COM713 Cyber Security Application Assignment Sample 2023
Introduction
With the growing advancement of science and technology our life has linked with different artificial technologies and electronic gadgets. In every aspect we need to rely on internet for having a glance of various incidents that may help us to improve our living standard by smoothing path of achieving success. In the case of any renowned human rights and legal consultancy firm, technology is the ultimate pillar that supports the regulation of every organizational function. The availability of cloud technology or with the presence of powerful gadgets, it become a cake work for any organizational enemy to hack different confidential information or destroy codes and software required for connecting every unit of the firm. In this regards, the company needs to develop a strong IT department with high quality equipments and ample networking facilities. Here in this paper we are going to discuss different problems and threats Oppression Watch may face in maintaining the proper regulations of organizational functions. Besides this, it will also discuss different IT systems and its principles for protecting confidential data of the firm from eminent hackers or any kind of fraudulent activities. Moreover, this paper provides detailed recommendations about improving the IT department as well as provides information required for taking cyber security measures.
Discussion
The main aim of cyber security is to ensure the generation of effective IT infrastructure as well as protecting it from major hackers. In depth the cyber security is responsible for ensuring the prevention of data breaches or data piracy as well as keeps an eye on every change in different software of the firm for analysing any foreign attack. In order to ensure the generation of effective IT department, the company needs to focus on recruiting key professionals who have profound knowledge about mathematical skills, analysing power as well as technical knowledge required for preventing hackers from damaging organizational systems.
Possible risks and preventive cyber security measures for helping the company to maintain effective data storage, integrity and privacy
Maintaining effective data privacy is an important part that the IT department of the given firm needs to focus on. Before discussing different threats involved in the maintaining effective data privacy and integrity, it is important understand the same term. Data privacy is the act of ensuring the protection of every data provided by different customers as well as the confidential information of company’s policies and practices (Cameron and Marcum, 2019). On the other hand, data integrity can be defined as the process required for maintaining the authenticity as well as the relevance of different data throughout its entire life cycle.
- Threats involved in maintaining effective storage of data, vulnerabilities and prioritizing risks:
Risks Categories | Impact |
Stealing data by hacking systems | High |
Malware function by virus attack | High |
Unauthorized access of data | High |
In order to successful completion of different organizational functions the IT department of the firm need to focus on installing high quality server detection systems that may help to monitor any kind of faults emerge in the system.
Besides this, the technical developer of the firm need to implement new techniques as well as surfing tools required for identifying any emergence of unknown system with the company’s software and prevent the generation of malware. Besides this, in case of prioritising major risks the IT team of the firm need to conduct detailed research about various types of cybercrimes and tools or techniques used in performing the same (Srinivas et al, 2019). Based on this, they need to install artificial intelligence for monitoring any kind of virus present in the software and develop codes and model to prevent to damage the company’s software.
- Anticipation of emerging threats:
At the end of the year 2019, there is a huge growth in cases of Phishing Attacks, Iot-Based Attacks as well as internal attacks. In this digital world every employee present in the firm used to communicate different information through millions of emails, or using company’s own portal or networking system. Phishing is an act where cyber criminals or hackers used to send different emails and links just to get sufficient information or sources of accessing system as well as data of that person. This is the most trending data piracy act conducted by hackers to fulfil their own intentions. In order to prevent this hacking, the IT department of the firm need to develop a verification system that may filter the entry of these kinds of links or mails on any software or system of the firm. Beside identification of such links the company need to report and block such mails or links.
- Access control, authorisation:
It has also observed that due to the inappropriate authorisation of different systems of the firm, the company may face serious faults. Thus, it the duty of the administrative and the decision making of team of the firm to provide the permission to limited as well as the trustworthy member to access different passwords of organizational software. Besides this, the company need to develop strict and difficult codes for ensuring the effective protection of organizational data.
