COIT20249: Cyber Security Report for ABCT - Analysis and Threats
VerifiedAdded on  2023/03/20
|13
|3526
|21
Report
AI Summary
This report provides a comprehensive analysis of cyber security concerns for the technology company ABCT, focusing on vulnerabilities within its system and potential threats. The report begins with an introduction to ABCT and the importance of cyber security, particularly given the company's BYOD (Bring Your Own Device) policy and cloud-based data storage. It identifies three key security vulnerabilities: public Wi-Fi networks, loss or theft of devices, and the disposal of mobile devices. The report then explores five emerging threats, including malware, phishing attacks, and insecure wireless networks. For each threat, the potential damage to ABCT is discussed. Finally, the report concludes with recommendations for protecting both home and office environments from cyber-attacks, aiming to improve the company's security posture and protect its data and customer trust.

Running head: CYBER SECURITY FOR ABCT
CYBER SECURITY FOR ABCT
Name of the Student
Name of the Organization
Author Note
CYBER SECURITY FOR ABCT
Name of the Student
Name of the Organization
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CYBER SECURITY FOR ABCT
Executive summary
The report mainly aims at identifying several kinds of vulnerabilities within the system of
ABCT or any kinds of emerging threats to security within the organization. First of all a small
introduction has been presented regarding the organization. After that a small explanation has
been made about cyber security and its high importance for the organization ABCT. Three
security vulnerabilities within the ABCT’s system have been both identified as well as explained.
After that some research has been done and 5types of threats which are seen to be emerging are
enlisted and discussion about the damage caused by the attack has also been mentioned. Al last,
some recommendations have been provided for protecting both the home as well as office from
any kinds of cyber-attacks.
Executive summary
The report mainly aims at identifying several kinds of vulnerabilities within the system of
ABCT or any kinds of emerging threats to security within the organization. First of all a small
introduction has been presented regarding the organization. After that a small explanation has
been made about cyber security and its high importance for the organization ABCT. Three
security vulnerabilities within the ABCT’s system have been both identified as well as explained.
After that some research has been done and 5types of threats which are seen to be emerging are
enlisted and discussion about the damage caused by the attack has also been mentioned. Al last,
some recommendations have been provided for protecting both the home as well as office from
any kinds of cyber-attacks.

2CYBER SECURITY FOR ABCT
Table of Contents
Introduction......................................................................................................................................3
Body.................................................................................................................................................3
Cyber security and importance....................................................................................................3
Three Security Vulnerabilities within the ABCT’s System.........................................................4
Emerging Threats which may affect ABCT................................................................................7
Conclusion.......................................................................................................................................9
Recommendations..........................................................................................................................10
References......................................................................................................................................12
Table of Contents
Introduction......................................................................................................................................3
Body.................................................................................................................................................3
Cyber security and importance....................................................................................................3
Three Security Vulnerabilities within the ABCT’s System.........................................................4
Emerging Threats which may affect ABCT................................................................................7
Conclusion.......................................................................................................................................9
Recommendations..........................................................................................................................10
References......................................................................................................................................12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CYBER SECURITY FOR ABCT
Introduction
ABCT is mainly a technology company within Australia and its main line of business is
seen to be ranging from several kinds of products related to high technology which will be
involving hardware and software. The company mostly allows their own employees for working
from their own homes by utilizing several links and also possess a policy of BYOD or Bring
Your Own Service for all the employees who will be working online. All the information
regarding both customers as well as products are totally stored in the cloud. The company has
been seen to have been victim of several kinds of cyber-attacks and there is a huge concern
regarding the fact that the data of the company may get highly compromised and all hackers may
get all kinds of information regarding all the customers. There is even a high chance that there
may be a huge loss of trust of all the loyal customers which may hugely result in a huge loss of
revenue. The company demands for the improvement of the security system as well as several
policies related to security. Hence, some tasks are to be performed in a step by step manner.
Three vulnerabilities are to be found related to security within the system of ABCT and five
different kinds of emerging threats are to be listed showing the huge damage which may be
caused by them. Even some of recommendations are also to be provided for the company at the
end showing the way to gain protection from both office as well as home from any kinds of
further cyber-attacks.
