Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

UNIVERSITI TEKNOLOGI MARA

UiTM PERLIS BRANCH, ARAU CAMPUS

INTRODUCTION TO CYBER SECURITY FOR NON-


COMPUTING SCIENCE (UCS422)

GROUP CASE STUDY:

A CONSTRUCTION COMPANY GETS HAMMERED BY A KEYLOGGER

PREPARED BY:
AHMAD FAYZAN BIN NAZARUDIN 2023213358
MUHAMMAD HAZWAN BIN E.A.AHMAD HUSNI 2023862778
AMIRUL AMIR BIN JONAIDI 2023248598
MOHAMAD AFFIQ BIN ALIAS 2023449646

PREPARED FOR:
TS. DR. ABIDAH BINTI HAJI MAT TAIB

SUBMISSION DATE: 11 JUNE 2024

RBA2732B
Table of Contents
1.0 Knowing how the film responded, what would you have done differently? .............. 3

2.0 What are some steps you think the firm could have taken to prevent this incident?4

3.0 Is your business susceptible to this kind of attack? How are you to going to reduce
your risk?...................................................................................................................................... 4

2|Page
1.0 Knowing how the film responded, what would you have done differently

In context of the circumstances, there are a few steps I would have taken differently
to react to and stop the incident from happening again. Initially, it must have been possible
to immediately disclose any questionable transactions, which would have made it easier to
identify and stop illegal activity. By aggressively creating transaction alerts, the company
may identify the illegal transactions immediately.

The company also needs to have put in place stronger access controls. Restricted
important account access to just key workers and requiring regular password changes
would have reduced the possibility of credentials being hacked. In addition, all major
transactions ought to have required multi-factor authentication (MFA), which adds another
level of protection on top of challenge questions and passwords.

3|Page
2.0 What are some steps you think the firm could have taken to prevent this
incident?

Thorough staff training on email security and phishing awareness is essential to


avoiding such tragedies. Employees should be able recognize suspicious emails and know
how important it is to avoid downloading unexpected attachments or clicking on
unidentified links. Frequent cybersecurity assessments and a strong incident response
method would help make sure the company is ready to respond quickly in case of a breach,
reducing potential damage.

3.0 Is your business susceptible to this kind of attack? How are you going to
reduce your risk?

In terms of vulnerability, any company, including my, was subject to cyberbullies. I


would put in place many layers of security, such as intrusion detection systems (IDS), firewalls,
and antivirus software, to reduce this threat. To fix any security weaknesses all systems and
software must get regular upgrades and patches. Using seriously cyber risk insurance could
serve as a safety net in the case of an attack by compensating for any losses and legal expenses.

Having a clear, concrete response plan, personnel training, and proactive security
measures are possibly the most significant things to be learned from this incident. These
procedures can help organisations significantly reduce the likelihood their employees will
become targets of cybercrime.

4|Page
REFERENCES

Kelly Matt Kelly is editor and CEO of RadicalCompliance.com, M. (2024, April 24). How to
create a cybersecurity incident response plan. Hyperproof.
https://hyperproof.io/resource/cybersecurity-incident-response-plan/

Admin. (2021, July 26). What is incident response?. IBM.


https://www.ibm.com/topics/incident-response

Admin. (2024, January 2). What is incident response?. Cynet. https://www.cynet.com/incident-


response/

5|Page

You might also like