country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

ENGR8762 Computer Networks And Cybersecurity 2

tag 0 Download5 Pages 1,172 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: ENGR8762
  • University: Federation University
  • Country: Australia

Question:

Discuss about the ENGR8762 Computer Networks and Cybersecurity.
 
 

Answer:

Introduction:

Cyber security is a concern that is gaining more and more importance within the organizations in today’s world and needs to be addressed on an urgent basis. There are different kind of cybercrimes that take place across the organizations all across the world.

In this report, the different control measures for the different categories of threats will be discussed in details, which will give the reader a clear understanding of the threats and the associated mitigation techniques. By the end of the report, the reader will have an in-depth understanding of the different mitigation techniques as well as the categories of the different kind sof threats that are prevailing in the organizations in todays world.

Accidental corruption of information:

  • Usage of proper antivirus programs
  • Regular troubleshooting of system and application issues.
  • Hardware as well as software should be properly updated.

This is the issue faced by many companies today, wherein the important data gets corrupted accidentally due to different reasons such as malware infection and improper troubleshooting of existing issues within the systems of the organizations. The data is corrupted or copied in multiple locations and are often decrypted causing them unable to be read or opened (Wu and Irwin 2016).

Classification and type:

Usage of proper antivirus can be classified as a product based solution for this issue, while regular hardware and software troubleshooting can be classified as physical control measures. These are aimed to prevent any kind of data corruption in the organizational systems and workstations.

  • By using patents, trademarks, trade Secret as well as Copyrights.
  • Incorporating a proper SLA (Service level agreement) with other third party organizations and doing proper research before sharing any confidential information with anyone..

Protection of intellectual property is aimed for protection of inventions, artistic as well as literary works such as symbols and images, which are created by the organizations out of creativity.

Classification and type:

Usage of patents and trademarks is for preventing the loss of intellectual data, It is classified as administrative in nature. An agreement or SLA is signed in the beginning with the third party organizations so that the third party companies’ to the parent company in case of any misconduct can provide proper compensations. Therefore, it is also an administrative feature.

  • Licensed software’s should be used for enterprise purposes.
  • Illegal download of software’s should be prohibited within the organizations.

This is an issue where software’s are illegally pirated or used in other systems by illegal download from the internet in order to avoid the license fees associate to its usage.

The control measures such as usage of license is administrative in nature, which should be incorporated by the system administrators. It helps in checking as well as identifying the authenticity of the software’s being used in the organizations.

Theft of information (hacker):

  • Usage of network firewalls.
  • Use of audit trail features in the enterprise data workstations.

The hackers are stealing confidential information of the organizations remotely by bypassing security measures of the organizations. They release Trojan horse, which is a kind of virus as well as phishing frauds into the organizational computers (Mahmood and Afzal 2013).

Network firewall is a product, which helps in preventing attacks from hackers. Audit trails are also a product-based feature, which can help in detecting who accessed what information and from which system in the organization.

Theft of information (employee)

  • Ensure employee job satisfaction
  • Introducing strict data policies within the organizations and ensuring that the employees abide by the same.

Employee vandalism occurs when the employees have a revengeful tendency towards a particular fellow employee or the organization as a whole and purposely wants the data of the organization to be corrupted for his own personal or professional interests.

Both the control measures are administrative in nature, which helps in preventing the acts of employee vandalism within the organizations.

 

Website defacement:

  • Detection as well as defacement monitoring tools should be used.
  • Adequate response techniques should be ready in case of any such incidences.

It is a malicious attack that a website can face which will in turn change the appearance of the website. The hackers break into the company servers and replace the appearance of the hosted website with their own.

Classification and type:

It is a product-based solution since the monitoring tools are specialized defacement testing products that helps in preventing such an incidence. Response techniques are administrative in nature in order to counter attack such indecencies once they have already occurred.

  • Important data systems should be kept at elevated stores within the organizations.
  • Fire extinguishers should be there on all floors of an office building

Description of the issue:

Flood is a natural calamity that can cause damage to the systems as well as the networks. Fire can cause massive burnouts of the systems and organizational infrastructures.

These control measures have to be carried out physically in order to prevent as well as counter attack the issues.

  • Background verification of all system administrators should be carried out.
  • Preventing escalations of privilege accounts.

Description of the issue:

This issue occurs when data, which is supposed to be accessed by officials of higher privilege, are actually accessed and illegally used by users of lower privilege, within the organization.

The control measures are administrative in nature and both the measures help in preventing users of lower privilege to access data meant for higher officials.

Theft of equipment:

  • Ensuring more tight security features such as CCTV cameras in all rooms.
  • Alarm systems in all floors of the workplace and tight security guards at every doors.
  • Description of the issue:

This issue occurs when there are any kinds of threats of any physicals devices such as laptops or other sensitive equipment’s from the workplace that can contain sensitive organizational data.

Classification and type:

These are physical in nature and helps in preventing as well as identifying the thief in case a theft has already occurred within the organization.

Viruses, worms and Trojan horses:

  • Use of antivirus programs.
  • Description of the issue:

Virus infections can cause data theft as well as privacy breach by the hackers.

