Home > Sample essays > Discuss Cyber Security Threats Facing Organizations Today

Essay: Discuss Cyber Security Threats Facing Organizations Today

Essay details and download:

  • Subject area(s): Sample essays
  • Reading time: 5 minutes
  • Price: Free download
  • Published: 1 April 2019*
  • Last Modified: 23 July 2024
  • File format: Text
  • Words: 1,415 (approx)
  • Number of pages: 6 (approx)

Text preview of this essay:

This page of the essay has 1,415 words.



This assignment are purposely to discuss and analyse about information technology security threats facing organisation today. According to (Navaratnam, 2017),information is a system to designed to achieve spesific objectives through a set of procedures. In doing so, serval stages are involved which is include collecting, processing,storing ,analysing  dan desseminating information. In othe words,Information technology is the use of any computers, storage, networking and other physical devices, infrastructure and a proccesses to create, process, store, secure and exchange all forms of eletronic data.In an infromation are used in the context of enterprise operations as opposed to personal or entertainment technologies. Information techology provide information system(IS) which is designed to meet the objective to collect, process, store analyse and disseminate info.In Computer based information system (CBIS), two (2) main components which is split into groups called Information system software and hardware. Several layers of physical equipements such as computer, printer,screen, wiring, keyboard and mouse. Software used to perform essential functions such as components virtualization, automation tools, operating system, application in CBIS which is an operating systems and any program that supports application software.

Figure 1.1: Fundamental process flow of a typical IS, Source: Navaratnam (2017)

TASK 1

FedEx (Federal Express) is corporation company owned an American Multinational courier deliver services company.The company headquartered in Memphis, Tennessee, United States of America. The founder of this company is Frederick W.Smith and founded is June 18, 1971 and today FedEx is the 10th largest private company in America with 335,767 employees.The name ”FedEx”name is a syllabic abbreviation of name of the company’s original air division, Federal Express (FedEx Express) which was used form 1973 until 2000. There are few subsidiaries company under FedEx which is TNT Express, FedEx Office, FedEx Ground and more. FedEx Express invented express distribution and the industry;s global leader, providing rapid,reliable, time definite delivery to more than 220 contries in the world. FedEx Express the world largest transtoprtation company providing fast and realiable services for more than 3.6 million shipments each business day. Revenue FedEx has growm tremendously since its first night of operations in 1973.For revenue in year 2017, FedEx has achieve USD 60.3  billion with more than 400,00 client and deliver 220 countries over the world.

FedEx company one of the company that use information technology and information system to speed up the proess of delivery and tracking items ober the world, form inputs process, outputs package pick up, dimensional and multidimensional scanner, destination location,volume and weight calculation. Information system that they used are Transaction Process System (TPS) which is contains of scanner, volume and weight calculatoe, price tracking system,destination locator,packing, handling and contolling system at the airport. Second is, Management Information System (MIS) which is to continue monitoring the flights and the package status and updating, this will help them to see the cordinates arrival of trucks and monitors airport and airplane based on data provided. Decision Support System (DSS) is to monitor of the delivery come late or delayed for few days, Customer  Management Sysstem (CRM) will help the client to get the information, tracking and coordinate all the business process which is deal with customer for a better service and assistance.Knowledge Management System (KMS) is to identify a better knowledge on benchmarking about how to create,produce an deliver the product and service. Enterprise system (ERP) is to intergrate and ensure the business processes in manufacturing and production, finance and other functional areas into single software. The Executive Support System (ESS) will function as to turn the data provided by Transaction Process System (TPS) and Management Information System (MIS) into summarized and useful data. This will help them to quick asccess to the reports coming from all FedEX levels and department such as billing,cost acounting, staff and schedulling.Enterprise application will help businessess come more fast,flexible, producting and inteligent. Four (4) major application which is useful for them is first Enterprise System (ERP), Supply Chain Management (SCM), Customer Relationship Management (CRM) and Knowledge Management System (KMS). All this technologies will make they business more competitive with better comunication and enhanced security. Computer are the used to keep  track of vital pieces of business information, including client activites, billing and pay roll data.All this type of information technologies help them to create a database to store the information about client, link services with direct billing system. Today, FedEx have a very efficient shopping process, which is each containers are in different shapes designed its specifically to fit into the aircraft. This will creat more effeciency by unify th ediverse markets by standardizing its product and now FedEx have a new technology which is a system can be comunicated with smart phones.

