Cybersecurity Issues And Solutions – JL Accounting Company

Critical Issues Faced by JL Company

The JL accounting company is experiencing cybersecurity issues. Cybersecurity is a practice that entails systems, networks, and programs protection against digital attacks directed into accessing, manipulating, ruining, interfering with normal operations or money extortion from users (Yeh et al.,2018).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

To have an effective protection against cyber threats, various approaches should be applied ranging from internet and computer users, computers, information and data, programs and networks. These should complement each other (Conti et al.,2018).

This report points out and addresses the five major cybersecurity issues encountered by the JL company. Along with pointing out the issues, the various approaches and recommendations on the same have been given in detail regarding on how the issues can be dealt with in order to fulfill the needs of clients and improve quality of service delivery both in present and future. The account on the cost and effectiveness of the proposed approaches have been provided.

Effective solutions to the cybersecurity encountered by JL company were devised based on existing challenges. The proper means for enhancing the security of the computer system and network servers were considered.

The ability of system and operators to offer effective services at the present moment and in future with aim of achieving its maximum profits while satisfying its clients was critically analyzed. This was meant to determine the efficiency of adopting new cybersecurity measures as compared to the existing.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The cybersecurity issues ranging from the computer system, communication channels, and network security state are addressed. The possible solutions and recommendations to the respective issues are addressed as well. The main issues among others addressed include password attacks, ransomware attacks, phishing attack, man-in-the-middle attack, and denial-of-service attack.

This section gives a detailed description of the cybersecurity issues that are being experienced by the JL company and its respective clients.

These main cybersecurity challenges are in five major categories which include; password attacks, ransomware attacks, phishing attack, man-in-the-middle attack, and denial-of-service attack.

 Ransomware is a malicious software that illegitimately gets installed into the user’s computer system.  This software once installed in the system or a network denies the owner of the system (victim) to access in a computer or network (Lévesque et al.,2018). This is done by encryption with unknown code to the user. The attacker issues threats to the victim of either revealing the content of information to the public, destroying the information or deleting it unless some amount of money(ransom) is paid to the attacker to restore the access (Honda,2018). The form of attack can be by blockage of the whole computer system or file encryption. Some examples of ransomware are bad rabbit which direct users to ransom demanding page once it infects the computer. Crypto Locker malware both locks the system and encrypts the user’s files (Takeuchi et al.,2018).  (Fig 1 &2).

Ransomware Attacks

Figure 1. How ransomware works.

Figure 2. How crypto locker works.

This should be addressed to prevent further losses.

Among the ways that can be employed against ransomware attack are (Huang et al.,2018):

Use of protection tools. Various tools can be used to provide protection against this attack by detecting and blocking infected sites such as web pages and applications from infecting the system. Such tools include InterScan TM Web security and Trend Micro Deep Security TM.

Use of Trend Micro Crypto-Ransomware File Decryptor Tool to decrypt some encrypted files.

Backing up sensitive and personal information in separate devices or in a cloud.

Use of reputable antivirus software and strong firewalls.

The use of passwords and codes are among the ways that are used to protect the computer system, network or information from unauthorized access (Fatima,2018). Passwords consist of a combination of characters, either numbers or letters known to the related user(s) that give them access to a certain system or information. The strength of a password depends on its length and a combination of characters, the length of at least 8 characters and complicated combinations, the stronger the password (Nelson,2018). For instance, JL company used a weak password to protect its clients’ information in ONap TS-42 NAS. The password had a combination of 9 characters “admin/admin” without any numbers. Such a password is prone to successful attack. Password attack on the clients is evident in the case where the employees are able to gain access to computers and email accounts without restriction.

Password of an individual can be attacked using various techniques. Common methods include a brute force attack, dictionary attack, and keylogger attack. I brute force, an attacker uses a computer program and various scripts on trial and error to find a possible password. In a dictionary attack, an attacker cycles combination of common words from a common source to obtain a password.  In keylogger attack, an attacker uses a key logging malware which records keystrokes of the user while entering his password (Nelson,2018). This situation should be addressed to promote proper service delivery to clients and improve privacy and confidentiality.

Among the effective solutions are as follows (Wang,2018):

Use of multi-factor authentication. This involves a combination of several security measures on the same system such as a combination of PIN, password, and fingerprint.

The clients and employees must be educated on the need of keeping their passwords confidential. It is evident that the five employees at JL company IT illiterates.

Password Attacks

Formulation of and adherence to the security guidelines at the workplace. This includes limiting access of unauthenticated personnel to the SOE.

Implementation of lockout policy. This automatically locks an account when invalid passwords are keyed in severally by an intruder.

The company has to employ cryptography methods in order to protect the client’s information while sending to them. This will ensure the security of the information (Wei et al.,2018).

This is a situation where the resources of a computer system or the server are overloaded with requests. This makes the system to fail to respond to the requests of a legitimate user within the expected time (Benson et al.,2018). For instance, the JL’s clients are complaining that their computers are operating slowly. Depending on the motive of the attacker, the types of denial-of-service attacks differ and they include:

TCP SYN flood attack- This is where an attacker sends a lot of connection requests to the victim’s system. When the victim tries to respond to these requests, the requests are not sent back to the attacker and thus the system of victim run to time out while processing the send connections and in await of the attacker’s response. Consistency in this causes the system of the victim to be too slow or crush. Under normal situation, once the server receives a request from the client, it processes it and sends feedback to be acknowledged by the client in order to open the TCP connection (Chambers et al.,2018).

Figure 3 below illustrates the SYN flood attack.

Figure 3.  Normal connection and SYN flooding.

Distributed Denial of Service Attack (DDoS)-This is where the attacker generates and directs traffics from various anonymous sources to the victim’s computer or web server. This traffic exhaust in the bandwidth and storage resources of target victim leading to system’s failure. This is illustrated in the chart below. This should be addressed immediately before a great damage is made on the system.

Figure 4. Structure of DDoS attack.

The following measures can be taken for protection against the attacks:

Installation of firewalls and antivirus to the network restricting bandwidth use to intended users only.

Configuring a server and network firewall policies to prevent intruders from addressing a server and its resources (Qin et al.,2018). 

An attacker comes in between the communications of a server and a client. Example of MitM is session hijacking (Vanhoef et al.,2018).

Session hijacking- an attacker camouflages to resemble trusted client by intercepting communications between a client and server and replaces his IP address with that of the client as the session is still going on from the server. The server will still recognize him as its usual client (Vanhoef et al.,2018). (fig. 5).

Denial-of-Service Attacks

Figure 5. Session hijacking MitM attack process.

This attack is portrayed in the JL company as neither clients nor service providers are raising the complaint, clients feel that the company is providing services correctly and yet they are receiving spam messages. This means that an attacker is monitoring the communications without their awareness. This should be addressed early enough to prevent any misuse of clients’ information by attackers.

Installation of intrusion detection system for monitoring network. This will give an alert when an attacker hijacks communication between the server and the client.

Use of encrypted virtual private networks which reinforce security layers for network access thus making it difficult for an attacker to intercept communications.

Prevention of ARP spoofing by installing a dynamic host configuration protocol on the network server switches (Jakobsson,2018).

The staff activities must be properly monitored and audited to ensure that there are not internal man-in-the-middle attacks (Wolf & Goff.,2018).

It is a social engineering attack where an attacker sends emails appearing to come from trusted and known sources to the user. This occurs when the user opens the mail, malware loads into the computer. The mail may contain a link directing the user to a certain website containing a malware that tricks the user to give personal information such as bank accounts and passwords (Martin, 2018).  This evident as some clients are experiencing random popups with malware features.

Sending of unencrypted confidential information to clients by JL possibly provided an opportunity for attackers to intercept them, generate similar information and forward to the clients as malware. This should be addressed to avoid any further attacks.

Educating the employees to be careful in analyzing the sources of emails before opening them.

Analysis of email headers to establish paths of how the mail entered into your address.

Sandboxing the emails by clicking the link within the mail to check its content and to establish whether it is a genuine link or corrupt (Thomas,2018).

Table showing comparison and contrast between chosen and alternative methods.

Recommended measures

Current conditions.

Importance

Installation of antivirus software into computers.

There is no laptop with antivirus

Installation of antiviruses will malware infection.

Installation of security software.

None of the laptops contain any security software.

This will ensure information security of the clients and service providers.

Employing IT experts with enough skills on cybersecurity.

None of the employees has IT expertise.

Expertise will detect the cybers security issue and provide solution early enough before losses occur.

Formulation and implementation of policies and guidelines in regard to the use of resources for both employees and clients.

No policies or rules that guide employees and clients on proper procedures for online service access.

This will promote information security of both the clients, employees, and company.

The financial breakdown table for recommended measures in comparison to current measures in JL

Current state.

Expense

Recommended measures

Expense.

Employment of inexperienced people in IT

Expensive since the services offered do not meet the requirements, also losses made.

Employing IT experts.

Cheap since there shall be no losses. Any problem will be detected and rectified early enough.

No security software against cyber-attacks.

Expensive. In the case of ransomware attacks where a lot of money is demanded, clients’ information obtained illegitimately and used against the client or company

Installation of security software against cyber attacks on the system or network.

Cheap as it will cut off any expense that could have been encountered during successful attacks. Once the software is purchased, they can be updated hence no extra costs incurred.

No rules and guidelines regarding the access and use of server resources.

Costly since any individual who might be an attacker can interfere with the systems and thus spending much to repair it or loss of valuable information.

Formulation of proper and strict guidelines for the use of resources.

Cut down possible extra costs from attacks since the clients and company will avoid any mistakes that would expose them to the attackers.

References

Benson, V., McAlaney, J., & Frumkin, L. A. (2018). Emerging Threats for the Human Element and Countermeasures in Current Cyber Security Landscape. In Psychological and Behavioral Examinations in Cyber Security,266-271.

Chambers, N., Fry, B., & McMasters, J. (2018). Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security. In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers) (Vol. 1), 1626-1635.

Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities.

Fatima, R., Siddiqui, N., Umar, M. S., & Khan, M. H. (2018). A Novel Text-Based User Authentication Scheme Using Pseudo-Dynamic Password. In Information and Communication Technology for Competitive Strategies,177-186.

Honda, T., Mukaiyama, K., Shirai, T., Ohki, T., & Nishigaki, M. (2018). Ransomware Detection Considering User’s Document Editing. In 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA),907-914.

Huang, D. Y., Aliapoulios, M. M., Li, V. G., Invernizzi, L., Bursztein, E., McRoberts, K., … & McCoy, D. (2018). Tracking ransomware end-to-end. In 2018 IEEE Symposium on Security and Privacy (SP),618-631.

Jakobsson, B. M. (2018). U.S. Patent Application No. 10/057,247.

Lévesque, F. L., Chiasson, S., Somayaji, A., & Fernandez, J. M. (2018). Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach. ACM Transactions on Privacy and Security (TOPS), 21(4), 18.

Martin, J., Dubé, C., & Coovert, M. D. (2018). Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks. Human factors, 0018720818789818.

Nelson, B. (2018). Virtual Patching: Fighting Brute Force Attacks in a Software Defined Network (Doctoral dissertation).

Qin, J., Li, M., Shi, L., & Yu, X. (2018). Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Transactions on Automatic Control, 63(6), 1648-1663.

Takeuchi, Y., Sakai, K., & Fukumoto, S. (2018). Detecting Ransomware using Support Vector Machines. In Proceedings of the 47th International Conference on Parallel Processing Companion,1.

Thomas, J. (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks.

Vanhoef, M., Bhandaru, N., Derham, T., Ouzieli, I., & Piessens, F. (2018). Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks.

Wang, D., Ming, J., Chen, T., Zhang, X., & Wang, C. (2018). Cracking IoT Device User Account via Brute-force Attack to SMS Authentication Code. In Proceedings of the First Workshop on Radical and Experiential Security, 57-60.

Wei, M., Golla, M., & Ur, B. (2018). The Password Doesn’t Fall Far: How Service Influences Password Choice. Who Are You.

Wolf, D. G., & Goff, D. L. (2018). A ransomware research framework: poster. In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security,26.

Yeh, E. R., Choi, J., Prelcic, N. G., Bhat, C. R., & Heath Jr, R. W. (2018). Cybersecurity Challenges and Pathways in the Context of Connected Vehicle Systems,134.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP