You are employed as a junior security advisor at ‘BelSecure’, an IT security consultancy.
Your manager has asked you to create a report to explain IT security threats, their impact on organisations and what physical and network measures can be taken by organisations to secure any threats to their systems
Explain the impact of different types of threat on an organisation. Each of the types of threat outlined in the content should be considered.
You should provide at least one example of each of the types of threat that you explain. Remember organisations may suffer in a variety of ways and to varying extents, from relatively harmless nuisance effects to serious commercial impacts.
These include (but are not limited to) loss of service to customers, loss of business through loss of data, increased costs and loss of reputation.
In this section of your report you should describe the physical measures that can be used to keep systems secure.
Follow that by adding a section to describe features for software and network security.
The report mainly discusses on proposing the better IT security in Belsure Company. The Belsure has been a recent launched ICT company who has been looking for a flourishing and a profitable future. The company unaware of the threats and security risk wanted to create a security plan in order to encounter these threats[1] and provide better understanding about the basics of the organization.
The potential security[2] that are faced by the organisation are given by the organisation are as follows:
The organizational impact can be caused by security issue can be minor as well as major the data breach can disrupt or misused to the system to potentially damage the organization. There have been recent cases like uber cloud bleed and wannacry that have shown that there is not just loss of data but also the physical harm and loss of life. The hacking and data breach have incurred a huge loss to finance as well. The ransom ware just denies the access, but there can be chances that leaking of sensitive information.
In order to encounter the threats, the following measures can be taken:
The following features are discussed so that the stakeholders of the organisation has a brief idea about the organisation.
Beberlein, L. T., G. Dias, K. N. Levitt, B. Mukherjee, and J. Wood. "Network attacks and an Ethernet-based network security monitor." (2017).
Chen, Gaojie, Yu Gong, Pei Xiao, and Jonathon A. Chambers. "Physical layer network security in the full-duplex relay system." IEEE transactions on information forensics and security 10, no. 3 (2015): 574-583.
White, Gregory B., Eric A. Fisch, and Udo W. Pooch. Computer system and network security. CRC press, 2017.
Roman, Rodrigo, Javier Lopez, and Masahiro Mambo. "Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges." Future Generation Computer Systems 78 (2018): 680-698.[1] Roman, Rodrigo, Javier Lopez, and Masahiro Mambo. "Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges." Future Generation Computer Systems 78 (2018): 680-698.
[2] Beberlein, L. T., G. Dias, K. N. Levitt, B. Mukherjee, and J. Wood. "Network attacks and an Ethernet-based network security monitor." (2017).
[3] White, Gregory B., Eric A. Fisch, and Udo W. Pooch. Computer system and network security. CRC press, 2017.
[4] Chen, Gaojie, Yu Gong, Pei Xiao, and Jonathon A. Chambers. "Physical layer network security in the full-duplex relay system." IEEE transactions on information forensics and security 10, no. 3 (2015): 574-583.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Information Security. Retrieved from https://myassignmenthelp.com/free-samples/csi2102-information-security/it-security-in-belsure-company.html.
"Information Security." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/csi2102-information-security/it-security-in-belsure-company.html.
My Assignment Help (2021) Information Security [Online]. Available from: https://myassignmenthelp.com/free-samples/csi2102-information-security/it-security-in-belsure-company.html
[Accessed 13 April 2021].
My Assignment Help. 'Information Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/csi2102-information-security/it-security-in-belsure-company.html> accessed 13 April 2021.
My Assignment Help. Information Security [Internet]. My Assignment Help. 2021 [cited 13 April 2021]. Available from: https://myassignmenthelp.com/free-samples/csi2102-information-security/it-security-in-belsure-company.html.
Are you pursuing a PhD course program? It is common among the research scholars to struggle with their dissertation topics at the initial stage. In such a situation, getting assistance from the experts at MyAssignmenthelp.com is a wise decision. The service offers you all the necessary support on the dissertation structure and the dissertation methodology. Unfortunately, most students are perplexed about the exact format of the dissertation. However, academic experts at MyAssignmenthelp.com are ready to provide you with dissertation assistance with relevant content and format.
Question: Introduction IT infrastructure is a composition of software, hardware, services and network resources that are required for existence, management and operation of an enterprise Information Technology environment. It allows the organisations to provide solutions and services to their employees and customers. IT infrastructure components Computer hardware platforms: It includes server machines and client machines Operating System p...
Read MoreAnswers: Part 1 Introduction Sourcing entails the process of critical refers to the process of critical evaluation and analysis and the determinant of the best party to provide certain products or services to a particular organization. Sourcing is a crucial element in procurement. A recent study by (Wagner, 2006) refers to the development practices by suppliers as a strategy that is applied in procurement in order to utilize and ma...
Read MoreAnswer: Introduction In this case study, the main reason for researching and doing this report understands the way New Zealand operates and where it is based on i.e. such as understanding the facts in the industry and looking at its complexity in the environment of business during its major operations especially when we compare it with its competitors. Another area understands the competitive challenges confronting the organization and how it...
Read MoreAnswer Grocery Delivery Business Analysis Introduction The scope of small businesses in the United States has been flourishing over the last few years and this trend has been very beneficial for small business owners like in this case, grocery delivery service. The company taken into consideration is ABC Pvt. Ltd. delivers grocery from super markets to the final consumers. They have tie ups with different super markets so any online delive...
Read MoreAnswer: Problem Statement Although, Unilever is a large brand with its diverse category of products but its core product Dove faced a series of controversy due to its campaign “Real Beauty” which features fat women wearing under wear. This campaign led to media controversy as the media claims that Real Beauty Campaign does not assure its customers a promising level of beauty or attractiveness. World media raise questions abo...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
awesome job. hit the very good points. best of yet! love the work thanks so much for you service! i really like the work thanks
Australia
it was great work and in short period of time ,references were good as well. Great:)
Australia
please see comments given by tutor 1 You have not formulated an aim for this presentation and, therefore, not related it to the LOs 2 You have not identified a context to apply the theories, so you are not meeting the LOs. Although your title sta...
Australia
Thank you for your help. Really appreciated my professor really liked it. I got good grades
Australia