Cyber security risks and treats report assignment

Cyber security risks and treats report assignment

Executive summary

An educational institute has a poor level of information security maturity across several aspects of information security and information assurance, including cyber resilience and the use of best practices in cybersecurity. Students want their data to be protected to a high level, and data breaches might jeopardize the institute’s image. It is strongly advised that a specific amount of filtering be implemented in order for the network to be safe and resistant to threats and assaults. It is vital to determine the potential hazards to the company before imposing limits on a specific network. It is vital, for example, to identify the network’s most important services. Scanning the network to identify the services and ports of the apps is required in order to do this. Additionally, the firewall must be configured by adding rules to block and allow services based on the organization’s needs and the network’s security concerns.

Table of Contents

Executive summary 3

Task I: Risk Identification 3

Asset 1: Unpatched Security 3

Asset 2: Human goof 4

Asset 3: Malware 4

Asset 4: Misuse 5

Asset 5: Physical theft 5

Threats 6

Task II: Risk Assessment 8

Task 3: Risk Treatment 9

Security countermeasures: 9

Training 11

Security Policies: 11

Conclusion 12

References 13

Task I: Risk Identification

A data leak may be disastrous for small businesses. A breach of protected consumer information and internal corporate data, such as stock records, transaction history, and other sensitive data, is an incident that no company should have to deal with.

Asset 1: Unpatched Security

Information security experts have been accumulating information quickly showing that hackers have been properly involved in relationships in many nations for a long time. These encounters are organized under several Common Vulnerabilities and Exposures (CVEs) for future reference (Stockman, Nedelec & Mackey, 2016). Regardless, a significant percentage of these security flaws remain unpatched as further time passes. If you do not patch these old security flaws, hackers will have unrestricted access to your company’s most sensitive data.

Asset 2: Human goof

The greatest wellspring of a data leak is unquestionably human error, not some faint or failed to graph security issue.

Human mistake accounts for 52% of the primary causes of security breaches. Although the specifics of the blunder may vary, there are a few prerequisites that must be met:

• The use of passwords that are easily cracked;

• Sending potentially dangerous information to only two or three people;

• Disseminating knowledge about the mysterious word/account; and

• Falling for phishing frauds.

Persisting with these human faults may be aggravating when it comes to ensuring that workers are aware of their basic data security practices (Dhasarathan, Thirumal & Ponnurangam, 2015). Experts unendingly state more master approach is depended upon to handle the ‘human firewall’ issue.

Asset 3: Malware

Malware is not simply a problem for PCs in the homes of well-informed authorities; it is an unquestionably growing threat to your plot’s systems.

While the majority of these “malware events” are small in nature, the sheer volume of them can be overwhelming (Khan, Kim, Moore & Mathiassen, 2019). In addition, there is clearly a lot of activity between virus testing. The basic explanation is that individual hackers make slight tweaks to existing malware in an attempt to make them unidentifiable to antivirus programs while still producing the hacker’s customary effect.

Asset 4: Misuse

While unmistakably linked to human error, the legitimacy of interest data is all the more apparent in nature. A human error or blunder offers an ideal blunder or blunder. Insider misuse, plainly, is a legitimate customer’s careful manipulation of your collusion’s systems, usually for personal advantage.

For these dangerous criminals, everything revolves around gaining a few straight Benjamins, with financial gain and comfort being the primary incentives.

The problem is that the unethical employee is someone your alliance has put their faith in. Getting insider information is dangerous. The insider misuse was discovered following a powerful examination of customer contraptions after people left a link in a large number of the events we destroyed. While preventing insider exploitation is inherently impossible, underhandedness may be avoided by compartmentalizing data on your network or in the cloud. The fewer data and systems a client has access to, the more difficult it is for them to manage their entry. Nonetheless, it has the potential to make goliath data sharing fundamentally more well-planned.

Asset 5: Physical theft

Physical robbery of a device that houses your plot’s compelling information is a step forwards on this swift design, but it is not the most uncompromising. PCs, workplaces, phones, tablets, hard drives, thumb drives, CDs and DVDs, and even servers may all be connected in this way (Cheng, Liu & Yao, 2017). More sensitive data, on the whole, travel to a more confirmed data breach, with the expectation that the information is removed without being cleaned.

While there are many various types of data breach dangers, here are a few of the most common/amazing.

Threats

1. Viruses

Viruses are harmful programs that copy themselves and affect the way a computer works by mimicking another application, a PC boot portion, or a report. Various infections also include stupid badness or load limits, which are used to avoid modern antivirus and antimalware programs, as well as other security needs. It will be there as you copy bogus programs, change reports, fight in crushing fights, and view fake messages, among other things.

