Cyber Security Threats and Recommendations for ABCT
VerifiedAdded on 2022/11/13
|16
|3711
|141
Report
AI Summary
This report examines the importance of cyber security within the ABCT organization, an Australian-based company dealing with hardware and software products. It outlines the need for robust cyber security measures to protect against increasing cybercrimes and vulnerabilities. The report identifies key security vulnerabilities, including cloud vulnerabilities, ransomware attacks, and threats related to the Internet of Things (IoT). It also discusses emerging threats such as cryptojacking, sophisticated phishing attacks, and evolving ransomware strategies. The analysis emphasizes the importance of confidentiality, integrity, and availability in maintaining data security. Finally, the report provides several recommendations, such as implementing security guidelines, restricting access to confidential data, and avoiding the use of personal devices within the organization, to enhance ABCT's cyber security posture and protect against data breaches and other cyber threats.

Running head: IMPORTANCE OF CYBER SECURITY
IMPORTANCE OF CYBER SECURITY
Name of the Student
Name of the University
Author Note
IMPORTANCE OF CYBER SECURITY
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1IMPORTANCE OF CYBER SECURITY
Executive summary
The report aims at describing the important features offered with implementing effective cyber
security strategy. Cyber security is referred to the concept of protecting computer systems from
theft or damages. This helps in protecting the system from further malware attacks and insures
that hardware software and electronic data are being maintained efficiently. It is important for
every organization to implement proper cyber security plan so that they can protect their data
from for the theft.
In this report the main focus is on the ABCT organization that is facing challenges with their
norms and policies. The report will outline the major behaviour possessed by the organization
and the benefits that are offered to watch their employees so that it becomes easy to understand
the types of vulnerabilities that are going to impact the organization.
Growing technology has made it easy for the attackers to get into a system for the purpose of
breaching a data. Thus it becomes a essential to ensure that proper strategy related to cyber
security is being implemented within the organization so that they can perform their activities
efficiently.
The report will clearly identified the traits and the necessary security measures within the ABCT
organization. In addition to raise the report will provide some recommendations that can help in
enhancing the performance of the organization. The possible recommendations for the
organization are as follows:
Implementing proper security guidelines within the organization
Restricting users from getting access over confidential data
Avoiding bringing own device within the organization
Executive summary
The report aims at describing the important features offered with implementing effective cyber
security strategy. Cyber security is referred to the concept of protecting computer systems from
theft or damages. This helps in protecting the system from further malware attacks and insures
that hardware software and electronic data are being maintained efficiently. It is important for
every organization to implement proper cyber security plan so that they can protect their data
from for the theft.
In this report the main focus is on the ABCT organization that is facing challenges with their
norms and policies. The report will outline the major behaviour possessed by the organization
and the benefits that are offered to watch their employees so that it becomes easy to understand
the types of vulnerabilities that are going to impact the organization.
Growing technology has made it easy for the attackers to get into a system for the purpose of
breaching a data. Thus it becomes a essential to ensure that proper strategy related to cyber
security is being implemented within the organization so that they can perform their activities
efficiently.
The report will clearly identified the traits and the necessary security measures within the ABCT
organization. In addition to raise the report will provide some recommendations that can help in
enhancing the performance of the organization. The possible recommendations for the
organization are as follows:
Implementing proper security guidelines within the organization
Restricting users from getting access over confidential data
Avoiding bringing own device within the organization

2IMPORTANCE OF CYBER SECURITY
Table of Contents
1.0 Introduction................................................................................................................................3
2.0 Importance of cyber security.....................................................................................................4
2.1 Cyber security and importance for ABCT.............................................................................5
2.2 Security vulnerabilities within the ABCT’s system..............................................................6
3.0 Emerging threats associated with cyber security.......................................................................7
4.0 Conclusion.................................................................................................................................9
5.0 Recommendation.....................................................................................................................10
6.0 References................................................................................................................................12
Table of Contents
1.0 Introduction................................................................................................................................3
2.0 Importance of cyber security.....................................................................................................4
2.1 Cyber security and importance for ABCT.............................................................................5
2.2 Security vulnerabilities within the ABCT’s system..............................................................6
3.0 Emerging threats associated with cyber security.......................................................................7
4.0 Conclusion.................................................................................................................................9
5.0 Recommendation.....................................................................................................................10
6.0 References................................................................................................................................12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3IMPORTANCE OF CYBER SECURITY
1.0 Introduction
The concept of cyber security is related to providing better security towards the computer
systems within an organization or in house. It becomes essential to ensure that this system is free
from threats and all the data stores within the system are protected. Howeverr it has been
observed that with the increase in technology number of cybercrime are also increasing. Thus it
becomes essential to implement proper security within the organization.
ABCT organization is basically an Australian-based organization that focuses on lining of the
products associated with hardware and software. The head office of the organization is Canberra
that is responsible for providing LAN connection towards the other branches. The organization
offers employees with maximum flexibility and ensures it that they can carry their device is it to
wherever they are working. In addition to this the organization ensures that all data are being
stored within the cloud so that they can get easy backups in case of disasters.
The main object is of this report is to describe the concept of cyber security within the ABCT
organization. It is important for every organization to focus on the implementation of cyber
security strategy so that they can ensure better protection towards the data stored within the
system.Cyber security plays a crucial role within an organization as it increases the security
measures and helps in protecting the organization from serious attacks. This also outlines the
possible vulnerabilities within the organization by determining the characteristics possessed by
the system and their employees. Thus implementing and effective cyber security plan will ensure
that the organization is protected from hackers, malware and viruses.
1.0 Introduction
The concept of cyber security is related to providing better security towards the computer
systems within an organization or in house. It becomes essential to ensure that this system is free
from threats and all the data stores within the system are protected. Howeverr it has been
observed that with the increase in technology number of cybercrime are also increasing. Thus it
becomes essential to implement proper security within the organization.
ABCT organization is basically an Australian-based organization that focuses on lining of the
products associated with hardware and software. The head office of the organization is Canberra
that is responsible for providing LAN connection towards the other branches. The organization
offers employees with maximum flexibility and ensures it that they can carry their device is it to
wherever they are working. In addition to this the organization ensures that all data are being
stored within the cloud so that they can get easy backups in case of disasters.
The main object is of this report is to describe the concept of cyber security within the ABCT
organization. It is important for every organization to focus on the implementation of cyber
security strategy so that they can ensure better protection towards the data stored within the
system.Cyber security plays a crucial role within an organization as it increases the security
measures and helps in protecting the organization from serious attacks. This also outlines the
possible vulnerabilities within the organization by determining the characteristics possessed by
the system and their employees. Thus implementing and effective cyber security plan will ensure
that the organization is protected from hackers, malware and viruses.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4IMPORTANCE OF CYBER SECURITY
2.0 Importance of cyber security
In 1820 the first cyber crime was it recorded and in the year 1978 the 1st to spam email to place
that was sent over the Arpanet.On the other hand the first dividers was installed on an Apple
computer in the year 1982. Thus from the history it can be stated that cyber crimes has huge
impact on the people from early stages. The me the cybercrime includes illegal access over the
data, illegal into submission, fraud, Misuse of devices, Data interfaces and system interference,
the main reason behind focusing on cybercrime is that it is mainly committed on Internet and
computer are considered as it tool or a target. The major advantages that are offered with
implementing proper cyber security are that a difference the system from hackers and viruses,
the application helps in updating the system in every week so that they can fight against the
possible risks. In order to maintain security it becomes essential to use antivirus software is that
will protect the data from further attacks (Alotaibi et al., 2016). Uninstalling the unnecessary
software from the system will also reduce the chances of attacks. In addition to this the
organization should always focus on maintaining a back up so that they can have it and every
data updated within the system and can access them whenever a data loss or cause within the
system.
