JL is a smallaccounting company residing in Perth, Western Australia. JLcurrently employs five people – none of whom hasany IT expertise or literacy. There are plans to expand the number of employees to at least 10.The boss’s 17-year-old niece was responsible for all computer and network related matters for the past two years. JL are progressively moving into the online market and have started communicating and sending confidential documents to its clients using a variety of online services. In recent months, employees have noticed; computers progressively operating slower, and random malware inspired popups are being displayed. The following list contains an overview of the current situation within JL:
You have been hired to develop a range of recommendations to ensure JL can fulfil current and future client requests. The employees are comfortable, and reluctant to change their current cyber security behaviour. Many of the employees believe that the company is functioning correctly and does not need a new cyber security operational model. JL’s manager is committed to addressing the cyber security issues and improving the culture of the workplace.
The manager has requested that you compile a small, succinct report addressing five (5) critical cyber security issues. In producing your solution, you should address the following requirements:
Security of data or information is a very common problem for JL organization and in the last five years the problem of cybersecurity has increased. The JL organization started their company with few employees and it provides various kinds of online services to their customers and currently, only five people are working in this organization (Abomhara, & Køien, 2015). The main purpose of this report is to understand the fundamental concept of cybersecurity issues and methods to address the issues of computer securities. In the last few months, the employees of JL organization was facing the issue of performance, computer systems were not working properly and some malware are observed on the server of JL. The employees and manager of JL Company use D-link wireless routers which are very less secure and hackers use malicious software to block the networks of JL organization. This report is divided into four parts such as cybersecurity issues, methods to address these issues, a comparison between chosen methods and alternative approaches and cost of technologies or software.
There are many kinds of cybersecurity issues and threats identified that are faced by JL organization and their employees:
It is a very common security threat and cyber-attack which is a very serious problem for JL organization. It is a type of virus that attacks human peripheral devices like computer and mobile (AbouZahr, et al., 2015). In which first hackers send unwanted signals or mails to JL employees and after that, they collect all relevant data, for example, IP address and type of data links. Attackers use malware and botnet process to block the servers of JL and they store all personal information of consumers. At the end of ransomware attack hackers communicate with consumers and employees of JL through social Media and demand money to restore back their data. The employees of JL Company has identified that their data files and computer networks were corrupted and encrypted by attackers (Buczak, & Guven, 2016). Due to this kind of cyber issue the performance and efficiency of computer networks are also decreased.
Figure: ransomware attack steps
(Source: Gupta, Agrawal, & Yamaguchi, 2016)
DOS is defined as a denial of services attack that is a very serious problem in the field of computer networks. In which hackers produce a large number of traffic signals and unwanted data with the help of malware software. JL organization faced the problem of DOS and DDOS because their employees use unauthorized websites. It is identified the JL community use wireless networks for communication purpose but they do not use any security system due to which the problem of DOS attack has occurred. In DOS attack hackers use flooding process and generate complex algorithm to block the servers of JL organization.
Figure: DOS attack
(Source: Lee, Bagheri, & Jin, 2016)
The employees of JL used the poor password-based system and they do not use any security programmes for their computer systems. Hacker’s uses very advanced malicious systems to detect the location and passwords of employee’s peripheral devices. Due to poor passwords the data or information of JL can be leaked and they can suffer from any financial problem. To reduce this kind of security issues the management teams can adopt biometric recognition systems like a fingerprint, iris, and hand geometry (Lee, Bagheri, & Jin, 2016). Employees ensure that they use only authorized servers and make strong passwords on their accounts and computer devices.
Phishing is a very common cybersecurity attack which try to collect personal data of an individual, for example, username, bank account, credit, and debit card details. It is also called as fraud attack that uses botnet process to produce spam emails and send to the JL organization websites. When employees click on spam links or emails then hackers identified users’ accounts details and control all information with the help of malware software. In the case of JL organization, they use third-party applications and software’s to store data or information which are developed by the malicious process. Due to which the performance and efficiency of computer networks are also reduced and users can lose their personal data.
