Answer To: Context Following the case study are now required to propose and discuss specific solutions to...
Dr Raghunandan G answered on Apr 20 2022
Table of Contents
Chapter
Page No
Chapter 1
Introduction
2
Chapter 2
Technical Solutions in Enhancing Cyber security
2.1. Big Data Analytics
2.2. Block chain
2.3 Artificial Intelligence
2.4 Secure remote a2.5 Virtual Private Network (VPN)
2.5 Virtual Private Network (VPN)
2.6 DDoS prevention / mitigation
2.7 Cloud access security broker (CASB)
3-4
Chapter 3
Human factor and a robust company-wide policy framework
4-5
Chapter 4
Existing Issues and Vulnerabilities
5-6
Chapter 5
Propose recommendations to improve the cybersecurity.
6-8
Chapter 6
Conclusion
8
1. Introduction
The Global Mall(GM) has experienced tremendous rise, and their global operation reported a volume of transactions of 0.3 trillion dollars in 2020.GM management has been primarily focused on business expansion in recent years, overlooking the potential for cyber threats. Having numerous cyber attacks making news and other organizations of relate directly being attacked as a result of such intrusions, management has become more cognizant of the necessity of cyber security in their operations. In this report we tend to focus on few of the technical solutions for improving the cyber securities, the human factor and a robust company-wide policy framework, find out the existing issues and vulnerabilities in the functionalities and finally propose recommendations to enhance the cyber security.
2. Technical Solutions in Enhancing Cyber security
2.1 Big Data Analytics
Organizations like Global Mall(GM) are seeing revenue growth like they've never seen . However, we've see that this data is bringing the world vulnerable to cyber threats. According to paper[1]big data analytics can search among a range of data, both past and current data, examine it, and provide cyber security insights.
1. The quantity of information - Capacity: The quantity of datasets, or the volume of data generated, is an important consideration.
2. Data creation and transmission speed (Velocity) - Complexity: the structure, behavior, and variations of datasets are all important.
2.2 Block chain
The information that is used to conduct online financial activities is saved in a database of financial sector. These financial services usually require central data infrastructure. However, the situation has changed. The remarkable properties of block chain aid in the protection of data from cyber attacks. Global Mall can use block chain to process information in a decentralized ledger on a block chain system. Validation is required before any admission, sharing, or addition to the data on a block chain ledger. Before they may record fresh data, read it, or update it, the relevant parties on the block chain network must first input the password (a mixture of private and public keys). Hackers will find it difficult to decrypt the keys in practice. As a result, block chain gives businesses a safe place to keep their digital assets, ensuring cybersecurity.Private, public or permission less block chains, and federated or consortium block chains are the three basic types of BT. Permission block chains, both personal and consortium, require a license management body to allow network access to trustworthy participants. Multichip, Monax, and Quorum are examples of private blockchains[2].
2.3 Artificial Intelligence
Global Markets are increasingly being targeted by cybercriminals who want to exploit their digital content. To overcome this, Artificial Intelligence has the potential to play a significant role in assuring cyber privacy. The model can provide correct information on hacker assertiveness by programming the AI system with the right data on prior attacks. Upon obtaining advanced analytics into hacker activity, effective remedies may be constructed. Scholars, entrepreneurs, security specialists, researchers, and everyone else discuss about the uses of AI learning algorithms in cyber defence at practically every cyber security conference. Few believe that [3] artificial intelligence may eventually substitute human analysts. In this direction, either unsupervised or supervised machine learning techniques are applied.
2.4 Secure remote access
The only factor a hacktivist needs to effectively target your company is connectivity. Devices and Users with access to certain internal or cloud-based resources are limited by access restrictions systems. Zero trust network access enables users to access private and cloud-based content without putting their device on the company network and safe network access are examples of modern access control methods[4]. In today's ubiquitous computing era, one of the most common business trends is the utilisation of secure remote access to corporate resources via an encrypted tunnel established throughout the network.
2.5 Virtual Private Network (VPN)
VPNs protect traffic between a distant terminal (such as a user WFH home) and the enterprise network. The benefit of adopting OpenVPN for a VPN is that the small chain will be larger, and the time required to interconnect the local network to different locations will be reduced[5]. When compared to using a wired connection as a conventional process of WAN implementation, it lowers operational expenses. Since it does not need wires, a VPN can lower the amount of setting up a network (leased line). Enhance scalability and accessibility from any location by using a VPN to internet connection (Access remotely).
2.6 DDoS prevention / mitigation
DDoS threats are aimed to...