Cyber security focuses on enhancing the performance of the organization by ensuring that each
data stored within the system are protected from hackers. Any content that relies on Internet for
the purpose of communicating with other devices it has the chances to get effected by a security
breach. Thus it becomes essential to ensure that proper cyber security is being implemented
within the organization so that it can be protected from further impacts. Cyber security is mainly
developed based on three major principles (Min, Chai & Han, 2015). This includes
confidentiality, availability and integrity. Confidentiality ensures that the sensitive information
2.0 Importance of cyber security
In 1820 the first cyber crime was it recorded and in the year 1978 the 1st to spam email to place
that was sent over the Arpanet.On the other hand the first dividers was installed on an Apple
computer in the year 1982. Thus from the history it can be stated that cyber crimes has huge
impact on the people from early stages. The me the cybercrime includes illegal access over the
data, illegal into submission, fraud, Misuse of devices, Data interfaces and system interference,
the main reason behind focusing on cybercrime is that it is mainly committed on Internet and
computer are considered as it tool or a target. The major advantages that are offered with
implementing proper cyber security are that a difference the system from hackers and viruses,
the application helps in updating the system in every week so that they can fight against the
possible risks. In order to maintain security it becomes essential to use antivirus software is that
will protect the data from further attacks (Alotaibi et al., 2016). Uninstalling the unnecessary
software from the system will also reduce the chances of attacks. In addition to this the
organization should always focus on maintaining a back up so that they can have it and every
data updated within the system and can access them whenever a data loss or cause within the
system.
Cyber security focuses on enhancing the performance of the organization by ensuring that each
data stored within the system are protected from hackers. Any content that relies on Internet for
the purpose of communicating with other devices it has the chances to get effected by a security
breach. Thus it becomes essential to ensure that proper cyber security is being implemented
within the organization so that it can be protected from further impacts. Cyber security is mainly
developed based on three major principles (Min, Chai & Han, 2015). This includes
confidentiality, availability and integrity. Confidentiality ensures that the sensitive information

5IMPORTANCE OF CYBER SECURITY
that are stored within the organization are maintained with proper security and safety. This also
ensures that only limited person will get the access over this confidential data (Bada, Sasse &
Nurse, 2019). Integrity includes keeping information within the system so that no one is can
enter into the data. This prevents the system from further attacks and helps in maintaining proper
integrity throughout the data. Availability ensures that all the necessary data are being made
visible to words the intended user. This protects the system from unauthorised access and
ensures that all data are maintained with highest security. The major traits that are faced by the
organization nowadays are associated with data leak, Ransom where attack, and data breaches.
This data needs to be highly protected so that they cannot be accessed by an unauthorised a
group of people. The approach is that are used for cyber security are computational and artificial
intelligence, Internet of things, social implications of technology, information security and big
data analysis. These approaches will help in maintaining proper cyber security within the
organization.
2.1 Cyber security and importance for ABCT
Cyber security practices protect all system from cyber attacks and hence it becomes an effective
way to read use the risk associated with cyber attacks. This becomes a essential to implement
proper cyber security so that data can be maintained effectively without any error. The ABCT
organization offers different types of high-tech product towards their customer for the purpose of
providing better security towards the hardware and software components. The organization she is
a land connection for the purpose of connecting all the devices within the organization and other
branches of the organization. The main reason behind implementing proper cyber security within
the organization is that there is a high chance that the system in getting attacked through the
internet. It is often observed that LAN connections are vulnerable to cyber attacks. Hence it
that are stored within the organization are maintained with proper security and safety. This also
ensures that only limited person will get the access over this confidential data (Bada, Sasse &
Nurse, 2019). Integrity includes keeping information within the system so that no one is can
enter into the data. This prevents the system from further attacks and helps in maintaining proper
integrity throughout the data. Availability ensures that all the necessary data are being made
visible to words the intended user. This protects the system from unauthorised access and
ensures that all data are maintained with highest security. The major traits that are faced by the
organization nowadays are associated with data leak, Ransom where attack, and data breaches.
