Context Following the case study are now required to propose and discuss specific solutions to comprehensively address ALL vulnerabilities in GM’s IT infrastructure and operation. Your report should...

1 answer below »

Context


Following the case study are now required to propose and discuss specific solutions to comprehensively address ALL vulnerabilities in GM’s IT infrastructure and operation.


Your report should not only focus on the technical solutions to enhance cybersecurity at the case study business, but also to focus on the human factors and a robust company-wide policy framework.


The audience of your report is the management of the case study business who do not have a technical background.


Instructions




  1. Read the attached case study again.




  2. In your group, write a 2500-word report to the GM management that focuses on:




    1. technical solutions in enhancing cybersecurity




    2. the human factor and a robust company-wide policy framework






  3. Ensure that the recommendations made in the report are specific, actionable and based on


    the case study.




  4. Report structure




    1. Title page: Subject code and name, assessment number, report title, assessment due date, word count (actual), student names, student IDs, Torrens email address, campus learning facilitator, and subject coordinator.




    2. Table of Contents (ToC): It should list the report topics using decimal notation. It needs to include the main headings and subheadings with corresponding page numbers, using a format that makes the hierarchy of topics clear. Because you are including a ToC, the report pages should be numbered in the footer as follows: the title page has no page number, and main text needs to have Arabic numerals commencing at 1. Create the ToC using Microsoft Word’s ToC auto-generator rather than manually typing out the ToC. Instructions can be found here https://support.office.com/en-gb/article/Create- a-table-of-contents-or-update-a- table-of-contents-eb275189-b93e-4559-8dd9-c279457bfd72#__create_a_table.




    3. Introduction (180-220 words): It should provide a concise overview of the problem you have been asked to research, the main aims/purpose of the report, the objectives to be achieved by writing the report and how you investigated the problem. It needs to provide an outline of the sections of the report.




    4. Body of the report (use appropriate headings in the body of the report) (1890-2310 words): Ensure that you address the tasks listed above. Do NOT use generic words such as ‘Body, Body of the Report, Tasks’ as section headings. Create meaningful headings and subheadings that reflect the topic and content of your report.






MIS301_Assessment_2 Part B_Brief_Case Study Report_Recommendation of Solutions Module 5.2 Page 2 of 7


e. Conclusion (180-220 words): Restate the purpose of the report and key issues investigated and the related findings based on your research and analysis.




  1. Reference list.




  2. Appendices if necessary.






  1. Before submitting your assessment, check it against the assessment criteria and the marking


    rubric included in this brief to ensure that you have satisfactorily addressed all the criteria thatwill be used to assess your submission



Answered 1 days AfterApr 19, 2022

Answer To: Context Following the case study are now required to propose and discuss specific solutions to...

Dr Raghunandan G answered on Apr 20 2022
101 Votes
Table of Contents
    
    Chapter
    Page No
    Chapter 1
    Introduction
    2
    Chapter 2
    Technical Solutions in Enhancing Cyber security
2.1. Big Data Analytics
2.2. Block chain
2.3 Artificial Intelligence
2.4 Secure remote a2.5 Virtual Private Network (VPN)
2.5 Virtual Private Network (VPN)
2.6 DDoS prevention / mitigation
2.7 Cloud access security broker (CASB)
    3-4
    Chapter 3
    Human factor and a robust company-wide policy framework
    4-5
    Chapter 4
    Existing Issues and Vulnerabilities
    5-6
    Chapter 5
    Propose recommendations to i
mprove the cybersecurity.
    6-8
    Chapter 6
    Conclusion
    8
    
    
    
1. Introduction
The Global Mall(GM) has experienced tremendous rise, and their global operation reported a volume of transactions of 0.3 trillion dollars in 2020.GM management has been primarily focused on business expansion in recent years, overlooking the potential for cyber threats. Having numerous cyber attacks making news and other organizations of relate directly being attacked as a result of such intrusions, management has become more cognizant of the necessity of cyber security in their operations. In this report we tend to focus on few of the technical solutions for improving the cyber securities, the human factor and a robust company-wide policy framework, find out the existing issues and vulnerabilities in the functionalities and finally propose recommendations to enhance the cyber security.
2. Technical Solutions in Enhancing Cyber security
2.1 Big Data Analytics
Organizations like Global Mall(GM) are seeing revenue growth like they've never seen . However, we've see that this data is bringing the world vulnerable to cyber threats. According to paper[1]big data analytics can search among a range of data, both past and current data, examine it, and provide cyber security insights.
1. The quantity of information - Capacity: The quantity of datasets, or the volume of data generated, is an important consideration.
2. Data creation and transmission speed (Velocity) - Complexity: the structure, behavior, and variations of datasets are all important.
2.2 Block chain
The information that is used to conduct online financial activities is saved in a database of financial sector. These financial services usually require central data infrastructure. However, the situation has changed. The remarkable properties of block chain aid in the protection of data from cyber attacks. Global Mall can use block chain to process information in a decentralized ledger on a block chain system. Validation is required before any admission, sharing, or addition to the data on a block chain ledger. Before they may record fresh data, read it, or update it, the relevant parties on the block chain network must first input the password (a mixture of private and public keys). Hackers will find it difficult to decrypt the keys in practice. As a result, block chain gives businesses a safe place to keep their digital assets, ensuring cybersecurity.Private, public or permission less block chains, and federated or consortium block chains are the three basic types of BT. Permission block chains, both personal and consortium, require a license management body to allow network access to trustworthy participants. Multichip, Monax, and Quorum are examples of private blockchains[2].
2.3 Artificial Intelligence
Global Markets are increasingly being targeted by cybercriminals who want to exploit their digital content. To overcome this, Artificial Intelligence has the potential to play a significant role in assuring cyber privacy. The model can provide correct information on hacker assertiveness by programming the AI system with the right data on prior attacks. Upon obtaining advanced analytics into hacker activity, effective remedies may be constructed. Scholars, entrepreneurs, security specialists, researchers, and everyone else discuss about the uses of AI learning algorithms in cyber defence at practically every cyber security conference. Few believe that [3] artificial intelligence may eventually substitute human analysts. In this direction, either unsupervised or supervised machine learning techniques are applied.
2.4 Secure remote access
The only factor a hacktivist needs to effectively target your company is connectivity. Devices and Users with access to certain internal or cloud-based resources are limited by access restrictions systems. Zero trust network access enables users to access private and cloud-based content without putting their device on the company network and safe network access are examples of modern access control methods[4]. In today's ubiquitous computing era, one of the most common business trends is the utilisation of secure remote access to corporate resources via an encrypted tunnel established throughout the network.
2.5 Virtual Private Network (VPN)
VPNs protect traffic between a distant terminal (such as a user WFH home) and the enterprise network. The benefit of adopting OpenVPN for a VPN is that the small chain will be larger, and the time required to interconnect the local network to different locations will be reduced[5]. When compared to using a wired connection as a conventional process of WAN implementation, it lowers operational expenses. Since it does not need wires, a VPN can lower the amount of setting up a network (leased line). Enhance scalability and accessibility from any location by using a VPN to internet connection (Access remotely).
2.6 DDoS prevention / mitigation
DDoS threats are aimed to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here