$20 Bonus + 25% OFF
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
Add File

Error goes here

COMP3260 Data Security

tag 0 Download8 Pages / 1,924 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Background

JL is a smallaccounting company residing in Perth, Western Australia. JLcurrently employs five people – none of whom hasany IT expertise or literacy. There are plans to expand the number of employees to at least 10.The boss’s 17-year-old niece was responsible for all computer and network related matters for the past two years. JL are progressively moving into the online market and have started communicating and sending confidential documents to its clients using a variety of online services. In recent months, employees have noticed; computers progressively operating slower, and random malware inspired popups are being displayed. The following list contains an overview of the current situation within JL:

  • The SOE consists of Windows 10 laptops, all of which are currently updated with the most recent Microsoft updates.
  • None of the laptops contains any security software.
  • Internet access is via ADSL using a D-Link DSL-2740B wireless router.
  • A QNap TS-412 NAS is used to backup workstation data (at each employee’s discretion) using WinSCP. The username/password for the NAS admin account is admin/admin.
  • A Windows 2000 Server was previously operational in the organisation but a power surge resulted in the power supply no longer functioning.
  • Each employees receives on average 40 spam messages each day.
  • In July 2017 – two workstations succumbed to a ransomware attack and JL paid the ransom.
  • There are currently no policies or rules guiding employees on how to best utilise resources and conform to ideal cyber security conscious behaviours.
  • Employees can access each other’s computers and email accounts.
  • Confidential data is emailed/stored without using any cryptographic techniques.
  • Last week an employee found a USB flash drive in the car park and plugged it into their computer. Since then, the employee has claimed that the computer appears to have “a mind of its own”.

Task

You have been hired to develop a range of recommendations to ensure JL can fulfil current and future client requests. The employees are comfortable, and reluctant to change their current cyber security behaviour. Many of the employees believe that the company is functioning correctly and does not need a new cyber security operational model. JL’s manager is committed to addressing the cyber security issues and improving the culture of the workplace.

The manager has requested that you compile a small, succinct report addressing five (5) critical cyber security issues. In producing your solution, you should address the following requirements:

  • Why the chosen cyber security issue should be addressed immediately.
  • A detailed explanation/demonstration of how you propose to address the issue.
  • Why is your chosen solution better than alternative approaches (i.e. clearly compare/contrast your solution to alternatives).
  • A detailed breakdown of the cost in addressing the selected issue.

Task Information

  • The report should be communicated in a manner that would be applicable for someone with little or minimal computer technical literacy.
  • Not all solutions need to be of a technical nature. Think outside the box about what needs to be rectified within this expanding organisation.
  • You mustmake use of adequate in-text references throughout your entire report.
  • Be creative in how you chose to communicate your findings.The report does not have to be a large collection of paraphrased text. Diagrams are a much more effective way of communicating an idea or concept. Tables and charts are an effective way to draw comparisons or contrast different ideas.However, all supporting material must be adequately referenced and acknowledged.
Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

Upload
Unique Document

Document
Under Evaluation

Get Money
into Your Wallet

Total 8 pages, 1 USD Per Page

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help (2021) Data Security [Online]. Available from: https://myassignmenthelp.com/free-samples/comp3260-data-security/methods-to-reduce-the-cybersecurity-issues.html
[Accessed 18 April 2021].

My Assignment Help. 'Data Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/comp3260-data-security/methods-to-reduce-the-cybersecurity-issues.html> accessed 18 April 2021.

My Assignment Help. Data Security [Internet]. My Assignment Help. 2021 [cited 18 April 2021]. Available from: https://myassignmenthelp.com/free-samples/comp3260-data-security/methods-to-reduce-the-cybersecurity-issues.html.


For years now, MyAssignmenthelp.com is providing affordable essay help to millions of students worldwide. Our essay assistance services have helped us in assisting students with even the toughest essay assignments. We take pride in the fact that we cater the best assistance to search terms like help me with my essay. We offer affordable services in the fastest way possible. For our fast delivering services, students trust us with their urgent essay assignment needs. Two of our most popular essay writing services are maths essay help and English essay help.

Latest It Write Up Samples

MITS4004 IT Networking And Communication

Download : 0 | Pages : 6

Answer: Introduction In this modern era, the use of mobile communication and advanced networking is growing rapidly and many consumers are using this technology to transfer data or information from one person to another. The aim of this report is to review the journal article in the field of advanced networking and communication system and understand the views of different researchers. Wireless is an advanced communication technology which is...

Read More arrow

ITC548 System Analysis And Design

Download : 0 | Pages : 7

Answer: Introduction: Patterns in the program design and in system development are very much important for the present time. Application of the patterns was first used for designing the programs. Now, the patterns are used in the data analysis, system architecture and project management (Bonfè, Fantuzzi and Secchi 2013). Patterns are a part of the Unified Modeling Language which is a commonly occurring reusable piece which can pro...

Read More arrow

ISYS100 IT And Society

Download : 0 | Pages : 12

Answer: Introduction The internet is an open platform which allows its users to share their ideas and content on the platform. Due to its openness and independence, the amount of content shared on the internet is substantial which also include explicit content that is not beneficial for the society (Curran, Fenton & Freedman, 2016). It raises the significance of internet censorship to govern data sharing on the internet in order to ensure...

Read More arrow Tags: Australia Lakemba Management University of New South Wales International Business  

CO4509 Computer Security

Download : 0 | Pages : 15

Answer: Introduction: A file system refers to the different methods as well as the structures of data that are used by the operating system in order to monitor the files and keep a track of the data on a disk partition. It defines the way in which the data and the files a restored on a disk partition[1]. A file system can also be defined as the partition or a disk that is required to store the files of a particular file system. In every ...

Read More arrow

ICT50418 Information Technology Networking

Download : 0 | Pages : 3

Answer:  A performance evaluation. EURASIP Journal on Wireless Communications and Networking, 2014(1), p.89. The title of this journal paper is LTE and IEEE 802.11p for vehicular networking: a performance evaluation that was written by Zeeshan Hameed Mir and Fethi Filali in the year 2014. The main objective of this journal is to describe the con concept of LTE and IEE 802.11 and evaluate their performance. In this modern era informa...

Read More arrow
Next

Save Time & improve Grade

Just share requirement and get customized Solution.

watch
question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

Add File

Error goes here

1,652,205

Orders

4.9/5

Overall Rating

5,121

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

416 Order Completed

95% Response Time

Tyler Moore

MBA in Accounting

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

3076 Order Completed

99% Response Time

Emily Wei

Doctor of Philosophy (Ph.D) in Civil Engineering

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

I got a very high mark and I am satisfied with the service provided this time. Thank you!

flag

User Id: 546862 - 18 Apr 2021

Australia

student rating student rating student rating student rating student rating

It was great. The paper got the details and the information I needed. It was good effort.

flag

User Id: 457776 - 18 Apr 2021

Australia

student rating student rating student rating student rating student rating

It was good. The assignment provided good details and I got the information I needed.

flag

User Id: 457776 - 18 Apr 2021

Australia

student rating student rating student rating student rating student rating

GOOD! The tutor is professional, responsible and patient. The reply was timely...................

flag

User Id: 604370 - 18 Apr 2021

Australia

student rating student rating student rating student rating student rating

Order on the go!

Say hello to our new app

callback request mobile
Have any Query?