TASK 2

(A.BohhamColby, 2013) The value of a company's data has become, in many cases, its greatest asset—whether it be email history, electronic client records, or accounting systems. (Vacca, 2014), Mentioned, A damaged hard drive or hacked corporate email account can take on the significance today of the business fire of yesteryear. Cyber security not only deliberate attacks, such as disgruntled employees, industrial espionage and terrorists, but also inadvertent compromises of the information infrastructure due to user errors, equipment failures and natural disasters. You will also acquire knowledge on how organizations assess risk, how cyber security factors into that risk assessment, the current usage of existing cyber security frameworks, standards and guidelines and other management practices related to cyber security. A ransomware known as WannaCry or Ransom Wannacry is a more dangerous than other common ransomware types because of its ability to spread itself across organization’s network by exploiting critical vulnerabilities in window computer. Any unpatched window computer is potentially susceptible to WannaCry. The majority of are in Europe, WannaCry also can affected individual this is due has ability to spread itself within corporate networks without user interaction, by exploiting known vulnerabilities in Microsoft window. Computer that do not have the latest windows security updates applied are at risk of infection. .Some casesWannaCry being hosted on malicious websites, the attackers will request that the ransom be paid using Bitscoins. Wannacry generates a unique bitcoin wallet address for each infected computer or hardward and software,WannaCry then defult to three hardcoded Bitcoin addressess for payment. The attachers are unable to to identify which victims have paid using the hardcoded addressess or get their files descypted.Ransomware wannaCry had attacked a FedEx and Subsidiary company and its delivery and communication disrupted by the wave of cyber-attacks that have targeted a dozens of business around the world. This was significantly affected by the virus that has crippled computer system in Europe, Asia and The United States. The operations and communication systems have been disrupted, no data breach is known to have occurred. The network services are largely operational but slowed this is include more than 200 countries and the same problem hit last year. The problem with FedEx company is not the first time been hit by ransomware.

The affected from ransom may cause locked people out of their computer system which demanding that victims hand over a ransom. Cyber researchers have a linked the vulnerability exploited by the latest Ransomware to WannaCry and both version of malicious software rely on weaknesses. FedEx shares fell as much as 3.4 percent on financial impact of disruption, big drops in earnings and cause of lost revenue due to system affected. WannaCry searches for and encrypts 176 different file types and appends, WCRY to the end of the file name, it will asks users to pay a US$ 300 ransom in bitcoins. The ransom note indicates that the payment amount will be doubled after three days, if payment is not made after seven days it claims the encrypted files will be deleted. However there no found any code within ransomware which would cause files to be deleted.  FedEx organization are particularly at risk because of its ability to spread across the network and will increase a number of FedEx and subsidiary organizations globally. WannaCry can spread itself across a FedEx organization’s network system such as interrupt four (4) major application which is useful for them is first Enterprise System (ERP), Supply Chain Management (SCM), Customer Relationship Management (CRM) and Knowledge Management System (KMS) by exploating a vulnerability or infection. In year 2017, (Shoorbajee, 2017) says that FedEx has reported lost $ 300 million out $1.24 million operation profits  for first quaters earning attribute to computer virus impacted on company operations across Europe in July. The attacker has froze users compoter, encrypted their files and demand a ransom of $300 in bitcoin

TASK 3

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Discuss Cyber Security Threats Facing Organizations Today. Available from:<https://www.essaysauce.com/sample-essays/2018-3-4-1520162408/> [Accessed 16-04-26].

These Sample essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.