This data needs to be highly protected so that they cannot be accessed by an unauthorised a
group of people. The approach is that are used for cyber security are computational and artificial
intelligence, Internet of things, social implications of technology, information security and big
data analysis. These approaches will help in maintaining proper cyber security within the
organization.
2.1 Cyber security and importance for ABCT
Cyber security practices protect all system from cyber attacks and hence it becomes an effective
way to read use the risk associated with cyber attacks. This becomes a essential to implement
proper cyber security so that data can be maintained effectively without any error. The ABCT
organization offers different types of high-tech product towards their customer for the purpose of
providing better security towards the hardware and software components. The organization she is
a land connection for the purpose of connecting all the devices within the organization and other
branches of the organization. The main reason behind implementing proper cyber security within
the organization is that there is a high chance that the system in getting attacked through the
internet. It is often observed that LAN connections are vulnerable to cyber attacks. Hence it
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6IMPORTANCE OF CYBER SECURITY
becomes a essential to implement proper measures that will protect the system from further
impacts. The approach is that can be used for the purpose of enhancing cyber security within the
ABCT organization our Internet of things, computational and artificial intelligence and ensuring
proper information security. This method will ensure a better progress to words the organization
and will enhance the performance of each system.
2.2 Security vulnerabilities within the ABCT’s system
There are several vulnerabilities identified within the organization that are needed to be
mitigated urgently. This concept of cyber security needs to be understood by every employee
within the organization so that they can work effectively in order to achieve the target set by the
organization (Palmieri et al., 2015). Proper measures will ensure that the organization and not
facing any serious damages. Thus it becomes essential to ensure proper security measures within
the organization. The security vulnerabilities that are identified within the system are as follows:
Cloud vulnerabilities: as the organization ABCT aims as storing their crucial data on the
cloud platform it becomes easy for the attacker to get over the data. With the increase in
use of cloud storage the cyber attacks has also increased hugely over the past few years.
Cloud services become more vulnerable to a wide range of cyber attackers and hackers.
This makes the data easily available towards the attackers and they can breach the data
from the cloud servers. This incident mainly includes hijacking the account and
performing denial of service attack (Chandrashekhar et al., 2016). As soon as the system
is being attacked with the denial of service attack then the users are being prevented from
accessing their own data stored within the system. However it becomes difficult to
manage the security concept of it in the cloud server. The organization uses cloud
security technology. Thus it becomes essential for every organization to implement
becomes a essential to implement proper measures that will protect the system from further
impacts. The approach is that can be used for the purpose of enhancing cyber security within the
ABCT organization our Internet of things, computational and artificial intelligence and ensuring
proper information security. This method will ensure a better progress to words the organization
and will enhance the performance of each system.
2.2 Security vulnerabilities within the ABCT’s system
There are several vulnerabilities identified within the organization that are needed to be
mitigated urgently. This concept of cyber security needs to be understood by every employee
within the organization so that they can work effectively in order to achieve the target set by the
organization (Palmieri et al., 2015). Proper measures will ensure that the organization and not
facing any serious damages. Thus it becomes essential to ensure proper security measures within
the organization. The security vulnerabilities that are identified within the system are as follows:
Cloud vulnerabilities: as the organization ABCT aims as storing their crucial data on the
cloud platform it becomes easy for the attacker to get over the data. With the increase in
use of cloud storage the cyber attacks has also increased hugely over the past few years.
Cloud services become more vulnerable to a wide range of cyber attackers and hackers.
This makes the data easily available towards the attackers and they can breach the data
from the cloud servers. This incident mainly includes hijacking the account and
performing denial of service attack (Chandrashekhar et al., 2016). As soon as the system
is being attacked with the denial of service attack then the users are being prevented from
accessing their own data stored within the system. However it becomes difficult to
manage the security concept of it in the cloud server. The organization uses cloud
security technology. Thus it becomes essential for every organization to implement
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7IMPORTANCE OF CYBER SECURITY
proper technology that will prevent the attackers from getting access over the cloud
storage.
