MIS607 - Cybersecurity: Student Name: Student ID
MIS607 - Cybersecurity: Student Name: Student ID
MIS607 - Cybersecurity: Student Name: Student ID
Student Name:
Student ID:
Contents
Introduction............................................................................................................................ 3
Conclusion........................................................................................................................... 12
References........................................................................................................................... 13
Introduction
This Report is based on the B&C organization which had been established within 1965. The
organization received the ransom calls from the attacker & has claimed that overall client’s
data & plans for strategies of organization has been retrieved by the caller. Numerous kinds
of threats that have been used by the attacker for stealing the sensitive data of organization
that are such as viruses & worms, malware, spyware, hacking, etc. Thus, for reduction of
these risks there are different type of plan for mitigation of risk have been carried out by the
B&C organization. By making use of this plans & strategies the performance & efficiency of
the system would be enhanced. The organization is required to follow process & regulation
with overall trained employee based on these threats. This report is mainly aimed to present
overall steps which are needed to be followed for improving & reducing the risk & also
carried out the consequences which could be erupted because of the threats.
Setting Priorities for Threat
Threat: Insider Attack
Risk Level: High Likelihood & Consequences
Elaborated: The Organization consider that Elaborated: It is used for damaging the
the level of risk for the Insider Attack is organization data & the organization might
High. It could be used for harming or lose data permanently or temporary.
misusing the organization data.
Improvement:
Performing wide enterprise risk assessment
Cyber-security, physical & work environment are required to establish
Difficult & strict password needed
Proper knowledge & training for attacks need to be offered to the employees
Appliances for security & software are required to be used in the organization.
Techniques for threat avoidance:
Offering best training need for employees
Making use of strong & complex passwords
Maintaining security by smartphones
Access for system offered to authorized & trusted employees
Threat: Spyware
Threat: Malware
Risk Level: Extreme Likelihood & Consequences
Elaborated: Level of Risk is extreme & Elaborated: File deletion, password
damages the client’s personal data. stealing, damage or harm files
Improvement:
Scanning of system is required
Backup the data
System needs on time updating
Strong Password
Techniques for threat avoidance:
Firewall installation
Antivirus required
Buy apps from authentic sources
Avoidance of suspicious links
Threat’s category Identification
As per the B&C organization that has facing the Phishing Attack & such attack make use of
the email in form of weapon. So, the Attacker could be able to transmit email within one of
device of the manager & also make them to believe that the email is authentic & beneficial
for the organization. The Attacker selects the top managers, that is because they are
comprised with overall rights for accessing the sensitive kind of data. Thus, whenever the
manager open or download the file attached with the mail then overall data which have been
retrieved by manager could be also accessed by the attacker (Gao, et al., 2020). Several
type of threats that have been faced by the B&C organization are like,
Insider Threat – The Insider Threat is the malicious action against the firm or
organization which comes from the users comprised with legitimate accessibility to
the network of organization, databases or the applications. Thus, these users could
be the former or present employee or the third party that are such as contractors,
partners or the temporary workers with overall access to the companies digital or
physical access (Tuor, et al., 2017).
Viruses & Worms – The worm within the computer is form of malware which
spreads the copies of self from one device to other. The worm has the tendency to
replicate itself without the interaction of human & it doesn’t require to be attached to
the program of software for causing the damage. It is such kind of malware that
whenever the employee clicks on any link then the malware would get within the
system of company & start replicating itself (Shin, et al., 2017).
Spyware – This are the unwanted software which are capable to infiltrate the firms
computing device, stealing the organization important data or any other information
that is sensitive for the company. The Spyware have been categorised in form of the
malware that are the malicious type software which have been designed for gaining
the access to firms’ system or for damaging the firm’s system without any prior
knowledge (Preethi, et al., 2019).
Threat with Advanced persistent – The APT (advanced persistent threat) is the
broader term which is used for describing the campaign attack within that the intruder
or the team of the intruders, are able to establish illicit, long-term presence within the
network for mining of very highly classified & sensitive data (Chen, et al., 2018).
Malware – The Malware is the code or file which has been delivered over the
network, that able to infect, explore, steal or able to conduct virtual behaviour
attacker needs. Thus, this are various in capabilities & type. The malware usually
comprised with one of below shown objective (Lim, et al., 2017).
o Offers remote controlling for the attacker for using the infected system
o Transmit span from the system that is infected for unsuspecting marks
o Investigating the local network of infected user
o Stealing the sensitive type data
Phishing – It is the form of social engineering attack that often used for staling the
data of any firm or user, comprised with the credentials of login & numbers of credit
card. It erupts whenever the attacker, camouflaged in form of trusted entity or person,
dupes with victim within opening of the mails, messages (instant) or any type of text
messages. The receiver has been then tricked within clicking the malicious links that
could lead within installation of the malware, freezing the system as the part of
ransomware attack or revealing sensitive data (Qabajeh, et al., 2018).
Hacking – This are the form of attack which always tries in gaining the access of the
system of company. Thus, by this the attacker could be simply install the malware, &
steals the data from the system that is highly classified & sensitive & also data which
is not properly secured (Buchanan, 2016).
Strategies for Mitigation of Threats
There are some of strategies for mitigation of threats which need to be used for mitigating
entire type of threats which have been faced or erupted within the organization. By making
use of such strategy, it would be simple to find the solution so that loss of data or financial
loss would be lowered by the organization. Thus, below shown are some of the strategies for
mitigation of risk & used within the organization (Gritzalis, et al., 2015).
Avoid – Generally the risks requirement to be avoided which could able to involve the
higher probability effect for both the damage & financial loss of the organization.
Transfer – The risks which might comprised with the lower probability for carrying out
place but need to have the huge financial effect that is required to be mitigated by
getting transferred or shared by the organisation. For e.g., by making purchase of
insurance, partnership forming or by outsourcing.
Accept – With help of some risks within the B&C organization, the expenses have
been involved within mitigating of the risk that is more than risk tolerance cost. Within
such situation, risks requirement to be accepted & also monitored carefully.
Limit – The most of basic strategy for the mitigation is limitation of risk. Thus, the
B&C organization need to carry out some form of action for addressing the perceived
risk & also regulating the companies exposure. The limitation of risk might usually
offer some acceptance risk & some avoidance risk.
Techniques for Resolution
Reviewing the Privacy setting
It is the better plan to review the settings of privacy annually for entire accounts
which are online. Also, comprised with those which have been connected with social
media. The options & settings could change or modify with time whenever the
developers add new features. The Hackers pays closer attention for such form of
modification in order to exploit them potentially for gaining personally. The
organization is required to be the diligent type. For e.g., verification of what
information about company need to be share publicly within each service or
application which could be used & restricted by company for viewing by others. Even
most apparently mundane type information could be for the usage of hackers,
common questions for security questions (Raul, 2018).
Staying “Secure”
The landscape of the digital security has been shifting every day & making it very
complex for the organization for navigating & planning in effective manner, let alone
been standing ahead of curve. The learning & researching about the threats,
defences & the trends would be helpful for making the company completely with
education decision. Keeping up with the trends of cyber by getting subscriber to
podcasts of cybersecurity & blogs focused on cyber that are such as Insight Blogs
digitally. Regularly, offering prospective clients & clients with the broader insight of
cybersecurity based on almost every topic from the professional team (Green, 2015).
Consequences
Likelihood Insider Worms and Spyware Malware
attack viruses
Almost Convinced Extreme Extreme High High
Probable Extreme High High High
Likely High High Medium High
Unlikely High Low Low Medium
Occasional Medium Low Low Low
Level of Risk: