CSI6199: Cybersecurity and System Enhancement Report
VerifiedAdded on 2025/05/02
|21
|2721
|162
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

CSI6199
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Introduction......................................................................................................................................3
Issues identified in the Organization...............................................................................................4
Reasons behind selecting these issues.............................................................................................5
Solutions to the above identified issues...........................................................................................8
Why chosen solutions are better than the alternatives...................................................................10
Detailed description of cost involved............................................................................................13
List of figures
Figure 1 issues identified.................................................................................................................4
Figure 2 reasons for selecting the issues..........................................................................................7
Figure 3 Avira antivirus software....................................................................................................9
Figure 4 TalentLMS Software.......................................................................................................10
Figure 5 Axcrypt software.............................................................................................................11
Figure 6 Microsoft azure active directory.....................................................................................12
Figure 7 Iolo system mechanic......................................................................................................13
Figure 8 comparison between antivirus software..........................................................................14
Figure 9 learning platform comparison.........................................................................................15
Figure 10 Cost calculation.............................................................................................................16
Introduction......................................................................................................................................3
Issues identified in the Organization...............................................................................................4
Reasons behind selecting these issues.............................................................................................5
Solutions to the above identified issues...........................................................................................8
Why chosen solutions are better than the alternatives...................................................................10
Detailed description of cost involved............................................................................................13
List of figures
Figure 1 issues identified.................................................................................................................4
Figure 2 reasons for selecting the issues..........................................................................................7
Figure 3 Avira antivirus software....................................................................................................9
Figure 4 TalentLMS Software.......................................................................................................10
Figure 5 Axcrypt software.............................................................................................................11
Figure 6 Microsoft azure active directory.....................................................................................12
Figure 7 Iolo system mechanic......................................................................................................13
Figure 8 comparison between antivirus software..........................................................................14
Figure 9 learning platform comparison.........................................................................................15
Figure 10 Cost calculation.............................................................................................................16

Introduction
The report focuses on to find out the problems found in JL, in work operations, system security,
etc. the aim is to address the most important issue that the company is facing. The issues have to
be addressed as the most important one and the reason for which needs to be identified. For the
selected issues the goal is to find out the possible solutions. The solution should be the best
alternative and the solutions need to be compared. The cost has to be calculated for
implementing the solutions mentioned.
The report focuses on to find out the problems found in JL, in work operations, system security,
etc. the aim is to address the most important issue that the company is facing. The issues have to
be addressed as the most important one and the reason for which needs to be identified. For the
selected issues the goal is to find out the possible solutions. The solution should be the best
alternative and the solutions need to be compared. The cost has to be calculated for
implementing the solutions mentioned.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Issues identified in the Organization
S.no. Issue Description
1 Lack of security The systems used in JL don’t have any security
software. There is no system to filter out spam
messages. JL has also experienced ransomware
attacks in the past. The devices are not free from
attacks and cannot detect malicious activities.
2 Lack of staff expertise The staffs possess a lack of technical expertise
and unable to detect the security issues present
at the workplace. The staff has not been trained
in order to let them use the resources provided in
the best way possible (Martin 1995).
3 Increased cyber attacks Due to the lack of encryption and data security,
the systems used in the organization are more
vulnerable to cyber-attacks. Attacks such as
phishing attack and ransomware attack have also
taken place in JL (Kuyoro, Ibikunle & Awodele
2011).
4 Unauthorized User access The system allows unauthorized users to access
the system which makes the employees access
each other’s system.
5 Slow operating systems The servers have less operational power and
function very slowly. The system also operating
at a slower pace (Child 1974).
Figure 1 issues identified
S.no. Issue Description
1 Lack of security The systems used in JL don’t have any security
software. There is no system to filter out spam
messages. JL has also experienced ransomware
attacks in the past. The devices are not free from
attacks and cannot detect malicious activities.
2 Lack of staff expertise The staffs possess a lack of technical expertise
and unable to detect the security issues present
at the workplace. The staff has not been trained
in order to let them use the resources provided in
the best way possible (Martin 1995).
3 Increased cyber attacks Due to the lack of encryption and data security,
the systems used in the organization are more
vulnerable to cyber-attacks. Attacks such as
phishing attack and ransomware attack have also
taken place in JL (Kuyoro, Ibikunle & Awodele
2011).
4 Unauthorized User access The system allows unauthorized users to access
the system which makes the employees access
each other’s system.
5 Slow operating systems The servers have less operational power and
function very slowly. The system also operating
at a slower pace (Child 1974).
Figure 1 issues identified
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Reasons behind selecting these issues
S.no. Issue Reason Impact
1 Lack of security As the operations performed by the JL
company is online and through the
networks, this causes the information to be
vulnerable to outsiders. The information
regarding the company, the work, and their
employees need to be protected. The
security is also needed to be implemented
in the devices because there is no anti-
virus and malware detector present to keep
the devices from any kind of virus or
malicious software. The devices present in
JL don’t have spam detection systems
which can harm the information present in
the system. The main reason behind
selecting this issue is that lack of security
doesn’t only harm the data but also
slowdowns the performance of systems
(Islam, Farah, & Stafford, 2018).
High
2 Lack of staff
expertise
Employees of a company contribute to the
success of that company. When the staff
members are trained enough to perform
according to the company’s requirement,
then only the organization can expand
itself and succeed further. When the
employees don’t have the necessary
High
S.no. Issue Reason Impact
1 Lack of security As the operations performed by the JL
company is online and through the
networks, this causes the information to be
vulnerable to outsiders. The information
regarding the company, the work, and their
employees need to be protected. The
security is also needed to be implemented
in the devices because there is no anti-
virus and malware detector present to keep
the devices from any kind of virus or
malicious software. The devices present in
JL don’t have spam detection systems
which can harm the information present in
the system. The main reason behind
selecting this issue is that lack of security
doesn’t only harm the data but also
slowdowns the performance of systems
(Islam, Farah, & Stafford, 2018).
High
2 Lack of staff
expertise
Employees of a company contribute to the
success of that company. When the staff
members are trained enough to perform
according to the company’s requirement,
then only the organization can expand
itself and succeed further. When the
employees don’t have the necessary
High

expertise in the field, it leads to low
production rates and increased operating
time. The work process gets slower and
employees spend more time in finding the
correct approaches to the work. The
overall performance of JL has been
decreasing because the system is slower in
operations and the staff is not trained
enough to use the system efficiently (Giac.
2019).
3 Increased cyber
attacks
Cyber-attacks occurred in the past years
has not only affected the company but also
its employees and clients. The lack of
encryption techniques used in the company
has made the data insecure and the
information such as credentials, emails
should be secure enough because the theft
of these data can cause financial losses,
reputation harm and lack of trust of clients.
The confidential system should be
accessible by least number of users, the
system should prevent alteration of data
due to the presence of malware and cyber-
attacks should not cause the system to be
unavailable for the users. Therefore to
secure JL form cyber-attacks, this issue
needs to be addressed immediately
(Guru99. 2019).
High
4 Unauthorized User
access
Unauthorized access in the company can
cause threats to the company, which are
difficult to detect because each user has
High
production rates and increased operating
time. The work process gets slower and
employees spend more time in finding the
correct approaches to the work. The
overall performance of JL has been
decreasing because the system is slower in
operations and the staff is not trained
enough to use the system efficiently (Giac.
2019).
3 Increased cyber
attacks
Cyber-attacks occurred in the past years
has not only affected the company but also
its employees and clients. The lack of
encryption techniques used in the company
has made the data insecure and the
information such as credentials, emails
should be secure enough because the theft
of these data can cause financial losses,
reputation harm and lack of trust of clients.
The confidential system should be
accessible by least number of users, the
system should prevent alteration of data
due to the presence of malware and cyber-
attacks should not cause the system to be
unavailable for the users. Therefore to
secure JL form cyber-attacks, this issue
needs to be addressed immediately
(Guru99. 2019).
High
4 Unauthorized User
access
Unauthorized access in the company can
cause threats to the company, which are
difficult to detect because each user has
High
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

been given equal rights to access the
systems. Due to which the insiders can
also misuse the company’s information.
The unauthorized access is caused by not
implementing password protected systems
at the workplace which can harm the
information of JL (Edeki, Edeki & Natale
2010).
5 Slow operating
systems
The role of fast operating systems is
equally important as the role of trained
staff in a company. In order for the
company to scale and grow the system
should perform at higher speeds otherwise
will make the production rate slower.
Moderate
Figure 2 reasons for selecting the issues
systems. Due to which the insiders can
also misuse the company’s information.
The unauthorized access is caused by not
implementing password protected systems
at the workplace which can harm the
information of JL (Edeki, Edeki & Natale
2010).
5 Slow operating
systems
The role of fast operating systems is
equally important as the role of trained
staff in a company. In order for the
company to scale and grow the system
should perform at higher speeds otherwise
will make the production rate slower.
Moderate
Figure 2 reasons for selecting the issues
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Solutions to the above-identified issues
1. The solution of lack of security
In order to address the security issues found in JL, the company needs to implement the
following solutions:
Anti-virus software- the anti-virus software can protect the system from threats
and viruses which can harm the system and its information. The software should
be used by JL either free or paid. To ensure more security the software should be
updated regularly. One such recommendation is Bitdefender antivirus plus
2019.
Implementing anti-spyware software- it will save the system from viruses and
also will detect the spyware programs present if any. The information such as
passwords, credit card information will be secured if spyware will detect the
spyware programs, the recommendation is Avira free antivirus.
Including multifactor authentication to access the data using a strong password
and two-factor authentication to keep the information safer.
To reduce the vulnerability of the system, the software present should be regularly
updated because it can increase the chances of a system getting hacked.
Updating the firewall to block the unauthorized devices and accounts to access the
systems also it checks for the vulnerabilities present in the system (Peltier 2016).
1. The solution of lack of security
In order to address the security issues found in JL, the company needs to implement the
following solutions:
Anti-virus software- the anti-virus software can protect the system from threats
and viruses which can harm the system and its information. The software should
be used by JL either free or paid. To ensure more security the software should be
updated regularly. One such recommendation is Bitdefender antivirus plus
2019.
Implementing anti-spyware software- it will save the system from viruses and
also will detect the spyware programs present if any. The information such as
passwords, credit card information will be secured if spyware will detect the
spyware programs, the recommendation is Avira free antivirus.
Including multifactor authentication to access the data using a strong password
and two-factor authentication to keep the information safer.
To reduce the vulnerability of the system, the software present should be regularly
updated because it can increase the chances of a system getting hacked.
Updating the firewall to block the unauthorized devices and accounts to access the
systems also it checks for the vulnerabilities present in the system (Peltier 2016).

Figure 3 Avira antivirus software
2. The solution to lack of staff expertise
In order to train the staff, the company needs to perform the activities defined below:
The company will first identify the goals that need to be achieved such as training
to make the employees aware of the operations of the company or to train the staff
to use the system etc.
Training the staff using online resources such as enrolling the staff in free or paid
online training programs for a certain period of time, the recommendation is
TalentLMS.
Training the staff through seminars and meetings.
Performing a daily stand-up meeting to tackle the challenges faced by employees
and provides solutions to them.
Letting the senior staff train the new employees on joining the organization
(Webb 2018).
2. The solution to lack of staff expertise
In order to train the staff, the company needs to perform the activities defined below:
The company will first identify the goals that need to be achieved such as training
to make the employees aware of the operations of the company or to train the staff
to use the system etc.
Training the staff using online resources such as enrolling the staff in free or paid
online training programs for a certain period of time, the recommendation is
TalentLMS.
Training the staff through seminars and meetings.
Performing a daily stand-up meeting to tackle the challenges faced by employees
and provides solutions to them.
Letting the senior staff train the new employees on joining the organization
(Webb 2018).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 4 TalentLMS Software
3. The solution to increased cyber attacks
In order to prevent the system from cyber-attacks, the following actions need to be taken,
Training the staff to use the cybersecurity system and employees so that they can
identify the risks on time from the hints.
Creating a backup of data at regular intervals of time.
Securing Wi-Fi networks to protect the system.
Implement the least privilege policy to ensure only the sensitive data is accessed
only by limited users.
Using encryption techniques to encrypt the data to make it hard to crack,
recommendation, AxCrypt.
Regularly update the passwords to make sure that the system is secure at any
point in time.
Regular scanning and updating the systems and software to avoid any hole in the
security (Sittig & Singh, 2016).
3. The solution to increased cyber attacks
In order to prevent the system from cyber-attacks, the following actions need to be taken,
Training the staff to use the cybersecurity system and employees so that they can
identify the risks on time from the hints.
Creating a backup of data at regular intervals of time.
Securing Wi-Fi networks to protect the system.
Implement the least privilege policy to ensure only the sensitive data is accessed
only by limited users.
Using encryption techniques to encrypt the data to make it hard to crack,
recommendation, AxCrypt.
Regularly update the passwords to make sure that the system is secure at any
point in time.
Regular scanning and updating the systems and software to avoid any hole in the
security (Sittig & Singh, 2016).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Risk identification to prioritize the security of the information which has the
highest risk of attacks.
Analyzing the data which is collected by the company, who has access to it and
how sensitive the data is?
Figure 5 Axcrypt software
highest risk of attacks.
Analyzing the data which is collected by the company, who has access to it and
how sensitive the data is?
Figure 5 Axcrypt software

4. The solution to Unauthorized user access
Set-up multifactor password protection on devices such as computers, laptops, to
ensure no unauthorized access of data even in remote access, recommendation,
Microsoft Azure active directory.
Using strong passwords to avoid them from being copied.
Limiting the file sharing to protect the information
Keeping the firewall active while exchanging the data online.
Before replying to the emails, carefully identifying the sender (Votaw, Keys &
Arora 2018).
Figure 6 Microsoft Azure active directory
5. The solution to slow operating systems
Upgrading system software and hardware to match the company’s requirement.
Using performance troubleshooter to fix the problems found in the system
automatically.
Set-up multifactor password protection on devices such as computers, laptops, to
ensure no unauthorized access of data even in remote access, recommendation,
Microsoft Azure active directory.
Using strong passwords to avoid them from being copied.
Limiting the file sharing to protect the information
Keeping the firewall active while exchanging the data online.
Before replying to the emails, carefully identifying the sender (Votaw, Keys &
Arora 2018).
Figure 6 Microsoft Azure active directory
5. The solution to slow operating systems
Upgrading system software and hardware to match the company’s requirement.
Using performance troubleshooter to fix the problems found in the system
automatically.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 21
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.