Ransomware attack: These are one of the serious cyber threats that can be caused it
towards an organization. In this situation the attackers infected network by holding the
data stored within the system and computer until a fixed amount of ransom is paid
towards them. The organization needs to pay the amount of it and ransom mentioned by
them within the given time. These types of attacks are destructive and cause huge data
loss. As the organization ABCT is associated with LAN connection the chances of
Ransomware attack increases within the organization. Thus it becomes essential o ensure
that proper cyber security measure is implemented within the organization for enhancing
the performance.
Internet of things: Internet of things to connect all the devices throughout the world for
the purpose of sharing data. This makes the organization mood vulnerable to what are the
attacks. With the enhancement of this technology it has been observed that attackers can
get easy access over the confidential data with minimal effort‘s. As the devices are linked
to Internet this becomes easy to exploit the data. Thus there is a high need to increase the
devices security so that they can provide better benefits towards the organization.
3.0 Emerging threats associated with cyber security
With the growing technology it has been observed that the type of cyber threats has also
developed. Hence it becomes essential to make the cyber security much more stronger. The
cyber security poses as the Ability of a disrupting and distorting the performance of an
organization. By getting the access over all the data it becomes easy for the organization to
proper technology that will prevent the attackers from getting access over the cloud
storage.
Ransomware attack: These are one of the serious cyber threats that can be caused it
towards an organization. In this situation the attackers infected network by holding the
data stored within the system and computer until a fixed amount of ransom is paid
towards them. The organization needs to pay the amount of it and ransom mentioned by
them within the given time. These types of attacks are destructive and cause huge data
loss. As the organization ABCT is associated with LAN connection the chances of
Ransomware attack increases within the organization. Thus it becomes essential o ensure
that proper cyber security measure is implemented within the organization for enhancing
the performance.
Internet of things: Internet of things to connect all the devices throughout the world for
the purpose of sharing data. This makes the organization mood vulnerable to what are the
attacks. With the enhancement of this technology it has been observed that attackers can
get easy access over the confidential data with minimal effort‘s. As the devices are linked
to Internet this becomes easy to exploit the data. Thus there is a high need to increase the
devices security so that they can provide better benefits towards the organization.
3.0 Emerging threats associated with cyber security
With the growing technology it has been observed that the type of cyber threats has also
developed. Hence it becomes essential to make the cyber security much more stronger. The
cyber security poses as the Ability of a disrupting and distorting the performance of an
organization. By getting the access over all the data it becomes easy for the organization to

8IMPORTANCE OF CYBER SECURITY
hamper the performance of the organization (Conteh & Schmick, 2016). The emerging cyber
security states that are being identified in over recent years includes phishing gets more
sophisticated, the ransomware strategies has evolved hugely, Crypto jacking, cyber physical
attacks, IOT attacks and third parties involvement attacks. However in this part of the report the
main focus will be on describing the impact that are associated with crypto jacking, ransomware
strategies evolution, phishing, cyber physical attacks, attacks performed on connected cars.
Cryptojacking: this is referred to one of the crucial traits that have the potential to impact
the organization performance. The crypto currency movements get impacted with the
fracture of cyber security. In this attack the attacker tends to involve cyber criminals
hijacking by impacting the walking computers of the organization. This helps the hackers
to gain money secretly by using someone’s else system (Almeshekah & Spafford, 2016).
Cryptojacked can cause huge damages to watch the performance of an organization and
also leads to costly down times for IT department within the organization.
Cyber physical attacks: A cyber physical attack includes the technology that helps in
enabling modernize and computerize critical infrastructures. Death rate tends to hack the
targeting electrical grid and impacted the overall performance of an organization.
According to several reports it has been observed that the military system has also
possesses high risk from the cyber attack.
