University Cyber Security Report: ABC Technology and Threats

Verified

Added on  2022/11/17

|8
|1329
|480
Report
AI Summary
This report examines the importance of cyber security for ABC Technology, focusing on protecting confidential information and operational activities. It outlines the need for security measures such as cloud security, data loss prevention, and antivirus software to defend against threats like DOS attacks, malware, and snooping. The report identifies security vulnerabilities within ABC Technology's systems, details various emerging threats, their potential consequences, and the responsible parties behind such attacks. Furthermore, it provides recommendations for protecting office and home information from cyber attacks, including the implementation of encryption technology, employee training, and application firewalls. The report concludes by emphasizing the critical need for robust cyber security strategies to ensure the company's continued operational success and data integrity. The provided references support the analysis and recommendations.
Document Page
Running head: PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
Professional skills for Information and Communication
Name of the Student:
Name of the University:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
Executive summary
This report depicts the importance of using cyber security aspects in the ABC technology to
protect their confidential information and other operational and functional activities. In order to
protect the company from cyber criminals and cyber attacks like DOS, malware injection,
Spoofing, snooping etc the security measures those are needed to be adopted include cloud
security, data loss prevention, identify and access management, antivirus, anti malware etc. the
reasons for which cyber security is required in ABC technologies are elaborated in this report. In
addition to this, the security vulnerabilities, emerging threats that may interrupt their operations
are also elaborated in this paper.
Document Page
2PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
Table of Contents
Introduction..................................................................................................................................3
1. Explaining Cyber Security.......................................................................................................3
1.1 Description of Cyber Security...............................................................................................3
1.2 Importance of Cyber Security in ABC technologies.............................................................3
2. Identification and explanation of security vulnerabilities in ABCT’s system.............................3
3. Emerging threats in ABC technologies.......................................................................................4
3.1 Different types of emerging threats.......................................................................................4
3.2 The consequences/damage of the attack................................................................................4
3.3 Responsible person of the attack and their attack technique.................................................5
4. Recommendations to protect office information home from cyber attack..................................5
Conclusion.......................................................................................................................................5
Reference list...................................................................................................................................5
Document Page
3PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
Introduction
The recent evolution of computing networking is also increasing the rate of cyber
security challenges and issues. These challenges are again impacting the expected commercial
revenue and competitive advantages of the business organization (Garcia-Perez, Thurlbeck &
How, 2017). The company nominated which requires cyber security for this particular report is
ABC technology. The business line of the company ranges from various high technology based
products that include both the hardware and software products. Countrywide the company has
multiple numbers of offices and also two offices overseas.
The company offers their services through VPN. During business operation different
emerging threats that may interrupt security of the company and the possible negative impact of
these emerging threats are all illustrated in this report. The emerging technologies or technical
excellence that are widely using by different business organizations are cloud computing, big
data analysis, Artificial Intelligence (AI), Internet Of Things (IoT) etc. the definition of cyber
security importance of Cyber security in the ABC technology are elaborated in this report, It has
been determined that the company is facing major security challenged these days.
1. Explaining Cyber Security
1.1 Description of Cyber Security
1.2 Importance of Cyber Security in ABC technologies
2. Identification and explanation of security vulnerabilities in ABCT’s system
Denial of Service attack: Buffer-flow attack:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
Syn flood attack:
Phising cyber attack:
Snooping attack:
Justification of the answer
3. Emerging threats in ABC technologies
3.1 Different types of emerging threats
Bringing personal devices:
Lack of security in the network channel:
Use of cloud technology for string data:
Lack of security policy:
Absence of cryptography mechanism for protecting data: .
3.2 The consequences/damage of the attack
Damage data:
Misuse of information:
Failure to meet the expectation of the company:
Document Page
5PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
3.3 Responsible person of the attack and their attack technique
4. Recommendations to protect office information home from cyber attack
Implementation of encryption technology:
Implementation of on job technical training:
Implementation of application firewall:
Conclusion
Reference list
Atat, R., Liu, L., Chen, H., Wu, J., Li, H., & Yi, Y. (2017). Enabling cyber-physical
communication in 5g cellular networks: challenges, spatial spectrum sensing, and cyber-
security. IET Cyber-Physical Systems: Theory & Applications, 2(1), 49-54.
Di Sarno, C., Garofalo, A., Matteucci, I., & Vallini, M. (2016). A novel security information and
event management system for enhancing cyber security in a hydroelectric
dam. International Journal of Critical Infrastructure Protection, 13, 39-51.
Furfaro, A., Gallo, T., Garro, A., Saccà, D., & Tundis, A. (2016, May). Requirements
specification of a cloud service for cyber security compliance analysis. In 2016 2nd
International Conference on Cloud Computing Technologies and Applications
(CloudTech) (pp. 205-212). IEEE.
Document Page
6PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
Ganin, A. A., Quach, P., Panwar, M., Collier, Z. A., Keisler, J. M., Marchese, D., & Linkov, I.
(2017). Multicriteria decision framework for cybersecurity risk assessment and
management. Risk Analysis.
Garcia-Perez, A., Thurlbeck, M., & How, E. (2017). Towards cyber security readiness in the
Maritime industry: A knowledge-based approach.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI global.
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, 52-80.
PatéCornell, M. E., Kuypers, M., Smith, M., & Keller, P. (2018). Cyber risk management for
critical infrastructure: A risk analysis model and three case studies. Risk Analysis, 38(2),
226-241.
Ramachandran, M. (2016). Software security requirements management as an emerging cloud
computing service. International Journal of Information Management, 36(4), 580-590.
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy challenges in
industrial internet of things. In 2015 52nd ACM/EDAC/IEEE Design Automation
Conference (DAC) (pp. 1-6). IEEE.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model
in organizations. Computers & Security, 56, 70-82.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
Salah, K., Hammoud, M., & Zeadally, S. (2015). Teaching cybersecurity using the cloud. IEEE
Transactions on Learning Technologies, 8(4), 383-392.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more
holistic approach: A literature review. International Journal of Information
Management, 36(2), 215-225.
Toregas, C., Hoffman, L. J., & Heller, R. (2016, April). Exploring ways to give engineering
cyber security students a stronger policy and management perspective. In Spring 2016
Mid-Atlantic ASEE Conference.
Van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., & Kusev, P. (2017). Risk
perceptions of cyber-security and precautionary behaviour. Computers in Human
Behavior, 75, 547-559.
Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X., & Lu, C. (2015). A cloud computing
based system for cyber security management. International Journal of Parallel,
Emergent and Distributed Systems, 30(1), 29-45.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]