Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Exploring and Mitigating Information Security Threats: A Study on Causes, Nature and Solutions
Answered

Objective

To explore, analyse, deliberate and recommend security technology solutions for the Information Security Threats

Northbridge Consultants provides consultancy services to large and medium enterprises in areas relating to Internet businesses. The chief executive saw an opportunity to sell their Information Security technology services to clients based on the CrowdStrike 2021 Global Threat Report. 

Northbridge Consultants wants to do a full study into reported security threats and compile a report for Internet businesses.


Your company has been engaged by Northbridge Consultant to study these security threats on their causes, nature and mitigation.

1. Attacks on the Internet of Things (IoT) will focus on smart home automation.

2. Mobile devices will become targets that are even more attractive.

3. Machine learning will be a game changer in the fight against cybercrime.

4. Privacy will continue to be sacrificed for mobile apps.

5. Scammers will continue to run profitable ransomware scams.

6. Distributed denial-of-service (DDoS) will continue to rise as a threat.

7. User behaviour will take centre stage as security moves beyond passwords.

8. The Cloud will take us to Infinity and Beyond.

9. The front lines of cybersecurity will be strengthened by closer industry partnerships and collaborations.

10. The Need for Improved Security on IoT Devices Will Become More Pressing

11. Opportunities For Cybercriminals To Compromise Apple Devices Will Grow

12. The Battle Between Ransomware Gangs and Malware Distribution Networks Will Heat-Up

13. Cyber Attacks and Data Breaches Will Drive the Need for Cyber Insurance

14. Risk of Serious Attacks to Critical Infrastructure Will Increase

15. The Need for Encryption Escalates

16. The Tipping Point for Biometric Security Is Approaching

17. Security Gamification and Simulation Will Tackle the Security Awareness Challenge

1. The study must include 4 sections: the description, nature of threat and threat mitigation and conclusion.

a) Description: What is the cause of the threat? Why is it a threat?

b) Nature of threat: What are the potential threats faced by online users? Provide more information about the threat e.g date launched, the 
damage caused by the threat, who are the affected users etc…? 

c) Threat mitigation: Provide recommendHow can the threat be avoided, minimized or controlled?

d) Provide an overall conclusion to the threat.

2. Write a report in MS Word document (Between 500-1000 words). The report MUST provide references using hyperlink tags to web sites. You are expected to organize, elaborate and expand on each of the threats. Reports with large portions copied from the original reference will not gain any marks.

1. Cover Page and Index (10 marks)

2. Executive Summary (A short intro of your report, 1 or 2 para) (10 marks)

3. Report Formatting (10 marks)

4. Main Content (2 threats)

• Description of Threat (10 marks)
• Nature of Threat (20 marks)
• Mitigation of Threat (20 marks)
• Conclusion (10 marks)

5. Text References (10 marks)

support
close