Introduction
ABCT is mainly a technology company within Australia and its main line of business is
seen to be ranging from several kinds of products related to high technology which will be
involving hardware and software. The company mostly allows their own employees for working
from their own homes by utilizing several links and also possess a policy of BYOD or Bring
Your Own Service for all the employees who will be working online. All the information
regarding both customers as well as products are totally stored in the cloud. The company has
been seen to have been victim of several kinds of cyber-attacks and there is a huge concern
regarding the fact that the data of the company may get highly compromised and all hackers may
get all kinds of information regarding all the customers. There is even a high chance that there
may be a huge loss of trust of all the loyal customers which may hugely result in a huge loss of
revenue. The company demands for the improvement of the security system as well as several
policies related to security. Hence, some tasks are to be performed in a step by step manner.
Three vulnerabilities are to be found related to security within the system of ABCT and five
different kinds of emerging threats are to be listed showing the huge damage which may be
caused by them. Even some of recommendations are also to be provided for the company at the
end showing the way to gain protection from both office as well as home from any kinds of
further cyber-attacks.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CYBER SECURITY FOR ABCT
Body
Cyber security and importance
Cyber security can be defined as the body of several kinds of technologies, procedures as
well as practices which are specially designed for protecting networks, programs, data or rather
any kinds of other devices from any kind of attack, huge damage or rather any kind of access
which is totally unauthorized. It can even be referred to as the security of information
technology.
The company ABCT comprises of about 10000 regular customers and all the employees
of the company are noticed to be working from their respective homes possessing the policy of
BYOD while working onsite. The main thing is that all the information of customers as well as
employees are totally stored upon the cloud. Cyber security is seen to be very much essential for
the security of the organization ABCT as the company has been seen to be a huge victim of
different kinds of all new cyber-attacks and there are high chances that the data of the company
may be highly compromised and all hackers may get hold of the information of all the loyal
customers. Thus, this will be resulting in a huge loss of the trust of all the customers of the
company and hence will be further resulting in a huge loss of revenue as well. This is the reason
behind the demand for the improvement of the system of security as well as all the policies
related to security of the organization. The very first step will be began by the preparation of the
document upon cyber security mainly for the purpose of training all the staffs of the company
especially on all the basics of cyber security.
Body
Cyber security and importance
Cyber security can be defined as the body of several kinds of technologies, procedures as
well as practices which are specially designed for protecting networks, programs, data or rather
any kinds of other devices from any kind of attack, huge damage or rather any kind of access
which is totally unauthorized. It can even be referred to as the security of information
technology.
The company ABCT comprises of about 10000 regular customers and all the employees
of the company are noticed to be working from their respective homes possessing the policy of
BYOD while working onsite. The main thing is that all the information of customers as well as
employees are totally stored upon the cloud. Cyber security is seen to be very much essential for
the security of the organization ABCT as the company has been seen to be a huge victim of
different kinds of all new cyber-attacks and there are high chances that the data of the company
may be highly compromised and all hackers may get hold of the information of all the loyal
customers. Thus, this will be resulting in a huge loss of the trust of all the customers of the
company and hence will be further resulting in a huge loss of revenue as well. This is the reason
behind the demand for the improvement of the system of security as well as all the policies
related to security of the organization. The very first step will be began by the preparation of the
document upon cyber security mainly for the purpose of training all the staffs of the company
especially on all the basics of cyber security.

5CYBER SECURITY FOR ABCT
Three Security Vulnerabilities within the ABCT’s System
It has to be remembered that innovation is actually a trait of human which has been
driving several advances in technology and all the engineers, scientists and some other
professionals are not only the ones who are possessing such capabilities. Both the hackers as well
as the developers of malware are also considered to be equally adept. In this case of the system
of ABCT, it has been noticed that the business has been working with the particular policy of
BYOD or more properly Bring Your Own Device policy. Such a policy of the business may
bring huge chances of some security vulnerabilities like the Wi-Fi networks which are public,
loss of device and theft and the disposal of mobile device.
Public Wi-Fi networks
There may be a high chance that all the employees who may be utilizing their own
devices of computing in all the nearby coffee shops or rather restaurants, several cyber criminals
may intent upon highly penetrating within the network and can even exploit hugely by directly
setting up several access points which may be totally fake (Wang, Wei & Vangury, 2014). All
the employees which are mostly wishing for using the Wi-Fi network which is public may
directly get connected to the fake wireless access points instead. People are seen to have been
often using similar passwords for several accounts and some of the employees may even get
directly linked to all the fake WAP with the similar password which they mostly utilize for
logging into the network which is totally corporate. Hackers can even access all the data which
are not protected at all via the wireless access points and can even highly infect or rather take
control of the devices of the employees. It is to be remembered that better are the prospects of all
the hackers to gain foothold into the network if more popular is the hole of watering with all the
employees.
Three Security Vulnerabilities within the ABCT’s System
It has to be remembered that innovation is actually a trait of human which has been
driving several advances in technology and all the engineers, scientists and some other
professionals are not only the ones who are possessing such capabilities. Both the hackers as well
as the developers of malware are also considered to be equally adept. In this case of the system
of ABCT, it has been noticed that the business has been working with the particular policy of
BYOD or more properly Bring Your Own Device policy. Such a policy of the business may
bring huge chances of some security vulnerabilities like the Wi-Fi networks which are public,
loss of device and theft and the disposal of mobile device.
Public Wi-Fi networks
There may be a high chance that all the employees who may be utilizing their own
devices of computing in all the nearby coffee shops or rather restaurants, several cyber criminals
may intent upon highly penetrating within the network and can even exploit hugely by directly
setting up several access points which may be totally fake (Wang, Wei & Vangury, 2014). All
the employees which are mostly wishing for using the Wi-Fi network which is public may
directly get connected to the fake wireless access points instead. People are seen to have been
often using similar passwords for several accounts and some of the employees may even get
directly linked to all the fake WAP with the similar password which they mostly utilize for
logging into the network which is totally corporate. Hackers can even access all the data which
are not protected at all via the wireless access points and can even highly infect or rather take
control of the devices of the employees. It is to be remembered that better are the prospects of all
the hackers to gain foothold into the network if more popular is the hole of watering with all the
employees.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6CYBER SECURITY FOR ABCT
Loss of device and theft
All the different devices which are totally personal of the employee are both brought as
well as utilized wherever they are seen to be going. Either an absent mind or rather any kind of
distraction may be causing the member of staff to even mistakenly leave the device behind in any
kinds of public place (Koh, Oh & Im, 2014). Even any employee may misplace their respective
keys as well as wallets in such a way and there will be not a single reason which it will not be
ever happening to any device possessing with all kinds of essential corporate data and several
credentials related to login. Some of the devices are even very much larger for carrying put like
that of laptops or rather tablets and are seen to be often left within a car which has been parked
while any employee is seen to be conducting personal business. Theft of car or rather any kind of
break-ins may be resulting in several stolen devices and hence this will be resulting in huge
stolen data.
Disposal of mobile device
Most of the drivers which are dumpster are seen to be not very much interested for
cashing in all on all the recyclables. Instead of that, they are seen to be after all the data which
are stored within all the computers which are tossed out, tablets, smartphones or rather laptops.
There may be even chances that even if the business of the ABCT Company is seen to be
properly disposing all the computers which are old, the same may not be at all true for all the
personal devices of the employees (Eslahi et al., 2014). The deletion of file is considered to be
not at all enough as the technology of the recovery of data possess with the capability of readily
extracting all the data which have been deleted. In fact, it may also be possible that data can be
retrieved from all the memory devices which are mostly damaged physically. All kinds of
Loss of device and theft
All the different devices which are totally personal of the employee are both brought as
well as utilized wherever they are seen to be going. Either an absent mind or rather any kind of
distraction may be causing the member of staff to even mistakenly leave the device behind in any
kinds of public place (Koh, Oh & Im, 2014). Even any employee may misplace their respective
keys as well as wallets in such a way and there will be not a single reason which it will not be
ever happening to any device possessing with all kinds of essential corporate data and several
credentials related to login. Some of the devices are even very much larger for carrying put like
that of laptops or rather tablets and are seen to be often left within a car which has been parked
while any employee is seen to be conducting personal business. Theft of car or rather any kind of
break-ins may be resulting in several stolen devices and hence this will be resulting in huge
stolen data.
