Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Assignment No 2

Introduction to computing – Cyber Security activity

Q.NO.1

Chatter is in charge of hosting numerous people online and giving them access to different online
services that need personal information and bank account information for registration and usage. In
order to prevent cyber security hazards to the business, the firm identified a number of security issues
that must be fixed.

First and foremost, the company's best practises put in place to protect the security of information and
physical assets must be followed by personnel with authorised access when handling the data of its
users.

The personnel must complete the required training in order to perform their duties in a way that is
responsible and professional, protecting both the company's interests and the user data. This will
guarantee adherence to data protection rules, which are subject to harsh penalties if disregarded, but it
will also give the business a setting in which to operate with users' interests in mind.

Therefore, it's crucial that corporate staff finish any required training beforehand.

Other business concerns include the possibility that credit card information used to make in-app
payments could be compromised in order to access a user's bank account.
Physical assets Potential cyber security threats to
assess

1) Apple iPhones provided to all employees Company operations and regular use
Mishandling, accidents, device loss, or data wipe
out might cause data to leak and potentially
delete important files.
2) Understanding of cyber security among If information is not handled securely and firm
employees (known as their cyber security assets are held negligently, noncompliance or
culture). negligence could cost the company its users their
data and result in lawsuits..
Ownership laptops/ domain Employees with PCAS provided by the employer
would need to log out of their work profiles
before leaving the office at the end of the day.
Work profile remote access should only be
provided with an encrypted key, as this will
ensure that official data is only exposed to the
outside world when working overtime is
authorised by the firm.
Each PC must have a separate profile and
antivirus software to ensure that using it for
generic or personal purposes does not put office
sensitive files at danger.
To ensure the most recent virus definitions and
optimal performance, routine maintenance and
software updates are required.
Information managing and security All user profiles, data, photos, chat data, and
credit card or bank account information must be
treated as confidential information and shall be
protected in accordance with all applicable local
and international data protection regulations. To
ensure that the business operates in the best
commercial interest as well as the interest of the
users and their right to data protection,
companies must keep their data handling
resources, systems, workers, and security
arrangements up to date and amended.
All official corporate data, user profiles, and data
stored on clouds and servers are all covered by
the fair use policy.
To achieve compliance, business policy and Staff members must adhere to corporate policy
security procedures training is required. and procedure in order to conduct themselves in
a safe and responsible manner, and they must
report any violations in a professional manner. In
order to ensure that data and information are
handled appropriately, safely, professionally,
and in a manner that is secure from any gaps or
could potentially raise any cyber security threats,
further training, meetings, and compliance
procedures should also be implemented.

Conclusion
Laptops used for business purposes and computers in the office must be password-protected with
verified access, and files must be stored with backups to prevent data loss.

Smart access cards with individual clearance levels help ensure that no assignment is assigned to
unapproved people and that each employee completes tasks that fall under the purview of his position.

Informational assets Potential cyber security threats to


assess

1) When registering to play paid in-app games, If user data is compromised, credit card and/or
users must provide their bank information. personal banking information may be exposed,
endangering access to personal financial accounts
or freezing accounts indefinitely.
Any transactions would lead to a serious privacy
and data breach, which would damage the
company's brand and integrity and jeopardise the
faith of its customers who rely on it to use their
information responsibly.
2) A user posted images with tags. Online sharing of this highly private information
with folks you can trust. Security risks could result
from hackers or unknown individuals having access
to personal images outside of a trusted friend list.
3) Users converse in private chat rooms with Malicious people who intend to break into chat
friends. rooms and exploit the users' contacts to access
several Chatter accounts in a huge breach might
obtain access to private chat.
2) How have other companies been affected by cyber security attacks? What can

Chatter learn from these experiences?

Company Name Description of their How might this be a


cyber security attack risk for Chatter?

National Aeronautics and It was the online identity that the . He had been able to break into
Space Administration hacker utilized. He had been able 13 computers and steal data and
to break into 13 computers and software worth $1.7 million.
steal data and software worth
$1.7 million. Following that, NASA
turned off their system for 21
days. When the agency finally
fixed its software, the loss it had
already experienced increased to
$41,000.

Question 3

 Maintain high standardize system


 Secure domains
 High educated developer

Question no 4

Cybersecurity companies

 Palo Alto Networks


 Fortinet
 Cisco
 Crowdstrike
 IBM

You might also like