Figure: phishing attack
(Source: Tweneboah, et al., 2017)
There are many consumers that store their valuable data or information in a single computer and they log in their accounts into different computer devices by which they reduce security and privacy. The JL organization use cloud-based services to store data that are provided by third party sellers due to which they lose their privacy. JL can adopt the advanced communication systems and technologies like the internet of thing and cryptography to improve the security of their computer networks. JL society must make security programmes to avoid this type of cyber-attacks and use only private cloud-based services rather than public CBS (Li, Tao, Cheng, & Zhao, 2015).
All these security issues and threats should be addressed immediately because due to which the employees of JL can lose their private details like login ID, passwords, and bank details. Data breach is a very common problem for an organization and it occurs due to all these security threats and risks.
Information technology has developed various kinds of techniques and processes to address the issues and threats of cyber security which are described below:
Figure: cybersecurity strategies
(Source: Min, Chai, & Han, 2015)
It is one of the most common processes to address security issues and many organizations use this technology. Hackers use malicious software to block the computer networks and servers and they collect data. In this technique, the data or signals converted into a form of code which is transmitted from one source to other. The main advantage of this process is that hackers are not able to decrypt the input code without permission and JL organization can adopt this method to improve the privacy of signals.
Figure: an Encryption process
(Source: Tweneboah, et al., 2017)
It is an advanced technology in the field of computer security which is used to detect the malware and unwanted signals from the server. It has the ability to hide the data and convert into a particular data bit and keep data secure and confidential. JL Company deals with a large amount of data for which they can develop the cryptography technology and employees should ensure that they use only authorized websites.
Figure: Cryptography process
(Source: Safa, Von & Furnell, 2016)
Firewall is a type of security application which is developed to avoid malware and cyber-attacks and it identifies the traffic signals from computer networks. In the case of JL management team can purchase the firewall software and download into their computer devices to block the malware signals.
Figure: Firewall versus antivirus
(Source: Tsai, et al., 2015)
Antivirus is a process to analyze and controls the malware attacks and many organizations use this step to reduce the DDOS attacks. The main advantage of this process is that employees can identify the fraud emails and messages after that they can block the networks of malicious software’s. Backup plan is also an important step and cloud computing is a modern method that can be adopted by JL.
For the security of JL organization, there are main two technologies can be used, for example, encryption and cryptography which secure the information from the attackers. Moreover, if the data or information is lost the attackers ate not able to access the accounts of users and JL can take their benefits to secure data. As compared to other alternative solution the encryption is very popular techniques in the field of computer security (Sharma, & Rawat, 2015). This process is more effective and very low cost rather than alternative solution due to this advantage JL can adopt this process and it converts signals into a code which cannot be read by any hacker. It provides security to users data at the time of transmission and at receiver side decryption process is used to convert code into original information. Cryptography is the latest security process that can be used along with the encryption process because it has the capability to identify the malware and fraud signals as compared to an alternative process.
To reduce the issues and threats of cyber security the JL organization can adopt security programmes and steps. The cost of using the network security systems the JL community requires around 1200 dollar in which 50% cost is used for installation and development of security and rest of money is used for maintenance and establishment purpose. Around 30 to 70 dollars are used for security applications and software’s like antivirus and firewall systems. The amount requires for encryption process for JL organization is not fixed because it is completely depended upon the size of data and networks.
Figure: a cost of implementing the encryption technology
(Source: Shafqat, & Masood, 2016)
Cybersecurity is defined as a process that provides a platform to protect data of JL organization and security of computer networks is a very complex process. The JL organization is a very small social authority that faced many security issues and threats due to which the performance of computer devices are also decreased. This report described the security threats and issues faced by JL society and methods to address their security issues. The employees of JL should use strong password base system and they can adopt biometric recognition process to improve the privacy of their data. JL ensure that employees use only authentic servers and websites to access their private accounts and use only private networks to store personal data.
Abomhara, M., & Køien, G. M. (2015). Cybersecurity and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security, 4(1), 65-88.
AbouZahr, C., De Savigny, D., Mikkelsen, L., Steel, P. W., Lozano, R., Nichols, E., ... & Lopez, A. D. (2015). Civil registration and vital statistics: progress in the data revolution for counting and accountability. The Lancet, 386(10001), 1373-1385.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on modern cryptographic solutions for computer and cybersecurity. IGI Global.