- Defensive system design principles, in depth and breadth:
According to the OSWAP, there are wide variety of principles that company need to focus before designing any cyber security tools or software. Understanding different intension of hackers, establishing default security system that may help the user to follow company rules while using different systems without compromising its privacy.
- Scope, lifecycle, maintenance and sustainability:
In the case of storing company’s data effectively the IT department of the firm needs to focus on updating every information and implementing new changes in a regular manner. This will further help them to ensure the data integrity and its sustainability.
- Technologies, options for technical implementation:
Implementation of Firewall technology and strong antivirus software may help the firm to focus on improving the security system of the company. Bit defender is one of the best quality antivirus software that may help the IT department of the firm to ensure the protection of confidential information of the firm.
- Encryption for communications and storage:
Ensuring proper generation of backup data is important for the firm to uses it in future. Considering this fact in mind, the IT engineer of the firm need to develop high capacity server or software to store primary data and provide back up support to ever new data emerge in the website.
- Policies, monitoring, response plans:
The administrative department of the firm needs to implement new policies including the formation on one senior IT team assisted by two groups consists of junior members. All the members need to work on developing the monitoring system of all equipments and devices to detect any fault. Besides this, they need to develop back up plans for handling emergency situation in case of preventing the damage of company’s data.
- Cost, roles, skills and human resources:
The company needs to invest more than 3 million dollar for installing different high quality software, servers and reframing the entire IT department (Lim and Taeihagh, 2018). Besides this, human resources manager of the firm needs to analyse various technical skills and knowledge of individuals before recruiting them in the IT department. To improve the skills of new employees the company needs to conduct training programs.
- Trade-offs, compromises and push-backs:
To avoid the increase in the chances of hacking company’s data, the manager of the firm need to develop strict rules on the activities on the employees and imposed penalties and major action in case of and criminal deeds.
Conducting secure communication with organizational clients and staffs
Generating effective communication with both the internal and external members of the firm is important for improving both the standard as well as its reputation. In case of avoiding any kind of data piracy the mentioned company need to focus on developing advanced system for communicating with wide range of clients through internet.
- Analysing threats and communicates with customers and staffs safely:
Risk Categories | Impact level |
Tracking calls for stealing confidential information | High |
Stealing payment id and bank details | High |
Sending false mail for destroying data present in the system | Medium |
- Anticipation of major threats: After anticipating major threats the company needs to focus on developing proper id of all the organizational staffs as well as install a separate server for controlling and tracking all the information communicated by both the employees and clients (Abu-Salma et al., 2017). The IT department of the firm need to install different screening system to analysing data misplacement and install such system that provide notification for altering the team about and cyber criminal activities.
- Access control and authorisation: In order to prevent the unauthorized access of different confidential data the company need to select specific employees for handling all the core data of the company.
- Principles of designing defensive system for securing communication: In order to secure the communication between client and the internal staff, the company need to impose strict rules on monitoring every activity of the employees as well as the clients while sharing information. Every id and the contact number of the client need to be verified by the IT department of the firm (Safa et al., 2016). Besides this, every conversation will be recorded by the senior management department and any enclosure of firm’s confidential information with clients by employees may consider as the criminal action.
- Scope and maintenance of secure communication: To ensure the proper transformation and delivery of different confidential information among various staffs, the company need to develop proper server for communicating with all clients.
System hardening, including servers, offices and mobile devices
This criterion has including some vulnerabilities and threats such as:
- Trojan horses: Trojan horses are a kind of malware bywhich software devices like computer, laptops and mobile devicescan easily getaffected. Firstly, it attacks on wireless networks and after that it will disrupt, dame and steal all information from user’s devices. If it get installed in the device, then it can easily do whatever they want. Basically, it is a copy of software which has been loaded for misleading user’s private data. It causes data theft, loss of data. Its main source of entering in user’s device is through mail attachment.
- Virus: A computer virus is basically a minor program which is mainly used or the alteration of computer operators but user don’t have any knowledge of it. These are used for damaging purposes of computers, to erase files and it also format the hard disk. Viruses are created not for damaging purposes only, its main motive is to copy of any software and do their work by not knowing the user and steal all their information. Usually it enters in user’s device by any messages, image, videos, audios and many more (Laszka et al., 2018).
- Key loggers: It is basically a technology which specially used for monitoring and recording every keystroke in the desktop keyboard. It is evenly used by cybercriminals for stealing information, login details and other essential details of big organizations, industries and many more. It don’t need any installation in computer devices. It do enter in devices while downloading something.
- Distributed denial and service attacks:Denial of service attack is a most vital cyber-attack by which criminals are targeting to attack online services and various websites. This process has been executed by overflowing the user’s network. They continuously send false server packets, messages, connections any may more. Sometimes the victims have threatened by the criminals (Cunningham et al., 2016).
Companies are firstly needed to know about the upcoming cyber threats and risks. When companies are introduces new technologies to customers that was the mean time of occurrence of risks. It also provides risks by the help of management and some opportunities on the system storage and other administrations are on the way of increment. All organizations are needed to work on their privacy settings such as work on putting difficult passwords, expiration of passwords and highly encrypted passwords. Password management should be needed in every organization and they have to convince people to work on it. Basically, checklists should be improved as it enables some keywords and passwords. All server should introduce password and most importantly safety logs on the website. Organizations are mostly needed to introduce some principal on accessing their associated technologies, applications, files and access controlling system of information. The design of checklist is the key factor which are simultaneously using for the convenience purposes of servers. In this era of digitalization, no appropriate protection has been introduced in case need of better solution purposes. These system of security are highly needed to be reformed and altered (Dawson, 2018). The short term and long term possessions are needed to be approached. Organizations has introduced a new tool called Lifecycle which has been utilized in different purposes like in various services, activities and also in sources. Creator solutions didn’t contain any appropriate protection. This Lifecycle tool has been used for the purpose of maintenance and it helps the organization in the increment of their scope by means of every ways.
Organizations need to conduct various training on business purposes and also in new technologies in the way of technology applications. Web tools are using enormously on shifting of contact and also on implication of other activities. Organizations are badly needed to use files, applications and other features for controlling the tiniest accessing of technologies. Companies have to encrypt their all data while storing them on user’s devices. The theft existence and data storing securities are on highly under observation of companies. The service providers are taking risk on the time of demonstrate the effectiveness of IT management and also on the time of increment of data opportunities. Organizations are definitely needed encryption of private information.
Some activities are following for maintaining security. They are given below:
- M&E Capacity: This capacities are needed to be verified by human and for increment of the staff capacity essential actions have to be taken.
- Program design and placement of index:All design and applications of the program has to be reviewed properly and organizations are highly required to create a framework for future purposes.
- Data analysis and collection: All availability of data has to be verified and all data sources are needed to review properly (Vittor et al., 2017).
- Reporting and feedback: For the specification of format, user has to create an analysis of report.
The organization needs a specific framework with help for the betterment of the organization. The review of all economic purposes and management has been regulated by the HR of the given organization. Human resources are also managed by the organization. The capital maintenance has been organized and also cost determination has been done by them.
Personal and operational security
For an organization, the most important key factor is Personal security. The operations have to be secured as it is the main purpose of any organization. This security is focused on analysis of different information which are executed by the organization. Various threats like, worm, viruses are disrupting all operation of the software of any association. Many of them are very risky for company’s software.
After the analyzation of different threat of any association it is cleared that some of the cyber threats like Trojan horses, viruses and many more they are creating risk for the software as well as for user also (Xie et al., 2020). They can easily hack their devices and steal all data and use them in future cybercrimes. All organization should highly work on their authorization and have to control all accessibility of devices as there are so many ventures and hacking operations which had done by many known teams. Authorization is mostly required along access control of devices (Pandey and Misra, 2016). The security layers are helping all organizations for handling different tasks and depth system has to be added with those layers for system improvement.
Organizations has to face all difficulties as the operational functions are not working properly and all task have been postponed for facing risk in systems. To improve all performance of the organizations some technology securities have been implemented. This new technology are working on for keeping secure of all kind of records and it also helps to monitor the applications for various uses. Different application and files gave to be appointed in there are a huge members are working in the organization and they need to be complete their allocated task on exact time. For handling those reasons, organization need to secure encryption process for built high security system. The manager and employees of the given company have to aware of different system functions and a strong cyber security process has to be implementing urgently (Hemilä et al., 2019). All workers need to be keeping strong bond with all employees of the organization and manage appropriate team coordination with each other for securing their future. By these procedures they will definitely overcome this situation. After this procedures, organizations are have to look after all key factors by which they are facing hardens in past. It also reported that this procedures are helping a lot to control and mitigate this situation by taking care of the applications.
Conclusion
This report defines about the uses and implement of new applications regarding cyber security processes. But this applications are helped a lot those organization to overcome this situation and also used to identify those Trojans, worms and many more malwares which are creating theft on the applications. This report suggests some procedures and by using this organization are able to overcome this situation. The communication between customer and organisation, hardening of systems and app operations those are taken by the associations are following all security applications and they need to focus on the software while installing them and have to keep checking on them to avoid any kind of cyber theft.
Reference
Abu-Salma, R., Sasse, M.A., Bonneau, J., Danilova, A., Naiakshina, A. and Smith, M., 2017, May. Obstacles to the adoption of secure communication tools. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 137-153). IEEE.
Cameron, E.A. and Marcum, T.M., 2019. Why Business Schools Must Incorporate Cybersecurity into The Business Curriculum: Preparing the Next Generation for Success. Journal of Higher Education Theory and Practice, 19(4).
Cunningham, D.E., Palavincini Jr, G. and Romero-Mariona, J., 2016. Towards Effective Cybersecurity for Modular, Open Architecture Satellite Systems.
Dawson, M., 2018. Cyber security in industry 4.0: The pitfalls of having hyperconnected systems. Journal of Strategic Management Studies, 10(1), pp.19-28.
Hemilä, J., Mikkola, M. and Salonen, J., 2019, December. Management of Cyber Security Threats in the Factories of the Future Supply Chains. In 9th International Conference on Operations and Supply Chain Management, OSCM 2019.
Laszka, A., Abbas, W., Vorobeychik, Y. and Koutsoukos, X., 2018, October. Synergistic security for the industrial internet of things: Integrating redundancy, diversity, and hardening. In 2018 IEEE International Conference on Industrial Internet (ICII) (pp. 153-158). IEEE.
Lim, H.S.M. and Taeihagh, A., 2018. Autonomous vehicles for smart and sustainable cities: An in-depth exploration of privacy and cybersecurity implications. Energies, 11(5), p.1062.
Pandey, R.K. and Misra, M., 2016, December. Cyber security threats—Smart grid infrastructure. In 2016 National Power Systems Conference (NPSC) (pp. 1-6). IEEE.
Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model in organizations. computers & security, 56, pp.70-82.
Srinivas, J., Das, A.K. and Kumar, N., 2019. Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems, 92, pp.178-188.
Vittor, T.R., Sukumara, T., Sudarsan, S.D. and Starck, J., 2017, April. Cyber security-security strategy for distribution management system and security architecture considerations. In 2017 70th Annual Conference for Protective Relay Engineers (CPRE) (pp. 1-6). IEEE.
Xie, T., Tu, G.H., Li, C.Y. and Peng, C., 2020. How Can IoT Services Pose New Security Threats In Operational Cellular Networks?. IEEE Transactio
Know more about UniqueSubmission’s other writing services:
I found this website called that might fit what you’re looking for Sex 11
https://aev99.day/