Cyber security risks and treats report assignment

Cyber security risks and treats report assignment

Executive summary

An educational institute has a poor level of information security maturity across several aspects of information security and information assurance, including cyber resilience and the use of best practices in cybersecurity. Students want their data to be protected to a high level, and data breaches might jeopardize the institute’s image. It is strongly advised that a specific amount of filtering be implemented in order for the network to be safe and resistant to threats and assaults. It is vital to determine the potential hazards to the company before imposing limits on a specific network. It is vital, for example, to identify the network’s most important services. Scanning the network to identify the services and ports of the apps is required in order to do this. Additionally, the firewall must be configured by adding rules to block and allow services based on the organization’s needs and the network’s security concerns.

Table of Contents

Executive summary 3

Task I: Risk Identification 3

Asset 1: Unpatched Security 3

Asset 2: Human goof 4

Asset 3: Malware 4

Asset 4: Misuse 5

Asset 5: Physical theft 5

Threats 6

Task II: Risk Assessment 8

Task 3: Risk Treatment 9

Security countermeasures: 9

Training 11

Security Policies: 11

Conclusion 12

References 13

Task I: Risk Identification

A data leak may be disastrous for small businesses. A breach of protected consumer information and internal corporate data, such as stock records, transaction history, and other sensitive data, is an incident that no company should have to deal with.

Asset 1: Unpatched Security

Information security experts have been accumulating information quickly showing that hackers have been properly involved in relationships in many nations for a long time. These encounters are organized under several Common Vulnerabilities and Exposures (CVEs) for future reference (Stockman, Nedelec & Mackey, 2016). Regardless, a significant percentage of these security flaws remain unpatched as further time passes. If you do not patch these old security flaws, hackers will have unrestricted access to your company’s most sensitive data.

Asset 2: Human goof

The greatest wellspring of a data leak is unquestionably human error, not some faint or failed to graph security issue.

Human mistake accounts for 52% of the primary causes of security breaches. Although the specifics of the blunder may vary, there are a few prerequisites that must be met:

• The use of passwords that are easily cracked;

• Sending potentially dangerous information to only two or three people;

• Disseminating knowledge about the mysterious word/account; and

• Falling for phishing frauds.

Persisting with these human faults may be aggravating when it comes to ensuring that workers are aware of their basic data security practices (Dhasarathan, Thirumal & Ponnurangam, 2015). Experts unendingly state more master approach is depended upon to handle the ‘human firewall’ issue.

Asset 3: Malware

Malware is not simply a problem for PCs in the homes of well-informed authorities; it is an unquestionably growing threat to your plot’s systems.

While the majority of these “malware events” are small in nature, the sheer volume of them can be overwhelming (Khan, Kim, Moore & Mathiassen, 2019). In addition, there is clearly a lot of activity between virus testing. The basic explanation is that individual hackers make slight tweaks to existing malware in an attempt to make them unidentifiable to antivirus programs while still producing the hacker’s customary effect.

Asset 4: Misuse

While unmistakably linked to human error, the legitimacy of interest data is all the more apparent in nature. A human error or blunder offers an ideal blunder or blunder. Insider misuse, plainly, is a legitimate customer’s careful manipulation of your collusion’s systems, usually for personal advantage.

For these dangerous criminals, everything revolves around gaining a few straight Benjamins, with financial gain and comfort being the primary incentives.

The problem is that the unethical employee is someone your alliance has put their faith in. Getting insider information is dangerous. The insider misuse was discovered following a powerful examination of customer contraptions after people left a link in a large number of the events we destroyed. While preventing insider exploitation is inherently impossible, underhandedness may be avoided by compartmentalizing data on your network or in the cloud. The fewer data and systems a client has access to, the more difficult it is for them to manage their entry. Nonetheless, it has the potential to make goliath data sharing fundamentally more well-planned.

Asset 5: Physical theft

Physical robbery of a device that houses your plot’s compelling information is a step forwards on this swift design, but it is not the most uncompromising. PCs, workplaces, phones, tablets, hard drives, thumb drives, CDs and DVDs, and even servers may all be connected in this way (Cheng, Liu & Yao, 2017). More sensitive data, on the whole, travel to a more confirmed data breach, with the expectation that the information is removed without being cleaned.

While there are many various types of data breach dangers, here are a few of the most common/amazing.

Threats

1. Viruses

Viruses are harmful programs that copy themselves and affect the way a computer works by mimicking another application, a PC boot portion, or a report. Various infections also include stupid badness or load limits, which are used to avoid modern antivirus and antimalware programs, as well as other security needs. It will be there as you copy bogus programs, change reports, fight in crushing fights, and view fake messages, among other things.

2. Spyware Threats

Spyware is a type of malware in which developers focus on analyzing information, login data, and other personal data in order to add up to information that is not suspected by the consumer. It reliably distinguishes between genuine site visits and security breaches for customers (Shaw, 2009). Customers use their data in unambiguous improvement notifications or treat and observe their approaches in a variety of situations. When this happens, engineers use the information against the consumer to extract express recompense. This type of string may, for example, steam a customer’s PC, create spectacular pops, and transfer your information to many social activities that exploit your data.

3. Hackers

PCs provide hazards and infections to people, not the other way around. As a type of computerized mental persecution, originators and trackers are altering task engineers who scam people for their constant beast advancement by secluding into PC movements to steal, manipulate, or beat pieces of information. These online trackers may steal your identity, steal your Visa information, and lock you out of your data. As you may have guessed, online security mechanical social affairs with data mutilation validation plans are a valued person among the overall viewpoints to keep oneself safe from cybercriminal relationships. Things that a facilitator can do to us include:

● Take your username and passwords.

● Take your cash through web banking.

● Make buys.

● Add themselves as the evident customer.

● Take your premium work with a save accounts number.

● Offer your data to different parties.

● Hurt customers.

4. Phishing

Phishes try to get dangerous cash connected or man or woman verified parts using amazing mail or works while in the company of an astonishing individual or trade. Phishing attacks are the most effective systems for cyber thieves hoping to get a data release. Antivirus software with low-level compromise authorization may “assemble” phishing attacks in a fraction of a second. Email Phishing stunts are carried out online by systems with the purpose of demonstrating waste of time and insecurity in the real world. They employ garbage, bogus locations created to appear to be dangerous from historical wars, email, and messages to deceive you into divulging personal information, such as passwords and credit card data. When you select the phisher’s disc, it can use the evaluations to create fraudulent records in your own characteristics, break your credit, steal your money, or even steal your identity.

AssetVulnerabilities (1-5)
Unpatched Security5
Human goof2
Malware5
Misuse3
Physical theft2

Task II: Risk Assessment

Prioritized List Of Assets

AssetVulnerabilities (1-5)
Unpatched Security5
Malware5
Misuse3
Human goof2
Physical theft2

Threats- Vulnerabilities-Assets (TVA) worksheet

Task 3: Risk Treatment

Security countermeasures:

In addition to detecting and eliminating threats, the system’s next step is to devise countermeasures. Following are two or three central preventative evaluations we have tended to, based on finishing a pair of processes and looking at one of the gathering countermeasures (Fathima & Ahmed, 2013). For better comprehension, we have divided evolution into two types of forms. Physical countermeasures and programming program countermeasures are the two types.

The following is an unusual examination of the company through information security that was required:

  • Check the compatibility of programming and mechanical get-togethers utilized in Cyber information with saw subsequent standards, such as whether or not they are ISO certified.
  • Everything considered execution noticed security fragments of information within affiliations, particularly the basic technique ones.
  • Counting down the hours for episode playback and screening unauthorized consumers increased shrewdness. It helps when there are a few instances where someone from the inside tries to manage the records and reports of their family.
  • Execution of physical security measures, regaining possession of a piece of property, repairing, reestablishing, or redesigning, and unpleasant lead region assessment or other strong sciences tests.
  • Providing support for a biometric approval system. For example, one-of-a-kind finger imprint scanners and voice commands.
  • For each string, there are online additional hacker aggressors.
  • Any basic scene should have a sensible disappointment recovery plan.
  • The specific assessments that we may utilize to limit the computerized ambushes are listed below.
  • Activate explicit data-changing tools on dangers and vulnerabilities in both private and public settings.
  • Support a coordinated effort system among industry, including an assessment of present electronic security and quality enhancement against cutting-edge obtain.
  • Participate in international projects to ensure the availability of broadband. It provides a trustworthy framework for moving ahead via task areas that are clearly structured.

They are repair systems that we, as security chief and authorized people, shall install to make an indefinitely closed explicit measure. In various epic prosperity ventures, such as Honey pot, where each new turn of events and method of scientific dear is examined, there are likewise astonishing terms of obstacles (Rankin, 2020). Advanced forensics, which works when records are lost, as well as information re-encountering, should be pursued. It aids in the administration and examination of network communications and is a system horrible lead area examination. Malware analysis aims to isolate and thoroughly study the string that connects it to the system.

Training

Without the greatest data being offered to individuals or state laborers in the association, the majority of the fixing and prosperity effort should be clear.

  • There is a variety of coordinating actions we may conduct inside the relationship to provide delegates with the necessary information. The following are the fundamental centers on which we will speak during the program:
  • To be ensured under all around saw pushed security programs, form a band of IT specialists in security divisions.
  • Direct awe-inspiring concept and gathering actions for professionals.
  • Appropriate planning for children must utilize the most recent and reliable foundation.

Security Policies:

The components that make up the system’s capacity are a compact outcome of its specifications. As a result, the alliance should establish the proper process. For a better view of the assistance, the best and goliath security policies should be implemented in the partnership. These rules will continue to be implemented in accordance with the association’s standards.

  • Validation from two perspectives businesses
  • For specialists, direct accidental idea and organization applications.
  • Using one type of character to set a powerful mystery word.
  • Setting a five-star email general by preventing junk messages approach. removing the questionable messages
  • Obtaining and retaining information in a suitable manner.
  • PCs and other machines that are now not in use should be properly shut off.

Conclusion

When the current security strategy becomes vulnerable to digital threats, the association’s security becomes crucial. This article mentions credit, which is crucial for digital attacks on the underlying foundation. This article also proposes the task that the security pack is supposed to do in order to ensure the digital attack. Explicitly, genuinely, innovative leveled out, limit building, and sponsorship perspectives are used to gather and make this diverse range of activities. The knowledge of the digital risk ensures that action is taken against digital threats, which aids in the establishment of visionary and proactive digital security in the coalition. Genuinely determined preventative actions and strategies, as well as a secure and stable network, might be critical to a company’s success. These preparations and preventative exams assist in the preparation of the incident report, the recovery of the disaster, and the business continuity.

References

Stockman, M., Nedelec, J., & Mackey, W. (2016). Organizational cybervictimization: data breach prevention using a victimological approach. In Cybercrime Through an Interdisciplinary Lens (pp. 141-163). Routledge.

Dhasarathan, C., Thirumal, V., & Ponnurangam, D. (2015). Data privacy breach prevention framework for the cloud service. Security and Communication Networks8(6), 982-1005.

Khan, F. S., Kim, J. H., Moore, R. L., & Mathiassen, L. (2019). Data breach risks and resolutions: A literature synthesis.

Shaw, A. (2009). Data breach: from notification to prevention using PCI DSS. Colum. JL & Soc. Probs.43, 517.

Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery7(5), e1211.

Fathima, A., & Ahmed, B. (2013). Making data breach prevention a matter of policy in corporate governance. International Journal of Scientific Engineering and Technology2(1), 1-7.

Rankin, M. W. (2020). Federal Data Breach Prevention: A Phenomenological Study of Experts’ Strategies (Doctoral dissertation, Capella University).

Order Now

Get a fresh solution for Cyber security risks and treats report assignment and many more. No 1 assignment help service in Australia, Plag free, On-time delivery, 100% safe and trusted by global students. Order online now!

No Fields Found.
Universal Assignment (September 25, 2022) Cyber security risks and treats report assignment. Retrieved from https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/.
"Cyber security risks and treats report assignment." Universal Assignment - September 25, 2022, https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/
Universal Assignment June 26, 2022 Cyber security risks and treats report assignment., viewed September 25, 2022,<https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/>
Universal Assignment - Cyber security risks and treats report assignment. [Internet]. [Accessed September 25, 2022]. Available from: https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/
"Cyber security risks and treats report assignment." Universal Assignment - Accessed September 25, 2022. https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/
"Cyber security risks and treats report assignment." Universal Assignment [Online]. Available: https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/. [Accessed: September 25, 2022]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Get 45%* OFF on Assignment Help

Popular Assignments

Find the Greatest Ancient History Assignment Help Instantly

Ancient History Assignment Help Benefits Student Performance! Ancient History assignment help uplifts student understanding and interest in the area. Ancient history can often become confusing for students because it involves understanding events that are hardly relatable to us in the present generation! Universal Assignment is the perfect platform for the

Read More »

Australia’s Best Aboriginal Studies Assignment Help Online

Upgrade your knowledge with the best Experts:  Quick Aboriginal Studies Assignment Help The world’s most rich research on Aboriginal studies takes place at the top educational institutions in Australia. This field involves rich socio-historical research on the Aboriginal indigenous community of Australia. Aboriginal Studies assignment help online can help students

Read More »

Physical Education Assignment Help: Expert Guidance to Boost your Career

Order Physical Education Assignment Help Instantly! Are you a Physical Education student, struggling to submit assignments on time? Universal Assignment Help Service is the perfect place for all your solutions. With expert guidance available from the best professionals, all your assignments will be top-quality. Physical Education involves a strict and

Read More »

Assignment Help in South Africa

5 Ways to Make Your Assignments Error-Free Assignments are a crucial part of every student’s life as they help them to enhance knowledge about the subjects and also improve academic grades, writing skills, time management skills, research skills, etc. Usually, due to internships, part-time jobs, and other co-curricular activities, students

Read More »

Instant Engineering Assignment Help in Ukraine

Engineering is a vast field of study that consists of several branches. While studying various branches of engineering in the best Ukraine universities, students are required to compose several types of assignments to improve their academic scores. There are many different reasons due to why students seek engineering assignment help

Read More »

[SOLVED] AHS205: The Australian Healthcare System within a Global Context

AHS205: The Australian Healthcare System within a Global Context Part A 1. Healthcare professionals include registered nurses, physicians, dentists, physician assistants, and veterinarians. Registered nurse: The key function which the nurses play in treating the patient with depression include monitoring the clinical progress, improving the compliances of treatment, assessment for

Read More »

[SOLVED] Assignment: Pressure ulcer in ICU in UK

1- Critique different types of evidence ( the area I’ve chosen is pressure ulcer in ICU)2- Analyse what constitutes Best Evidence for practice in the UK3- Critically reflect on the BENEFITS and LIMITATIONS of evidence based practice (EBP) within nursing practice. Using Randomised Controlled Trial (RCT)Student will critique a qualitative

Read More »

[SOLVED] Assignment The lasting negative impact of Colonialism within contemporary Indian Economy and Industry

The lasting negative impact of Colonialism within contemporary Indian Economy and Industry Famine in India and colonialism During the period of colonialism, root causes of famine within India include government policies, population imbalance, crop failure, inflation and war. Increased mortality, epidemic, starvation and regional malnutrition follow and accompany famine within

Read More »

[SOLVED] OSQs: The Psychology of Competition: A Social Comparison Perspective

The Psychology of Competition: A Social Comparison Perspective OSQs Outlines Competitiveness and Social Comparison – The passage is all about reducing differences in the society and developing factors to do social comparison – Situational and individual factors have been highlighted to increase competitiveness The framework highlighting situational and individual factors

Read More »

 [SOLVED] Letter of advice 5126LAW: ASSESSMENT ITEM 3

Law Letter of Advice 25 January 2022 Ms. Amelia Hart 4 Cornet Street, Yeronga Re: Domestic Violence and parenting matter- Hart & Hart Dear Amelia, We do confirm that we have been asked to provide you with advice regarding the parenting and domestic violence matter during the appointment on 24

Read More »

5126LAW: ASSESSMENT ITEM 3  Letter of Advice Problem

5126LAW: ASSESSMENT ITEM 3  Information about this assignment:  This assessment piece requires you to prepare:  1. An initial letter of advice;  2. A draft Application for a Protection Order (Form DV1); and  3. Draft Written Submissions.  Initial letter of advice  Ensure that the initial letter of advice is addressed to

Read More »

HC1021 INTERPERSONAL AND E-COMMUNICATION Assignment T3 [SOLVED]

Student Number: (enter on the line below) Student Name: (enter on the line below) HC1021INTERPERSONAL AND E-COMMUniCATION final assessmeNt Trimester 3, 2021 Assessment Weight: 50 total marks Instructions: All questions must be answered by using the answer boxes provided in this paper. Completed answers must be submitted to Blackboard by

Read More »

COMM1001 Communication in Organisations

Assessment 4 – Written report (1200 Words) 50% Due Week 14 – By 5pm Friday Sept 27th Your full recorded interview from Assessment 3, becomes the basis of your report for Assessment 4 Drawing on the content from your interview and the academic literature related to the three communication topics

Read More »

MBA703 – The Economic Environment – Trimester 2 2022 Assessment Task 2

DUE DATE AND TIME:                        Friday, 23 September 2022, by 8:00pm (AEST) PERCENTAGE OF FINAL GRADE:                                                            40% WORD COUNT:                                   2000 words Description This assignment is based on an article published in the AFR titled “Australia must have a new macroeconomic framework”. Please read the article and answer the following questions (using

Read More »

IT510 Systems Analysis and Design Module Preview

This guide contains a preview of the materials for all module courses in this series: IT510M1: Systems Planning, Analysis, and Logic Processes IT510M2: Data Organization Process IT510M3: System Physical Attributes IT510M4: Written Proposals for System Analysis and Design Be sure to follow the detailed directions found within the actual module

Read More »

BULAW5915 Assignment

Information about the Assignment:   Due date   Sunday, 23:59, 18 September 2022 (Week 9) How to submit   The assignment must be submitted in word format through the submission link on Moodle.   Topics covered by Assignment Topic 4   Maximum word limit   2500 words   Total marks

Read More »

Biomedical Physiology and Engineering assignment

Stent grafts for coronary arteries were first used in the mid 1980’s.  I want you to review the developments in stent graft technology since that time and discuss the natural response of the body to angioplasty and stent placement and how biomedical engineers have responded to the adverse events encountered

Read More »

NRSG374 Assessment Task 1, 2022

ASSESSMENT TASK 1 Professional Development Resource: Narrated PowerPoint Due date: Thursday 15th September 2022 at 4pm Weighting: 50% Length and/or format: Narrated PowerPoint equivalent to 1500 Words +/- 10%8-10 Slides Including Title Page and ReferencesDiagrams and images can be used please include references as per APA7No longer than 8 mins

Read More »

2110AFE – PROBLEM-SOLVING ASSIGNMENT (T 2, 2022)

WEIGHT:          This assessment is worth 30% of the total marks for this course. WORD LIMIT: Your answer to Question 1 (Hypothetical ILAC Question) must be no longer than 1000 words. Your answer to Question 2 & 3 must be no longer than 1000 words. INSTRUCTIONS TO STUDENTS: Students may refer

Read More »

HRM 4801 Managing and Developing People

The following table provides an example of the overview of the assessment requirements. Assessment 1 : Individual reflexive review The following table provides an overview of the assessment requirements. Assignment brief : Individual reflexive review Module code HRM 4801 Module title Managing and Developing People Submission date, time 01.12.2020 :

Read More »

BUS4023 BUSINESS ETHICS

Course/ Module: BUSINESS ETHICS SEGI Course Code: BUS4023 UCLAN Module Code: (if applicable) Lecturer name: William Tan Coursework Submission Date:                         Individual Assessment 1: Week 7 Individual Assessment 2: Week 9 ASSESSMENT METHODS Number of Assessments Form of Assessment     % weighting Size of Assessment/Duration/ Word count Category of

Read More »

Human Subjects Case Studies

Case Study 1 – Research involving adults with terminal illness Dr. Abbott, an oncologist at a major teaching hospital, has been asked to put forward a number of her patients for participation in a clinical trial of a new cancer treatment. Mr. Day is a terminally ill patient with a

Read More »

BA Stage 3 Level 7 Special Education and Differentiation

Assignment Brief and Marking Scheme Programme: Module: Semester: Date of Title Issue: Assignment Deadline: Assignment Submission Details:   Module Credits: Weighting for this Assignment: BA Stage 3 Level 7 Special Education and Differentiation 1 05/10/20 26/11/20 Submit both the essay and the completed IEP in electronic format (PDF) to Moodle.

Read More »

PART II: Media Analysis and Reflection Submission

Students are also required to submit a Media Analysis and Reflection in relation to the media segment (see below) for the Media Discussion Forum. In approximately 350 to 500 words, please expand the synopsis you have provided as a Leader on the Discussion Forum. In this expanded version, you should

Read More »

Philosophy227 Take Home Essay Questions

Philosophy227 Take Home Essay Questions Carel argues that one can be happy – that one’s life can be meaningful – even if one is terminally ill. What is her argument? Do you agree? Is death harmful? Articulate a reason for thinking that death is harmful. Identity an argument against the

Read More »

General Psychology Assignment

Question Mark Travers in his article posted by Psychology Today dated 8th Sept, 2020 posed a question; “Are dating apps a breeding ground for dark personality?” in which new research suggests that the answer is likely yes (Johannes Kepler University). Dark personality triad comprises personality traits of Narcissism, Machiavellianism and

Read More »

Portfolio Planning Tool

Planning for a Target Position: Use this sheet to identify your Key Skill Areas. Add more Key Skill Areas or additional rows if needed.  Within each key skill area, indicate your skills, knowledge, and abilities along with the work samples/evidence you have to prove it, the skill type, source and

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?