Connected cars: With the effective technology of IOT it has been observed that the
driverless car concept has become one of the emerging trends. However it is observed
that this technology has invited several attackers (Xia et al., 2018). Cyber attacks has
became more vulnerable towards the connected cars. Connected car tends to hold a
sensor that optimizes all the data of passengers and share the traffic location so that
hamper the performance of the organization (Conteh & Schmick, 2016). The emerging cyber
security states that are being identified in over recent years includes phishing gets more
sophisticated, the ransomware strategies has evolved hugely, Crypto jacking, cyber physical
attacks, IOT attacks and third parties involvement attacks. However in this part of the report the
main focus will be on describing the impact that are associated with crypto jacking, ransomware
strategies evolution, phishing, cyber physical attacks, attacks performed on connected cars.
Cryptojacking: this is referred to one of the crucial traits that have the potential to impact
the organization performance. The crypto currency movements get impacted with the
fracture of cyber security. In this attack the attacker tends to involve cyber criminals
hijacking by impacting the walking computers of the organization. This helps the hackers
to gain money secretly by using someone’s else system (Almeshekah & Spafford, 2016).
Cryptojacked can cause huge damages to watch the performance of an organization and
also leads to costly down times for IT department within the organization.
Cyber physical attacks: A cyber physical attack includes the technology that helps in
enabling modernize and computerize critical infrastructures. Death rate tends to hack the
targeting electrical grid and impacted the overall performance of an organization.
According to several reports it has been observed that the military system has also
possesses high risk from the cyber attack.
Connected cars: With the effective technology of IOT it has been observed that the
driverless car concept has become one of the emerging trends. However it is observed
that this technology has invited several attackers (Xia et al., 2018). Cyber attacks has
became more vulnerable towards the connected cars. Connected car tends to hold a
sensor that optimizes all the data of passengers and share the traffic location so that
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9IMPORTANCE OF CYBER SECURITY
movement of each car around the city can be determined easily. This provides the
attackers with the details of victim card and hence it becomes easy to harm them. Hence
the users gets more vulnerable towards the cyber attacks.
Phishing activity has become more sophisticated: phishing Attacks are basically
performed by the hackers who want to steal sensitive data from an organization or from
an individual. The main target of attackers it in search activity add digital messages that
are transmitted using some sort of tools. It is observed that in order to achieve the data
and crucial information regarding to an individual or organization email fishing are done
so that the user can get directed towards the link provided in the email. As soon as the
data is being captured the system gets disrupted. This has the potential to hamper the
overall functionality of the organization and can cause huge threat.
Ransomware strategy evolution: ransomware attacks are believed to one of the most
dangerous attacks as it impacts not only on the sensitive data of the users but also tends to
impacted him financially. This has been observed that organization has developed
different defense technology for protecting organizations from cyber attacks.
4.0 Conclusion
From the above report hence it can be concluded that there is a high need to understand the
importance of cyber security with an organization. Cyber security is one of the main important
part of every web based organization and hence it becomes a essential to ensure that each data
stored within the organization are being protected from further threats. In the above report it has
been identified that with the proper implementation of cyber security knowledge within the
organization which will become easy to manage the cyber security threats. In the report it has
movement of each car around the city can be determined easily. This provides the
attackers with the details of victim card and hence it becomes easy to harm them. Hence
the users gets more vulnerable towards the cyber attacks.
Phishing activity has become more sophisticated: phishing Attacks are basically
performed by the hackers who want to steal sensitive data from an organization or from
an individual. The main target of attackers it in search activity add digital messages that
are transmitted using some sort of tools. It is observed that in order to achieve the data
and crucial information regarding to an individual or organization email fishing are done
so that the user can get directed towards the link provided in the email. As soon as the
data is being captured the system gets disrupted. This has the potential to hamper the
overall functionality of the organization and can cause huge threat.
