy to operate Cost effectiveness
Potential
Applications
Can replace the
human workload and
Drones can play a
significantly
The technique of
digitizing the oil and
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
CYBER SECURITY
enforce safety by
replacing humans in
accessing dangerous
and sensitive sites
important role in oil
and gas industry by
performing the works
of monitoring,
surveillance and
inspections for both
onshore and offshore
structures which
enables the
companies to detect
various signs of
problems and adverse
disasters in oil and
gas sector.
the gas pipelines
along with the
refineries can helps in
easier monitoring and
detection of the
problems thus saving
the operation costs.
Furthermore, the use
of AI can help the
organizations in
effective decision
making with accurate
data.
Task 6
The introduction of the previously discussed three technologies can significantly affect
the IT practices within the organization. The practices that will be affected by the introduction of
those emerging technologies are indicated in the following table-
Practice 1 Practice 2 Practice 3
Name User experience Security Training
Affected by which Robots Drones AI
Document Page
8
CYBER SECURITY
technology?
How affected? Human touch will be
absent in the works
that are performed by
robots, that might in
turn affect human
experience
The use of drones in
accessing the
different areas of the
site can increase the
security and the
privacy issues
The use of AI in oil
and gas sector will
require effectively
training the
employees for
handling the same.
Likely changes to
practice required
Significant reduction
to human workload
Significant reduction
to human workload
Proper training and
adoption to new
technology
Task 7
The introduction of new emerging technologies in oil and gas sector involves
introduction of new opportunities and threats that are needed to be addressed. The opportunity
that is associated with the introduction of new emerging technologies include reduction in the
production cost of oil although the initial investment of automation is high. However, the
machinery issues or privacy issues are major threats of the emerging technology. The identified
threats can be addressed by implementation of effective information system and training the
employees about the new process to be implemented and its use.
Task 8
The proposed technologies can have significant impact on the organizational practices.
The implementation of the proposed technology will bring a drastic change in the working
Document Page
9
CYBER SECURITY
process of oil and gas industries. This might be difficult for the existing employees to adopt to
new technology. This impact can be addressed by raining and educating the employees about
these technologies.
Task 9
The discussion in task 5 to task 8 encompasses the strategy of implementation of new
technologies in oil and gas industries. The strategy is to implement a planned approach of
implementation of these technology along with the need for educating the staffs and employees
about the new technologies and its usage.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
CYBER SECURITY
Bibliography
Khalil, M., Jan, B.M., Tong, C.W. and Berawi, M.A., 2017. Advanced nanomaterials in oil and
gas industry: design, application and challenges. Applied energy, 191, pp.287-310.
Rid, T. and Buchanan, B., 2015. Attributing cyber attacks. Journal of Strategic Studies, 38(1-2),
pp.4-37.
Shukla, A. and Karki, H., 2016. Application of robotics in offshore oil and gas industry—A
review Part II. Robotics and Autonomous Systems, 75, pp.508-524.
Walters, R., 2014. Cyber attacks on US companies in 2014. The Heritage Foundation, 4289,
pp.1-5.
Yampolskiy, M., Horváth, P., Koutsoukos, X.D., Xue, Y. and Sztipanovits, J., 2015. A language
for describing attacks on cyber-physical systems. International Journal of Critical Infrastructure
Protection, 8, pp.40-52.
Yusuf, Y.Y., Gunasekaran, A., Musa, A., Dauda, M., El-Berishy, N.M. and Cang, S., 2014. A
relational study of supply chain agility, competitiveness and business performance in the oil and
gas industry. International Journal of Production Economics, 147, pp.531-543.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]