Disposal of mobile device
Most of the drivers which are dumpster are seen to be not very much interested for
cashing in all on all the recyclables. Instead of that, they are seen to be after all the data which
are stored within all the computers which are tossed out, tablets, smartphones or rather laptops.
There may be even chances that even if the business of the ABCT Company is seen to be
properly disposing all the computers which are old, the same may not be at all true for all the
personal devices of the employees (Eslahi et al., 2014). The deletion of file is considered to be
not at all enough as the technology of the recovery of data possess with the capability of readily
extracting all the data which have been deleted. In fact, it may also be possible that data can be
retrieved from all the memory devices which are mostly damaged physically. All kinds of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CYBER SECURITY FOR ABCT
hackers which are seen to be mostly doing reconnaissance on the business may even check all
the dumpsters which are present nearby for all kinds of computing devices (Tokuyoshi, 2013).
Some other people may even sell data at several black markets to other people with the capability
of exploiting it. Finally, all those employees who will be failing to keep their own software of the
device as well as to keep the anti-virus up to date may get highly exposed to several malwares
and some other infections as well.
Emerging Threats which may affect ABCT
As it has been observed that the inception of the policy of BYOD within the organization
and also the access of the employees to a much more sophisticated as well as convenient
technology, it will be very much easier for any outsider to easily steal information or rather
obtain huge gain as per finance is considered (Downer & Bhattacharya, 2015). There are huge
chances of some emerging threats within the organization and they are as follows:
Malware
Since the year 2011, it has been observed that the number of families of the mobile
malware have incremented more than about 10times in between the year 2012 and 2014. This
mostly suggests that malware is still considered to be one of the most dangerous as well as
persistent threat to the information of the business organization (Ghosh, Gajar & Rai, 2013). In
the context of this company which possess with the BYOD policy, all the security vulnerabilities
which have been existing in the mobile devices of the employees may be hugely exploited by
several malware for stealing several information which are highly confidential, sabotage of
network and even deviation of all the financial transactions. Moreover, due to the inception of
BYOD, the company may even lose control upon all the mobile devices which actually means
hackers which are seen to be mostly doing reconnaissance on the business may even check all
the dumpsters which are present nearby for all kinds of computing devices (Tokuyoshi, 2013).
Some other people may even sell data at several black markets to other people with the capability
of exploiting it. Finally, all those employees who will be failing to keep their own software of the
device as well as to keep the anti-virus up to date may get highly exposed to several malwares
and some other infections as well.
Emerging Threats which may affect ABCT
As it has been observed that the inception of the policy of BYOD within the organization
and also the access of the employees to a much more sophisticated as well as convenient
technology, it will be very much easier for any outsider to easily steal information or rather
obtain huge gain as per finance is considered (Downer & Bhattacharya, 2015). There are huge
chances of some emerging threats within the organization and they are as follows:
Malware
Since the year 2011, it has been observed that the number of families of the mobile
malware have incremented more than about 10times in between the year 2012 and 2014. This
mostly suggests that malware is still considered to be one of the most dangerous as well as
persistent threat to the information of the business organization (Ghosh, Gajar & Rai, 2013). In
the context of this company which possess with the BYOD policy, all the security vulnerabilities
which have been existing in the mobile devices of the employees may be hugely exploited by
several malware for stealing several information which are highly confidential, sabotage of
network and even deviation of all the financial transactions. Moreover, due to the inception of
BYOD, the company may even lose control upon all the mobile devices which actually means

8CYBER SECURITY FOR ABCT
that all kinds of malware infections which are accidental may be totally undetected and hence
become very much difficult in investigating.
Phishing
Attackers are seen to be becoming very much creative and this is not only with all the
malware but also with the scam of phishing which is observed to be obtaining much more space
in the stage of cyber threat (French, Guo & Shim, 2014). An instance can be taken which says
that a phishing mail which is well constructed or any kind of SMS which is fraudulent may
evade several traditional security devices of the network for stealing several personal information
or rather obtain any kind of gain financially. Hence, a very little readiness for timely
investigating as well as responding to several incidents related to security is highly revealed
since the majority of the people of organization possessing poor awareness related to security
totally entrust upon the protection strategies of BYOD policy for the security of employees in
common sense.
Wireless Insecure Networks
The trend of BYOD of ABCT has been hugely encouraged by the accessibility of all the
employees for more and more advanced technology out of the office. This mostly involve
quicker home as well as public networks which are wireless with an unknown configuration of
security which are very much far beyond both the organizational scope of security as well as
forensics but very much closer to all the assets of information which are very much sensitive
which all the employees mostly access with the help of them (Astani, Ready & Tessema, 2013).
Hence, it can be stated that all the attacks which are intercepted can be launched with an ease
with the help of an insecure channels of communication wherever that are seen to be going
that all kinds of malware infections which are accidental may be totally undetected and hence
become very much difficult in investigating.
Phishing
Attackers are seen to be becoming very much creative and this is not only with all the
malware but also with the scam of phishing which is observed to be obtaining much more space
in the stage of cyber threat (French, Guo & Shim, 2014). An instance can be taken which says
that a phishing mail which is well constructed or any kind of SMS which is fraudulent may
evade several traditional security devices of the network for stealing several personal information
or rather obtain any kind of gain financially. Hence, a very little readiness for timely
investigating as well as responding to several incidents related to security is highly revealed
since the majority of the people of organization possessing poor awareness related to security
totally entrust upon the protection strategies of BYOD policy for the security of employees in
common sense.
Wireless Insecure Networks
The trend of BYOD of ABCT has been hugely encouraged by the accessibility of all the
employees for more and more advanced technology out of the office. This mostly involve
quicker home as well as public networks which are wireless with an unknown configuration of
security which are very much far beyond both the organizational scope of security as well as
forensics but very much closer to all the assets of information which are very much sensitive
which all the employees mostly access with the help of them (Astani, Ready & Tessema, 2013).
Hence, it can be stated that all the attacks which are intercepted can be launched with an ease
with the help of an insecure channels of communication wherever that are seen to be going
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9CYBER SECURITY FOR ABCT
without being detected as long as both the victim as well as the attacker are within the same
wireless range of signal.
Malicious applications of mobile
Regardless of the ownership of the device, it may happen that some of the employees
may install some applications which are either non-corporate or rather unauthorized for aiding all
of their activities of work daily or rather for personal socialization or entertainment (Shim et al.
2013). It can be seen as a consequence that all of such applications may directly introduce
several serious kinds of threats to all the information which are corporate as because some of
them may be seen to be utilized by some attackers for both collecting as well as disclosing
information which are highly sensitive once it has been observed to be installed upon the device.
It can also be said that all the mobile devices which are rooted may even provide with much
more privilege towards several applications which are malicious for the purpose of spam
dissemination and sending anonymous information of device to any kind of outsiders which are
totally unknown whose actions do not belong to the supervision of the business company.
Denial of Service attacks
It has been seen that DoS attacks are one of the threats which are overlooked sometimes
as current advances in the huge availability service disruption by utilizing several strategies of
backup as well as redundancy (Olalere et al., 2015). Although such attacks are recently being
utilized as a particular diversion for launching much more complex as well as sophisticated ones,
the paradigm of the policy of BYOD of the company may be facilitating them due to the number
of mobile devices which will be totally uncontrolled which mostly links all the networks which
are corporate. In fact, it can be said that more is the number of devices which are connected,
without being detected as long as both the victim as well as the attacker are within the same
wireless range of signal.
Malicious applications of mobile
Regardless of the ownership of the device, it may happen that some of the employees
may install some applications which are either non-corporate or rather unauthorized for aiding all
of their activities of work daily or rather for personal socialization or entertainment (Shim et al.
2013). It can be seen as a consequence that all of such applications may directly introduce
several serious kinds of threats to all the information which are corporate as because some of
them may be seen to be utilized by some attackers for both collecting as well as disclosing
information which are highly sensitive once it has been observed to be installed upon the device.
It can also be said that all the mobile devices which are rooted may even provide with much
more privilege towards several applications which are malicious for the purpose of spam
dissemination and sending anonymous information of device to any kind of outsiders which are
totally unknown whose actions do not belong to the supervision of the business company.
Denial of Service attacks
It has been seen that DoS attacks are one of the threats which are overlooked sometimes
as current advances in the huge availability service disruption by utilizing several strategies of
backup as well as redundancy (Olalere et al., 2015). Although such attacks are recently being
utilized as a particular diversion for launching much more complex as well as sophisticated ones,
the paradigm of the policy of BYOD of the company may be facilitating them due to the number
of mobile devices which will be totally uncontrolled which mostly links all the networks which
are corporate. In fact, it can be said that more is the number of devices which are connected,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10CYBER SECURITY FOR ABCT
more is the consumption of resource. Without an appropriate planning of the network
infrastructure, several attacks against all the essential sources of the evidence like databases may
remain undetected.
Conclusion
It can be concluded that there are chances of several vulnerabilities as well as threats
which may be affecting the company ABCT to a great extent. Several employees own their
individual tablets as well as smartphones for both purposes of working as well as for personal
utilization as well. This has been considered as the main innovation for the particular
organization in paying huge attention for bringing own device trend of the business which is
directly related to the utilization of several devices which are personal for the purposes of
business. This brings to the organization with it some opportunities as well as several risks
related to security as well. Due to the establishment of all the policies of BYOD, the organization
requires to avoid several risks related to security as well as increasing the productivity of the
employees as well to a great extent. However, all the security risks which are associated with the
policy of BYOD can be highly managed by the development of an effective policy of security
and also by adopting some of the technical control of security as well as several procedures.
Hence, it is very much important to detect all kinds of security threats as well as vulnerabilities
for the organization so that all the employees become aware of all such threats and can utilize
their devices in a proper way.
Recommendations
For all the mobile devices, it can be recommended that the company must consider
offering endpoint solution of security which must be featuring technology of app reputation
more is the consumption of resource. Without an appropriate planning of the network
infrastructure, several attacks against all the essential sources of the evidence like databases may
remain undetected.
Conclusion
It can be concluded that there are chances of several vulnerabilities as well as threats
which may be affecting the company ABCT to a great extent. Several employees own their
individual tablets as well as smartphones for both purposes of working as well as for personal
utilization as well. This has been considered as the main innovation for the particular
organization in paying huge attention for bringing own device trend of the business which is
directly related to the utilization of several devices which are personal for the purposes of
business. This brings to the organization with it some opportunities as well as several risks
related to security as well. Due to the establishment of all the policies of BYOD, the organization
requires to avoid several risks related to security as well as increasing the productivity of the
employees as well to a great extent. However, all the security risks which are associated with the
policy of BYOD can be highly managed by the development of an effective policy of security
and also by adopting some of the technical control of security as well as several procedures.
Hence, it is very much important to detect all kinds of security threats as well as vulnerabilities
for the organization so that all the employees become aware of all such threats and can utilize
their devices in a proper way.
Recommendations
For all the mobile devices, it can be recommended that the company must consider
offering endpoint solution of security which must be featuring technology of app reputation

11CYBER SECURITY FOR ABCT
which will be able to detect whether any kinds of apps are safer to use or not. For avoiding any
kinds of phishing attacks, the organization much make the education of the user a high priority.
Employees must be taught to detect all the phishing attacks and also briefed upon what can be
done in cases if they receive any kind of emails or messages which will be suspicious. It can also
be recommended that all the employees who are mainly enrolled in the policy of BYOD, must be
needed for utilizing several solutions related to security which will be possessing with the
capability of encrypting the data which is mainly contained within their respective devices. Full
encryption of disk will be ensuring that even is any device falls into some wrong hands, the data
which will be contained within will be totally unreadable to everyone except all those who will
be possessing with the access to all the tools of decryption.
which will be able to detect whether any kinds of apps are safer to use or not. For avoiding any
kinds of phishing attacks, the organization much make the education of the user a high priority.
Employees must be taught to detect all the phishing attacks and also briefed upon what can be
done in cases if they receive any kind of emails or messages which will be suspicious. It can also
be recommended that all the employees who are mainly enrolled in the policy of BYOD, must be
needed for utilizing several solutions related to security which will be possessing with the
capability of encrypting the data which is mainly contained within their respective devices. Full
encryption of disk will be ensuring that even is any device falls into some wrong hands, the data
which will be contained within will be totally unreadable to everyone except all those who will
be possessing with the access to all the tools of decryption.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