Ransomware strategy evolution: ransomware attacks are believed to one of the most
dangerous attacks as it impacts not only on the sensitive data of the users but also tends to
impacted him financially. This has been observed that organization has developed
different defense technology for protecting organizations from cyber attacks.
4.0 Conclusion
From the above report hence it can be concluded that there is a high need to understand the
importance of cyber security with an organization. Cyber security is one of the main important
part of every web based organization and hence it becomes a essential to ensure that each data
stored within the organization are being protected from further threats. In the above report it has
been identified that with the proper implementation of cyber security knowledge within the
organization which will become easy to manage the cyber security threats. In the report it has
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10IMPORTANCE OF CYBER SECURITY
been described that threats associated with cyber security has increased immensely over years
and hence it becomes essential to implement proper measures that will protect the organization
(Azmi, Tibben & Win, 2016). The major finding of the report is that the threats have become
more powerful over ears. Hence the protection technology also needs to be enhanced so that it
can overcome the recent issues. The report has identified the emerging threats in cyber security
and the attacks that are likely to be faced by the ABCT organization. The report has also outline
the main reason behind implementing proper cyber security within the organization. Before
implementing cyber security it becomes essential to identify the importance that will be come
along with the proper implementation. However it can be stated that effective implementation of
cyber security will automatically enhance the performance of ABCT organization.
5.0 Recommendation
Based on the findings of the report it can be stated that there are high needed to implement
proper measures that will protect the organization from cyber security threats the possible
recommendations that will help in protecting the organization from possible cyber security
threats are as follows:
Implementing proper malware within the system of the organization
Introducing ffirewall within the systems
In this task about the importance of cyber security
Implementing proper cyber security guidelines within the organization
Identifying the trades at a early stages
Monitoring each and every activities of the employees
been described that threats associated with cyber security has increased immensely over years
and hence it becomes essential to implement proper measures that will protect the organization
(Azmi, Tibben & Win, 2016). The major finding of the report is that the threats have become
more powerful over ears. Hence the protection technology also needs to be enhanced so that it
can overcome the recent issues. The report has identified the emerging threats in cyber security
and the attacks that are likely to be faced by the ABCT organization. The report has also outline
the main reason behind implementing proper cyber security within the organization. Before
implementing cyber security it becomes essential to identify the importance that will be come
along with the proper implementation. However it can be stated that effective implementation of
cyber security will automatically enhance the performance of ABCT organization.
5.0 Recommendation
Based on the findings of the report it can be stated that there are high needed to implement
proper measures that will protect the organization from cyber security threats the possible
recommendations that will help in protecting the organization from possible cyber security
threats are as follows:
Implementing proper malware within the system of the organization
Introducing ffirewall within the systems
In this task about the importance of cyber security
Implementing proper cyber security guidelines within the organization
Identifying the trades at a early stages
Monitoring each and every activities of the employees

11IMPORTANCE OF CYBER SECURITY
Using two factor authentication for the purpose of ensuring better confidentiality
throughout the system of the organization
Conducting frequent audits for taking the performance of the system
Ensuring a strong way of signing of policy that will ensure proper protection towards the
data
Protecting the confidential data by using encryption method
Risk assessment needs to be done by the organization for protecting the company against
possible threats
In forcing proper cyber Security act for protecting the system from for the cybercrime
Having deep knowledge about the risk factors
Educating each and every employee of the organization becomes an essential factor as it
helps in forcing better you lots sweetie in the organization.
Using two factor authentication for the purpose of ensuring better confidentiality
throughout the system of the organization
Conducting frequent audits for taking the performance of the system
Ensuring a strong way of signing of policy that will ensure proper protection towards the
data
Protecting the confidential data by using encryption method
Risk assessment needs to be done by the organization for protecting the company against
possible threats
In forcing proper cyber Security act for protecting the system from for the cybercrime
Having deep knowledge about the risk factors
Educating each and every employee of the organization becomes an essential factor as it
helps in forcing better you lots sweetie in the organization.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 16
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.