Classification and type:

This is a product-based solution such as usage of enterprise antivirus programs like Kaspersky internet security, which prevents such virus attacks.

Conclusion:

Therefore, it can be concluded that if the organizations have proper knowledge about the mitigation techniques of the data security issues as discussed above, they will be able to prevent all possible security threats. If the organizations can consider these threats at the time of implementing any new technology, it will be able to reach newer heights within their work culture in terms of their data and information security.

 

References:

Mahmood, T. and Afzal, U., 2013, December. Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools. In Information assurance (ncia), 2013 2nd national conference on (pp. 129-134). IEEE.

Wu, C.H.J. and Irwin, J.D., 2016. Introduction to computer networks and cybersecurity. CRC Press.

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Computer Networks And Cybersecurity 2. Retrieved from https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-2.

"Computer Networks And Cybersecurity 2." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-2.

My Assignment Help (2020) Computer Networks And Cybersecurity 2 [Online]. Available from: https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-2
[Accessed 28 February 2020].

My Assignment Help. 'Computer Networks And Cybersecurity 2' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-2> accessed 28 February 2020.

My Assignment Help. Computer Networks And Cybersecurity 2 [Internet]. My Assignment Help. 2020 [cited 28 February 2020]. Available from: https://myassignmenthelp.com/free-samples/engr8762-computer-networks-and-cybersecurity-2.


If you are looking for interesting essay topic ideas, we are the best essay writing services. Whether for a narrative piece or a persuasive one, our topics will keep your professor, and other readers intrigued. Our team of experts can also provide you with the best essay writing help if you want to make a quality submission. Apart from suggesting essay topics and writing them for you, we also offer complimentary editing and proofreading services. Call us for more details.

Latest Networking Samples

ENGR8762 Computer Networks And Cybersecurity Method

Download : 0 | Pages : 6

Answer: Introduction: In their general definition, acceptable use policies are written documents stipulating out both the restrictions and practices regarding the usage of organization technology. They describe various activities which employees are allowed and others restricted to do using the organization networks, systems as well as computers. Drawing from that perspective, therefore, an email acceptable use policy can be defined...

Read More arrow

ICT120 Introduction To Computer Networks Assignment

Download : 0 | Pages : 14

Answer: Introduction Smooth and reliable communication is significant for companies to realize economical routine operations.  There is need to provide seamless communication between EZY –Books headquarters and the branch offices. A lot of time and resources are wasted in the traditional way of storing information and data.  It is quite worth noting that there are higher chances of losing locally stored data. Data and informat...

Read More arrow

BN321 Advanced Network Designing

Download : 0 | Pages : 7
  • Course Code: BN321
  • University: Melbourne Institute Of Technology
  • Country: Australia

Answer: Introduction There is a requirement in Excelfior Ltd. To rebuild their current network framework as there are different security issues and outdated hardware devices used. The company is a digital communication company and works in Melbourne for designing managing and hosting the website of the company. The number of departments in the organization should be identified and the developed working in the organization are identified for t...

Read More arrow

ENGR8762 Computer Networks And Cybersecurity 2

Download : 0 | Pages : 5
  • Course Code: ENGR8762
  • University: Federation University
  • Country: Australia

Answer: Introduction: Cyber security is a concern that is gaining more and more importance within the organizations in today’s world and needs to be addressed on an urgent basis. There are different kind of cybercrimes that take place across the organizations all across the world. In this report, the different control measures for the different categories of threats will be discussed in details, which will give the reader a clear under...

Read More arrow

ICT310 System Analysis And Design System 1

Download : 0 | Pages : 11
  • Course Code: ICT310
  • University: University Of Sunshine Coast
  • Country: Australia

Answer: Introduction The essence of this report is feedback to the manager who wanted a system analyst to shade more light on agile or adaptive software development methodologies. The report discusses adaptive software development and introduces the various methodologies related to it. It further expounds on scrum and extreme programming agile methodology giving a recommendation to Pty Ltd on the methodology that is best suited for the implem...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,207,754

Orders

4.9/5

Overall Rating

5,062

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

184 Order Completed

96% Response Time

Arapera Billing

Masters in Management, MMgt

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2632 Order Completed

100% Response Time

Albert Ambrosio

MSc in Nursing

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

I want to say my sincere gratitude to the person that did my assignment it ready boast my grades this term I hope everyone can follow your example to do a good job not just the money, and you done have a rash, please pay attention to our assignments...

flag

User Id: 298083 - 28 Feb 2020

Australia

student rating student rating student rating student rating student rating

Awesome! This really helped me out. I was unsure of what to do for this assignment and I ended up getting an A

flag

User Id: 374987 - 28 Feb 2020

Australia

student rating student rating student rating student rating student rating

Thank you very much I am happy now I have successfully graduate because of you guys

flag

User Id: 175117 - 28 Feb 2020

Australia

student rating student rating student rating student rating student rating

All things were good, the experts know what they do. I completely recommend students to visit this site.

flag

User Id: 360584 - 27 Feb 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?