2. Spyware Threats

Spyware is a type of malware in which developers focus on analyzing information, login data, and other personal data in order to add up to information that is not suspected by the consumer. It reliably distinguishes between genuine site visits and security breaches for customers (Shaw, 2009). Customers use their data in unambiguous improvement notifications or treat and observe their approaches in a variety of situations. When this happens, engineers use the information against the consumer to extract express recompense. This type of string may, for example, steam a customer’s PC, create spectacular pops, and transfer your information to many social activities that exploit your data.

3. Hackers

PCs provide hazards and infections to people, not the other way around. As a type of computerized mental persecution, originators and trackers are altering task engineers who scam people for their constant beast advancement by secluding into PC movements to steal, manipulate, or beat pieces of information. These online trackers may steal your identity, steal your Visa information, and lock you out of your data. As you may have guessed, online security mechanical social affairs with data mutilation validation plans are a valued person among the overall viewpoints to keep oneself safe from cybercriminal relationships. Things that a facilitator can do to us include:

● Take your username and passwords.

● Take your cash through web banking.

● Make buys.

● Add themselves as the evident customer.

● Take your premium work with a save accounts number.

● Offer your data to different parties.

● Hurt customers.

4. Phishing

Phishes try to get dangerous cash connected or man or woman verified parts using amazing mail or works while in the company of an astonishing individual or trade. Phishing attacks are the most effective systems for cyber thieves hoping to get a data release. Antivirus software with low-level compromise authorization may “assemble” phishing attacks in a fraction of a second. Email Phishing stunts are carried out online by systems with the purpose of demonstrating waste of time and insecurity in the real world. They employ garbage, bogus locations created to appear to be dangerous from historical wars, email, and messages to deceive you into divulging personal information, such as passwords and credit card data. When you select the phisher’s disc, it can use the evaluations to create fraudulent records in your own characteristics, break your credit, steal your money, or even steal your identity.

AssetVulnerabilities (1-5)
Unpatched Security5
Human goof2
Malware5
Misuse3
Physical theft2

Task II: Risk Assessment

Prioritized List Of Assets

AssetVulnerabilities (1-5)
Unpatched Security5
Malware5
Misuse3
Human goof2
Physical theft2

Threats- Vulnerabilities-Assets (TVA) worksheet

Task 3: Risk Treatment

Security countermeasures:

In addition to detecting and eliminating threats, the system’s next step is to devise countermeasures. Following are two or three central preventative evaluations we have tended to, based on finishing a pair of processes and looking at one of the gathering countermeasures (Fathima & Ahmed, 2013). For better comprehension, we have divided evolution into two types of forms. Physical countermeasures and programming program countermeasures are the two types.

The following is an unusual examination of the company through information security that was required:

  • Check the compatibility of programming and mechanical get-togethers utilized in Cyber information with saw subsequent standards, such as whether or not they are ISO certified.
  • Everything considered execution noticed security fragments of information within affiliations, particularly the basic technique ones.
  • Counting down the hours for episode playback and screening unauthorized consumers increased shrewdness. It helps when there are a few instances where someone from the inside tries to manage the records and reports of their family.
  • Execution of physical security measures, regaining possession of a piece of property, repairing, reestablishing, or redesigning, and unpleasant lead region assessment or other strong sciences tests.
  • Providing support for a biometric approval system. For example, one-of-a-kind finger imprint scanners and voice commands.
  • For each string, there are online additional hacker aggressors.
  • Any basic scene should have a sensible disappointment recovery plan.
  • The specific assessments that we may utilize to limit the computerized ambushes are listed below.
  • Activate explicit data-changing tools on dangers and vulnerabilities in both private and public settings.
  • Support a coordinated effort system among industry, including an assessment of present electronic security and quality enhancement against cutting-edge obtain.
  • Participate in international projects to ensure the availability of broadband. It provides a trustworthy framework for moving ahead via task areas that are clearly structured.

They are repair systems that we, as security chief and authorized people, shall install to make an indefinitely closed explicit measure. In various epic prosperity ventures, such as Honey pot, where each new turn of events and method of scientific dear is examined, there are likewise astonishing terms of obstacles (Rankin, 2020). Advanced forensics, which works when records are lost, as well as information re-encountering, should be pursued. It aids in the administration and examination of network communications and is a system horrible lead area examination. Malware analysis aims to isolate and thoroughly study the string that connects it to the system.

Training

Without the greatest data being offered to individuals or state laborers in the association, the majority of the fixing and prosperity effort should be clear.

  • There is a variety of coordinating actions we may conduct inside the relationship to provide delegates with the necessary information. The following are the fundamental centers on which we will speak during the program:
  • To be ensured under all around saw pushed security programs, form a band of IT specialists in security divisions.
  • Direct awe-inspiring concept and gathering actions for professionals.
  • Appropriate planning for children must utilize the most recent and reliable foundation.

Security Policies:

The components that make up the system’s capacity are a compact outcome of its specifications. As a result, the alliance should establish the proper process. For a better view of the assistance, the best and goliath security policies should be implemented in the partnership. These rules will continue to be implemented in accordance with the association’s standards.

  • Validation from two perspectives businesses
  • For specialists, direct accidental idea and organization applications.
  • Using one type of character to set a powerful mystery word.
  • Setting a five-star email general by preventing junk messages approach. removing the questionable messages
  • Obtaining and retaining information in a suitable manner.
  • PCs and other machines that are now not in use should be properly shut off.

Conclusion

When the current security strategy becomes vulnerable to digital threats, the association’s security becomes crucial. This article mentions credit, which is crucial for digital attacks on the underlying foundation. This article also proposes the task that the security pack is supposed to do in order to ensure the digital attack. Explicitly, genuinely, innovative leveled out, limit building, and sponsorship perspectives are used to gather and make this diverse range of activities. The knowledge of the digital risk ensures that action is taken against digital threats, which aids in the establishment of visionary and proactive digital security in the coalition. Genuinely determined preventative actions and strategies, as well as a secure and stable network, might be critical to a company’s success. These preparations and preventative exams assist in the preparation of the incident report, the recovery of the disaster, and the business continuity.

References

Stockman, M., Nedelec, J., & Mackey, W. (2016). Organizational cybervictimization: data breach prevention using a victimological approach. In Cybercrime Through an Interdisciplinary Lens (pp. 141-163). Routledge.

Dhasarathan, C., Thirumal, V., & Ponnurangam, D. (2015). Data privacy breach prevention framework for the cloud service. Security and Communication Networks8(6), 982-1005.

Khan, F. S., Kim, J. H., Moore, R. L., & Mathiassen, L. (2019). Data breach risks and resolutions: A literature synthesis.

Shaw, A. (2009). Data breach: from notification to prevention using PCI DSS. Colum. JL & Soc. Probs.43, 517.

Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery7(5), e1211.

Fathima, A., & Ahmed, B. (2013). Making data breach prevention a matter of policy in corporate governance. International Journal of Scientific Engineering and Technology2(1), 1-7.

Rankin, M. W. (2020). Federal Data Breach Prevention: A Phenomenological Study of Experts’ Strategies (Doctoral dissertation, Capella University).

Order Now

Get a fresh solution for Cyber security risks and treats report assignment and many more. No 1 assignment help service in Australia, Plag free, On-time delivery, 100% safe and trusted by global students. Order online now!

No Fields Found.
Universal Assignment (February 6, 2023) Cyber security risks and treats report assignment. Retrieved from https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/.
"Cyber security risks and treats report assignment." Universal Assignment - February 6, 2023, https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/
Universal Assignment June 26, 2022 Cyber security risks and treats report assignment., viewed February 6, 2023,<https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/>
Universal Assignment - Cyber security risks and treats report assignment. [Internet]. [Accessed February 6, 2023]. Available from: https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/
"Cyber security risks and treats report assignment." Universal Assignment - Accessed February 6, 2023. https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/
"Cyber security risks and treats report assignment." Universal Assignment [Online]. Available: https://universalassignment.com/cyber-security-risks-and-treats-report-assignment/. [Accessed: February 6, 2023]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

Monash University Assignment Help by Universal Assignment

Introduction: Monash University is one of the largest and most prestigious universities in Australia, known for its high-quality education and research programs. As a student pursuing higher education at Monash University, you may often find yourself struggling with various assignments, projects, and essays. This is where Universal Assignment can help

Read More »

Griffith College Assignment Help Service by Universal Assignment

Introduction: Griffith College is a well-established institution that offers a range of academic programs to students. However, completing assignments can be a challenging task for many students, especially when they have multiple assignments to complete within a limited time frame. This is where Universal Assignment comes in as a one-stop

Read More »

1803NRS Foundations of Professional Nursing Assessment

AIM: The primary aim of assignment 2 is to give further opportunity to develop academic writing skills while exploring topics that are integral to developing your understanding of the Registered Nurse (RN) role. This assignment aligns with course learning outcome 1. “Discuss how nurses engage with the historical, political and

Read More »

2810NRS Child and Family Nursing Practice

2810NRS Child and Family Nursing Practice A2, Trimester 2, 2021 Written assignment: “Nursing Process applied to a Family” Word Count: 1500 words. Weighting: 40 % Marks 40 The aim of this written assessment item is to apply the nursing process in providing family centred care. When individuals experience a health

Read More »

Assessment 1: Situation Analysis

Assessment 1: Situation Analysis Assessment Details: Length/Duration: 1,200 words (maximum)Weight: 30% Due date: 11.59PM (AEST), 5 September 2021 (Week 6) Description: Students are to develop a situation analysis of a good/service from a selected advertising campaign. You are aiming to develop an understanding of the product and audience factors underpinning

Read More »

Aboriginal and Torres Strait people’s health and wellness

UNIT Name: Aboriginal and Torres Strait people’s health and wellness  Reflective piece  Length: 1090 words  Use headings provided below.MS Word documents only. No Table of contents. Ensure appropriate use of Aboriginal and Torres Strait Islander terminology as per SNM guidelines above Your reference list must contain minimum 10 references, 7

Read More »

Assessment 2: Additional Information Sheet with Questions and Answers

COMMUNITY MANAGEMENT AND ORGANISATIONS 101644 – Spring 2021 Assessment 2: Additional Information Sheet with Questions and Answers This document is to provide summary and additional information on the second assignment for Community Management and Organisations. It is designed to complement the information provided in the Learning Guide. Students should also

Read More »

NUR3101 Primary Health Care in a Global Context

NUR3101 Assessment 2: Assignment Task overview Course NUR3101 Primary Health Care in a Global Context Assessment name Written Assignment Brief task description This assignment requires you to write an ESSAY analysing the Sustainable Development Goal 3 within a selected country and discuss the role of primary health care in achieving

Read More »

NURBN 1017 Written Analysis of case Based Scenario

NURBN 1017 Assessment task 3: Written Analysis of case Based Scenario Submission Date: (Week 6 of semester) 31st August 2021 by 23:59 via Turnitin Word count: (1500 words +/-10%) Weighting: 40% of overall course grade Purpose: This report is designed to develop capacity to identify, research and critically analyse the

Read More »

NURBN 1017 Written Analysis of case Based Scenario

NURBN 1017 Assessment task 3: Written Analysis of case Based Scenario Example Submission Date: (Week 6 of semester) 31st August 2021 by 23:59 via Turnitin Word count: (1500 words +/-10%) Weighting: 40% of overall course grade Report Format: The report format must include an introduction, conclusion, reference list and use

Read More »

Assessment 2 – Poster

7201NRS Trimester 2, 2021 Assessment 2 – Poster Poster: A4 digital Weighting: 40% /40 Due Date: by 5pm, 13th Sept 2021 (Week 8) Aim: The aim of this poster is to develop your ability to educate your colleagues about evidence-based practice related to the management of high acuity clients, including

Read More »

Medical Assignment 1 Essay Help

ASSESSMENT 1 – ESSAY Learning outcomes – 1, 3 4 & 5 1750 words  For this assessment you are required to demonstrate your knowledge of: A: The principals and models of clinical governance in the Australian health care setting (LO 1 & 4). B: Relate how organisational culture, leadership and

Read More »

Assignment: Ethics of Genetic Testing

The genetic testing assignment requires you to identify a number of ethical issues present and several stakeholders affected within the given scenario. The aim of the assignment is to learn about different genetic tests and how they might affect people, the regulatory and legal framework. In any given scenario, there

Read More »

NSB204 MENTAL HEALTH: Self and Others

Assessment Task 2 Assessment name: Case Study Task description: This assignment aims to help you to begin to use your professional and clinical judgement to think like nurses working in a mental health setting and/or in relation to the mental health needs of people regardless of the setting.   Choose

Read More »

PSY1022: Psychology 1B School of Psychological Sciences

Title of your Proposal Your Name School of Psychological Sciences, Monash University PSY1022: Psychology 1B Your Tutors Name Day Month, YearWord Count: XXXX Abstract Your abstract text goes here. Abstract must be a single paragraph, flushed left and between 150-200 words. This word limit should be strictly adhered to. If

Read More »

Assessment 2: Problem Solving Exercise

LWS101, Semester 2 2021 Assessment 2: Problem Solving Exercise Due Date: Thursday 16 September 2021 at 11:59pm (note that you must submit your assignment online, via the submission link, before midnight – late submissions will not be marked and you will be awarded a grade of 0, in accordance with

Read More »

