Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
Note: please read the file carefully it is based on case study*****And the references should be done in APA( American Psychological Association (APA)) referencing style and the reference should contai
Note:
- please read the file carefully it is based on case study
- *****And the references should be done in APA( American Psychological Association (APA)) referencing style and the reference should contain links as well
- *****Also, I need to know which sentence is paraphrased from the source that you use.
- *****Follow the structure as attached in the below file
- All the four points below must be explained clearly in the BODY paragraph mention the headings and sub-headings but don't use the full questions in the body.
1. Explain what is cybersecurity and why it is important for ABCT?
2. Identify and explain at least 3 security vulnerabilities in ABCT’s system (you need to consider ABCT’s case as presented above). You need to justify your answer with evidence from research.
3. Do some research, and find and list 5 different types of emerging threats (that might affect ABCT) and describe each of them in detail. In your discussion include what damage the attack might cause, who is responsible for these attacks and their attack techniques.
4. Do some research, analyze the information and give your recommendations (at least 3) how to protect home and office from cyber attack.
- @
- 1030 orders completed
- ANSWER
-
Tutor has posted answer for $55.00. See answer's preview
*********************** *** Threats (ABCT ******************* *************** ********************* ****** *********************** ** ContentsExecutive summary iiiIntroduction ************* ** ************* ivSecurity *************** ********** ** ********* ******** inputs ********** ************** *** Critical ******** viiMissing **** encryption ************ Threats viiiThe ************ of *** ************ fake video *** ***** *********** ** ******** ********* ***** ********* ******** ********* in Breaking Encryption ******** *** to ******** ******** xConclusion **************** ************ xii Executive summaryABCT * ******* in high tech ******** and hardware ******** has *********** ** more significant ****** However ************* ******* **** a ********* to *** ******* ********** *** ******* utilizes a cloud ********* system ** *** services *** activities **** **** ******** ** cybersecurity ******* **** have affected ******* *********** The ******* ***** ** ******* to encryption vulnerability ** **** ** ******** on ******** inputs **** ******* the ******* ********** *** affects *** *********** ** *** ******* *** rising security threats such ** *** deepfakes poisoning ** *** ** ******** ** **** as *** ******* ** **** ********* ****** ** ****** **** companies in *** ****** ****** planning ** ******** ** ****** **** **** is *** prone to ***** forms of ******* ****** it ******** a *********** ********* ** most ** companies as **** *** ******* ** data compromised by ******* *** ********* Data ********** *** identification ** *** ************ can **** in protecting ABCT **** ******* ******* **** this ***** ******* ** ***** *** ****** *********** in *** ******* ** **** as *** emerging trends **** *** ****** performance IntroductionABC ************ ** * ******* ***** ** ********* that ****** ******* ********* ******** ** ******** and hardware As * **************** ******* * ******* ******* network ********** in ******** ** ******** in the computer systems Flexibility ** the ******* is witnessed **** *** ********* work from **** ********* *** **** ** **** in the ******* offices *** under *** ***** Your Own ****** (BYOD) ****** *** ******* ********** within *** company have ****** ********* * coherent *********** as ******* ** *** ****** ** ******* customers who ***** the ******* *** ******* ** offer free ******** *** ****** to ******** *** ******* * ******* environment *** the ******* **** *** ******** the company ** * ****** ***** ******* * ***************** ********** ******* ******** issues **** to ********** *** ****** of *********** ** *** ******* **** the ***** ****** ** *** storage of ******** and ******* *********** Despite *** normal ********** *** ******* **** ***** have **** *********** by ********* *** ******* ******** **** ***** in *** ************ ******* to ********* ********* ******** ***** **** ** **** ** ******* *** ******* as ***** ** no ********** ***** ******* ************* tend to ******** ******** ** ******* *********** *************** **** ** ***** ***** impact the company ********** ******** in ******** measures has always ******** in **** ****** **** ********* ************* ********** *** **** ** ABCT ** have ************* ******** ***** ** ******* *********** ** al ***** ** ** *** **** ****** **** *** ***** ***** ** address the cybersecurity ****** *** *** ****** *** ***** ******* **************** ** CybersecurityCybersecurity ****** ** *** *** of ********** ******* networks ** **** ** *********** technology ******** **** ********* of ******* attacks *** ************ *** ******** to ****** and ****** sensitive *********** upon ***** ** ** ********* *** ransom Cybersecurity ****** **** ** ******** ****** ********** *** organizations such ** **** ***** is * **** ** ********* ************* ******** *** ** *** ********** ****** ** ********* ******* cybersecurity is essential ** business such as ABCT Cybersecurity measures *** ***** ** *** ********* and the ************ itself Most ********** do *** **** ** be ******* ** cybersecurity (Megha ***** **** *** ******** ***** initiate * security **** **** is compact ** ***** *** ***** ** **************** ****** crisis ********* in **** ***** a threat to ******** operations *** cyber attackers aim ** access *********** ****** ** the company ***** ****** **** **** **** a good ******** system it **** protect *** ************ ******* any ************* ******* ** **** **** **** **** *** benefit **** ************* measures ******* information ********** but *********** ******* **** ******* ** employees *** ********* ****** ***** *********** *** **** ******** ******** in *** company **** **** to ******* the *********** ** *** systemsMassive costs *** ** witnessed **** *** ******* does *** ******* ****** from *** ************** *** the **** ** **** ** **** have ** have to implement advanced ************* ******** due ** *** costs *** ******* **** *** ** ******** **** *** ********* The ******* ********** *** ** spoilt when proper ******** *** *** utilized *** **** ****** ** * big ******* *** **** ********* apart **** **** Company *** ****** information ******* ******* due ** * security breach In *** **** run ************ **** ** *********** due to *** ******* actions ** ********* *** ***** ******** ****** *** **** ******** ****** is enormous **** ***** * ********* dimension for *** **** ******* **** is ******* ** ensuring **** *** ******* ********** ******* ******* *** hitches ************* ** *** ******* will ** ********** ** protect *** ******* ***** ** ** *********** ********** ******* any cases ** * **** ****** can **** ** * **** ****** to ***** ********* ** ******* who *** **** ******** ************ **** **** ***** ******* *** to *** ********* ** *** **** breach ****** ***** ** may **** ************ **** ** ****** ******* ********************* ***** *** evolving **** ************* methods *** ******** ***** ******** is not ** prevalent ** the ********* *** ** *** ***** **** ***** many ******* **** resulted ** many ****** ************** **** ****** ** ** * ********* and **** has resulted ** **** ******** ******* ******** ******** *** ******** ** the *********** commissioner's ****** ***** *** ************** ** *** **** ***** ** offer **** ********** to ********** **** **** initiates measures data **** ********** ** ******** **** ***** **** ******** ** *** ******* ** **** ********** When *** ************ ***** ** ******** ******** damages *** ** ********* ** the ********* and business as a ***** *** ** *** diversity ** *** information ****** *** **** to **** **** ********** ********** *** ******* ****** alternatives for progress **** *********** **** ** *** ****** ****** ** ******* ** ********** users' ***** ** **** ****** leaks ******* ****** 2018) *** different types ** ************* ****** ******** *** ********** **** exist ** security ******* *** the ************ to **** cybersecurity ******** **** improve *** security systems ** *** ********* *** *** ******************** VulnerabilitiesComputer *************** ***** *** ** hardware *** ******** ******** The ****** *** ** vulnerability is ******** and ******* **** is **** **** ********** measures *** *** utilized *** case ** ABCT ** ** ********* *** ******* ********* for the ***** ** ********* **** ** **** *** *** workplace ******* *** ***** **** Own ****** ****** ****** *** ****** ******* ** ******** *************** when ********* *** ******** **** time ** *** **** ****** ******* ********* ***** virtual network ********** ***** are ***** **** computers *** *** ********* ** ******** * **** ******** ***** ** the protection system ******* the measures ***** present ******* ** ** also ********** *** ******** software ******** outsiders ** *** inner *************** ** the operating system *** instances ** ***** * **** ***** the ******* ** *** ********* system ******* any ******* ************ ***** likely **** ** ******* vulnerabilities (Solar winds 2019) *** *** **** of **** ***** *** ** ** ******** *** *** ****** *** cloud ****** and participate ** **** ** ************** ******* ** **** ****** ** *** **** ******** ** **** *** ******** vulnerabilities can ** *** ******* ************** *** *** ******** information reliance ** untrusted ****** ** well ** missing **** encryptionReliance ** ********* security ********* ************ may ****** **** ** relies ** ********* security ****** Reliance *** ** **** ** ****** ******** ********* **** *** **** *************** A ****** ** inputs **** as ******* the hidden **** ***** *** ***** **** ***** *** ********** ******* in *** ******** **** *** not ****** *** ***** As * result any ******* that ******* to security **** ** ************* based on the ****** ****** *** **** ** ********* of *** ******** ******** The ************* ** *** ***** ****** ** ****** to ***** modification ** *** ********* data *** eventual execution ** *** arbitrary ***** due ** *** ***** ***** modifications ************** ******* 2018) **** vulnerability can ***** **** ***** ** implementation of *** architecture and ****** ** the company ************* ************** *** ******** *********** *** case ** ABCT ******* to **** ******** ********** of * **** ******* ** **** * problem ******* ** **** ********** identity ******* to ****** to vital *********** ************* causing **** problems **** *** arise ****** *** ************ *** ****** ***** in *** *********** *********** ******* **** can be ** **** when *** ************* ****** ** unauthenticated ****** ******** to **** ************** ** *** application to **** ************** ****** *** ****** due to the vulnerability ****** **** information ********** ** well as complete *********** ********** Some ** *** attack ******** *** be *** ** *** ******** CAPEC-36 ** **** ** CAPEC 40 ****** ***** Jain 2018) ******** **** ****** termed *** problem ** ** language dependent and **** ***** in multiuser ****************** Data encryptionFindings reveal ***** ************ to **** **** ***** due ** instances of ******* **** ***** *********** access **** it ***** to **** to devastating implications ******** ***** ** *** data ****** and ********** attacks *** due to ******* ** ************ the **** networks *********** tend ** ******* *** data **** any internal and ******** ******* **** *** ******* ******** ********** ******** **** ** ********** **** ***** encryption ***** ** make *** *********** ********** ** ***** *** keys **** to ****** the *********** When ***** is * ******* ** ********** ** *********** **** *********** will ** ******** ** *** ********* and **** ***** **** ** **** ****** ******* encryption ***** ** lead ** *********** ******** and the *********** ******* readable ** *** *********** ** *** decoded ********* ***** Therefore the ******* ****** ****** *** *********** ******* *********** to **** it more ************** *********** **** *** ******* ****** ***** tend to pose **** ********** ** ******* ********** *** instance *** use of ********* ******** ** **** down ******** ******* **** ********** It ******* *** **** of ********** **** *** ********* ** *** ******** sector However life-threatening attacks with **** ***** **** **** developed **** time **** of *** ******** ******* ** cybersecurity *** the exploitation from Al-generated **** ****** *** audio ********* Al-defenses ******* ***** contracts ******* **** the ******** cloud ** **** ** the *** ** quantum computers to ***** *** ********** *** ******** ****** *** ** *** ******* ** *********** ************ ** *** ************ fake video and *************** ************ *** ******* an *** ** fake video and ***** *********** The **** video *** ****** are ******* ********* ** distinguish from **** ***** *** ****** ******* develop fake information ** * ****** of **** The *** of ************ ******** ****** ** to **** ****** **** ****** crucial and ********* **** **** as passwords The ******* ** ****** ** *** ** *** **** effective ***** ******* **** often ******* **** ****** *** ****** *** **** ******* ************** ***** *** phishing email *** ******** is ***** to **** *********** **** *** ****** ******* ** detrimental ****** **** ***** it *** ** **** ** ******* ** ********** ***** prices **** *** ***** when a fake video in circulation ****** *********** ** a company **** ** in deep ****** Other ******** **** *** when the ********* *** **** to spread ***** information ** ********* ****** *** deepfake **** ********* *********** that is created ** ** ******** but ** not **** *** ****** **** lured by **** **** ** *********** *** ** turn ****** ************* losses (Giles ***** *** use ** ****** ********* **** ******** ******** has *** ** * ************ atmosphere of ******** ********* **** **** ** create * false impression ** * ****************** ** ********** ****** **** been used ** ****** ************* ************* attackers **** **** **** ** corrupt *** defenses ******* ** **** ******* *** AI ***** ***** ** ******* ******* **** ***** *** ** has **** used ** ******** sophisticated attacks ** *** ***** ** hackers **** ***** ** occurs **** *** Generative *********** ******** *** **** ** ******** *** ********* ********* *** use *** ** ***** *** ********** *********** ******* *** *** neural ******** which ***** ******* *** ******* The ********* ***** ****** *** **** **** **** *** ** **** to ***** *** models *** in ****** poison **** *** of the ********* ********** *** ******* *** switch ** ****** ** the ******* that ******* ********* code ** **** **** *** labels are **** **** ********* ******* *** ****** *** * ********* ****** ** the ****** **** *********** ***** contractsMore ***** *** smart ********* involve the ******** ******** ***** *** ****** on *** ********** *** have * role ** ********* execution ** **** **** ** ******* ***** ******** **** *** conditions *** ** be met *** **** of **** ************ may ** ******** as **** *** ** **** in ******** ******** from the ************ *** *********** *** *********** in design *** *** associated **** ******* the ***** ********* ******* and ****** Researchers **** ****** *** *** privacy-preserving ************ ** *** ***** contracts ** **** ** ********** and attack by *** software programs ******** ** ****** monetary ************ (Giles ***** **** organizations ********* ** **** **** be ******** ** this **** ** ************* ********* in Breaking ***************** ********* **** **** ***** ** ******* exponential ***** ** ********** ***** *** ** the long *** they crack the encryption **** ***** ** the ********** ** ************ **** ** *** organization **** may ****** * ****** of organizations ** ***** information will ** accessed with **** ease * ***** ** ******* ********* *** encryption algorithms **** can **** ** ************ and ******* ******* ** an emergency ******** *** **** ******** ** ************ ************ ** help ** ******** security ** *** ************* ************ ****** ***** **** ********** ***** is * potential ************** due ** ******** ************ *** ********** **** *** **** ** **** *** *** workplace Companies that ***** **** on *** ******* are at a **** risk ** **** **** *** ***** ******* *** compromised ** *** ********* *** have an ******** ** company *********** *** ***** ******* *** ******* on **** ****** ******* ** *** expense ** ******* ******* The ****** *** to *** ****** ** ******** ******** ******* **** **** involved ** ensuring **** ********** ******** *** present This is aimed at ******** that the ***** servers *** *** compromised ********* cloud ******* offer **** threats to ********* **** ******* ***** ********* ** their ******* can ** *********** *** data *********** (Somani et ** ***** **** *** ****** ************ for the company ********** It poses ** * ********** ***** ***************************** ** * *********** threat ** **** ************ *** ************ by *** attackers is centered ** ******** **** ********* information is ******** with **** ease *** case ** ABCT is * ***** ******* of *** ********* may be ********** *** ** *** ******* by *** ********* ** presents **** ********** ** the ******* and **** **** ************* **** ** ******** ******** ** ********* *********** *** **** *** ** **** ** *** request ** a ****** *** ************ **** emerge ** data security remain * challenge The ******** ******* **** ****** ********** ******* ** ******* further ********** Cloud ********* ******* are ** *** **** *** **** ** no ********* **** ** ******* *** trust ** ****** ******** among **** companies *** the case ** ABCT *** ********* and ******* ***** **** trust **** *** **** ** lost in the company *** strict ******** *** ************ ********** ***** ***** *** ******** ** stipulates *** ************* are vulnerable to ************* ************************** the ************ ****** ******** all *** ********** ****** ******* ** the application ** ensure that **** *** **** ******* ** *** encompass the *** ***** that ******* *** ********* **** **** in *** cloud ******* Such practices **** ** eliminate potential ******** authorization ****** that *** be realized ** the ***** ****** ********* **** there ** the ************** ** the administrative functionality *** ****** ** ************* will ** reduced It is ************* **** *** ******* ****** ********* *** *********** ** ****** **** the ****** **** ***** due to ********** *** addressed It ******** *** ***** ********* ** **** can lead ** *** ************* ** secure *********** ************ **** **** ***** *** ****** permissions *** ************* ******** *** issues of ************ ** untrusted ******** applications can be addressed ********* *** ******* ****** ******** the **** roles ** ****** that the ****** permissions *** well ********************************************************** ******* -807 – ****** ******** on ********* ****** in * ******** ******** Retrieval ** *** 18 **** ********************************************************* ******** ****** ******* ************** *** ******** Function [cwemitreorg] Retrieval ** May ** **** https://wwwimmuniwebcom/vulnerability/missing-authentication-for-critical-functionhtmlMartin ***** ****** Five ******** cyber-threats ** ***** about in 2019 ********* ** May ** **** **** *** ********** Review ********************************************************************************* * ****** ** Patent *********** No ******************* S Konstantinou * **** * Davi * ******* * * ********** M ***** Karri * ****** The ************* ********* in ********** ******* ******* *********** ** the **** ****** 1039-1057Megha **** ****** ********** of ************* in ******** ********* on *** ** **** **** *** **** Funnel ******* **************************************************************************************** ******* ****** *** ********** ** maintaining ***** ******** ** your ******** Retrieved ** *** ** **** **** *** ** ********* ******* https://wwwitproportalcom/features/the-importance-of-maintaining-cyber-security-in-your-business/Singh A ***** **** A ****** ***** ** ***** ******* ** ************** System ************* *** *************** ***** (2019) *** Computer ******** *************** ********* ** May ** **** *************************************************************************** G **** M * Sanghi * ***** * ***** ***** * ****** DDoS attacks ** ***** ********** Issues ******** *** ****** ****************** ***************** *****************************