Lee, J., Bagheri, B., & Jin, C. (2016). Introduction to cyber manufacturing. Manufacturing Letters, 8, 11-15.
Li, J., Tao, F., Cheng, Y., & Zhao, L. (2015). Big data in product lifecycle management. The International Journal of Advanced Manufacturing Technology, 81(1-4), 667-684.
Min, K. S., Chai, S. W., & Han, M. (2015). An international comparative study on cybersecurity strategy. International Journal of Security and Its Applications, 9(2), 13-20.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70-82.
Shafqat, N., & Masood, A. (2016). Comparative analysis of various national cybersecurity strategies. International Journal of Computer Science and Information Security, 14(1), 129.
Sharma, R. K., & Rawat, D. B. (2015). Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17(2), 1023-1043.
Tsai, C. W., Lai, C. F., Chao, H. C., & Vasilakos, A. V. (2015). Big data analytics: a survey. Journal of Big Data, 2(1), 21.
Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cybersecurity threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169-185.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Data Security. Retrieved from https://myassignmenthelp.com/free-samples/comp3260-data-security/methods-to-reduce-the-cybersecurity-issues.html.
"Data Security." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/comp3260-data-security/methods-to-reduce-the-cybersecurity-issues.html.
My Assignment Help (2021) Data Security [Online]. Available from: https://myassignmenthelp.com/free-samples/comp3260-data-security/methods-to-reduce-the-cybersecurity-issues.html
[Accessed 18 April 2021].
My Assignment Help. 'Data Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/comp3260-data-security/methods-to-reduce-the-cybersecurity-issues.html> accessed 18 April 2021.
My Assignment Help. Data Security [Internet]. My Assignment Help. 2021 [cited 18 April 2021]. Available from: https://myassignmenthelp.com/free-samples/comp3260-data-security/methods-to-reduce-the-cybersecurity-issues.html.
For years now, MyAssignmenthelp.com is providing affordable essay help to millions of students worldwide. Our essay assistance services have helped us in assisting students with even the toughest essay assignments. We take pride in the fact that we cater the best assistance to search terms like help me with my essay. We offer affordable services in the fastest way possible. For our fast delivering services, students trust us with their urgent essay assignment needs. Two of our most popular essay writing services are maths essay help and English essay help.
Answer: Introduction In this modern era, the use of mobile communication and advanced networking is growing rapidly and many consumers are using this technology to transfer data or information from one person to another. The aim of this report is to review the journal article in the field of advanced networking and communication system and understand the views of different researchers. Wireless is an advanced communication technology which is...
Read MoreAnswer: Introduction: Patterns in the program design and in system development are very much important for the present time. Application of the patterns was first used for designing the programs. Now, the patterns are used in the data analysis, system architecture and project management (Bonfè, Fantuzzi and Secchi 2013). Patterns are a part of the Unified Modeling Language which is a commonly occurring reusable piece which can pro...
Read MoreAnswer: Introduction The internet is an open platform which allows its users to share their ideas and content on the platform. Due to its openness and independence, the amount of content shared on the internet is substantial which also include explicit content that is not beneficial for the society (Curran, Fenton & Freedman, 2016). It raises the significance of internet censorship to govern data sharing on the internet in order to ensure...
Read MoreAnswer: Introduction: A file system refers to the different methods as well as the structures of data that are used by the operating system in order to monitor the files and keep a track of the data on a disk partition. It defines the way in which the data and the files a restored on a disk partition[1]. A file system can also be defined as the partition or a disk that is required to store the files of a particular file system. In every ...
Read MoreAnswer: A performance evaluation. EURASIP Journal on Wireless Communications and Networking, 2014(1), p.89. The title of this journal paper is LTE and IEEE 802.11p for vehicular networking: a performance evaluation that was written by Zeeshan Hameed Mir and Fethi Filali in the year 2014. The main objective of this journal is to describe the con concept of LTE and IEE 802.11 and evaluate their performance. In this modern era informa...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I got a very high mark and I am satisfied with the service provided this time. Thank you!
Australia
It was great. The paper got the details and the information I needed. It was good effort.
Australia
It was good. The assignment provided good details and I got the information I needed.
Australia
GOOD! The tutor is professional, responsible and patient. The reply was timely...................
Australia