MBA404 Consumer Behaviour and Marketing Psychology

Assessment 2 Information Subject Code: MBA404 Subject Name: Consumer Behaviour and Marketing Psychology Assessment Title: Sample Survey Assessment Type: Length: Individual case study analysis 4 pages (no more) Weighting: 35% Total Marks: Submission: 100 Online Due Date: Week 9 Your task Individually, you are required to prepare a four-page written

Read More »

NUR133 ASSESSMENT 2 – Digital Presentation

NUR133 ASSESSMENT 2 – Digital Presentation (500 words + 10-minute presentation) TASK Select a service or program designed to improve the health outcomes of Aboriginal and/or Torres Strait Islander people and prepare a poster presentation that could be used to develop a brief, engaging education session for your peers. In

Read More »

Graduate Program Credit Assessment

Assessment summary Reflective essay (1500 words x 4) (70%) ·                  Verbal and written case presentation (2 x 15%) (30%) ·                  Clinical portfolios x 2 Alignment with learning outcome(s): (Associated Study Day: Family consultation) (Associated training: RiSCE) Assessment Tasks Assessment title: 1500 word essays (x4) Essay Topics: Essay 1: Psychopharmacology Due

Read More »

MGMT2007 Organisational Behaviour

2021, MGMT2007 Organisational Behaviour 3,000-word Major Essay Pick ONE of these major essay questions to write an essay: Topic 1: Dealing with problems in an organisation under organisational change Example Scenario: Organisation X has implemented some drastic organisational changes recently. As a result, some of its employees have been laid

Read More »

Self- reflective – Critical Reflection on Case Study

Resit Assessment Point 2: Written Assignment / Self- reflective – Critical Reflection on Case Study ASSESSMENT BRIEF AND MARKING RUBRIC Module title: Managing strategy, operations and partnerships (SG7001) Assessment point: Resit Assessment point 2 (Week 12) Assessment task: Reflective Writing Word count limit: 1500 words +/- 10% (excluding references and

Read More »

Managing strategy, operations and partnerships (SG7001)

ASSESSMENT BRIEF AND MARKING RUBRIC Module title: Managing strategy, operations and partnerships (SG7001) Assessment point: Resit Assessment point 1 (Week 6) Assessment task: Report Word count limit: 4500 words +/- 10% (excluding references and appendices) Procedure in the event of illness or other valid cause (extenuating circumstances) If you believe

Read More »

Righteous Bean policies and procedures

Instructions to Students: You need to implement and review the three (3) resource plans you developed in Assessment 2 for this assessment task. use the scenario provided in Appendix A to complete this assessment task.  You will also need to refer to the Righteous Bean policies and procedures in Appendix

Read More »

Righteous Bean policies and procedures

Instructions to Students: You need to develop three (3) resource plans for this assessment task.   For those who do not have access to a workplace at this time, use the scenario provided in Appendix A to complete this assessment task.  You will also need to refer to the Righteous

Read More »

Managing human and physical resources Questions-Answers

When managing human and physical resources, name two (2) pieces of federal legislation (including the year) that need to be considered. Explain the purpose of each         :Acquisition and allocation of the resources.Timelines aligned with business strategies.Contingency plans and processes.Defined costs and budgets.        

Read More »

Righteous Bean simulated environment provided in Appendix  A

Assessment Task This task can be completed in your workplace or using the Righteous Bean simulated environment provided in Appendix A,   If you are planning to complete this task using your own workplace, you must contact your Assessor to discuss the suitability of your organisational documents and situation.  Part A – Implementing the

Read More »

Righteous Bean simulated environment

Assessment Task This task can be completed in your workplace or using the Righteous Bean simulated environment provided in Appendix A, B and C. If you are planning to complete this task using your own workplace, you must contact your Assessor to discuss the suitability of your organisational documents and situation.  You may

Read More »

Basic accounting principles applicable to the financial management

Assessment Instructions Review the questions below and answer all short answer questions in the space provided. Provide a definition, in your own words, for each of the following basic accounting principles applicable to the financial management of a budget – Double Entry Bookkeeping, Principle of Control, and Revenue Recognition (cash

Read More »

Develop critical and creative thinking concepts and skills

Assessment Instructions Completing this Assessment allows you to show your skills and knowledge in developing critical thinking in others. This Assessment will require you to complete the following tasks: Part A: Develop critical and creative thinking concepts and skills in others through providing and facilitating an opportunity to apply these

Read More »

Critical and Creative Thinking in the Workplace

Assessment Instructions: Completing this assessment allows you to show your skills and knowledge in developing critical thinking in others. This assessment will require you to complete the following tasks: Part A: Develop and conduct a survey to determine individual and team knowledge gaps in critical thinking concepts and practices Part

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?