× Limited Time Offer ! FLAT 20-40% off - Grab Deal Before It’s Gone. Order Now
Connect With Us
Order Now

Introduction To Cyber Safety Report Sample

Scenario 1

Assume you and your group members are the owners of a small consultancy company located in Sydney. There are 20 employees working to support you and the external clients. Due to the COVID -19 pandemic, you have decided to allow the staff members to work from their home. They can take the work laptops to home or use their own devices instead. The staff members are required to use computer/laptop/mobile, smart board, Smart TV, and Multi-Functional Devices (e.g., printer, scanner). Often you organize the staff meeting using zoom or similar meeting tool e.g., MS Teams. The daily activities of the staff require them to use the computing devices for accessing and storing their files securely in their folders (individual works) and a shared folder (files required for all), as well as all the regular digital activities e.g., reading, writing, and sending emails, prepare reports using MS Office software and several other software applications, (for some, make financial transactions for the clients).

You are required to guide your staff members to follow the cyber safety practices while connecting to the internet from home using either their work or personal devices. To do so, you need to prepare safety instructions so that they are minimizing the risks.

Please prepare the guidelines for the staff members which may include but not limited to:

1. Identification of the digital assets of the organization.

2. How to secure the devices which connect to the internet.

3. Identify the risks and vulnerabilities they may face.

4. Safety practice measures to protect and safeguard devices and digital information etc.

Scenario 2

Investigate security and privacy features of 2 – 3 popular social media (e.g., Facebook, LinkedIn) platforms and make a recommendation of the preferred platform based on comparison of the security and privacy features available for their users. Furthermore, include a

- recommendation on strategies for protecting users on digital platforms

- guideline for young people to follow to keep themselves safe in their digital lives

Solution

Scenario – 1

There is a growing need to keep up with cybersecurity precautions to safeguard sensitive data as more workers choose to do their jobs from home. These are some precautions staff members may take to keep your electronics and data secure:

- Always make use of robust passwords when logging into any of the connected devices or software. All of these factors—upper- and lower-case letters, numbers, and symbols—make for a password that is both secure and easy to remember. Common terms, phrases, or information about the employee themselves should be avoided in passwords (Freedman 2023).

- Turn on two-factor authentication everywhere it is supported. By requiring a second authentication element, such a code given to the employee's mobile phone, two-factor authentication increases security (Freedman 2023).

- Always use the most recent updates for your programs. Old versions of programmes and software are a common target for hackers because of security holes they introduce. So, it is crucial to apply patches and updates to close the security holes (Kaspersky 2022).

- Make sure that the anti-virus software is up to date and in use. Devices protected by anti-virus software check for and prevent the installation of harmful software. Keeping it updated means it will be able to identify the latest dangers (Kaspersky 2022).

- Protect the data on the gadget by encrypting it. To prevent unauthorised access to private data, it may be encrypted and then decrypted using a special key. If the device is lost or stolen, the data will still be safe because of this precaution (Kaspersky 2022).

- Only connect to private Wi-Fi hotspots. In most cases, hackers may easily get access to and steal information from public Wi-Fi networks. Workers should connect only via a virtual private network (VPN) or their own private networks at home (Freedman 2023).

- Employees may reduce their exposure to cyber dangers when working from home by adhering to these safety procedures. Staff members must be taught to spot any unusual behaviour and notify the IT department promptly.

Scenario – 2

1.

LinkedIn and Facebook are two of the most popular social networking platforms globally. Both platforms for the assignment help have security and privacy features to safeguard their users' data. However, there are significant differences in the features offered by both platforms (Scroxton 2022).
LinkedIn primarily focuses on professional networking, and hence, it prioritizes the security and privacy of its users (Scroxton 2022). Some of the essential security and privacy features available on LinkedIn are:

- Two-Factor Authentication (2FA) - LinkedIn allows users to enable 2FA for their accounts, adding an extra layer of security.

- Privacy Settings - Users can control their privacy settings and determine who can see their profile and the information on it.

- Encrypted Communication - LinkedIn uses HTTPS to encrypt communication between the user's device and the server.

- Endorsement Control - Users can choose to accept or decline endorsements from other users.

- Data Download - Users can download their data, including their connections, messages, and other information, for backup purposes.

Facebook, on the other hand, is a platform for social networking, which means that users share personal information and data with their friends and family (Germain 2022). Some of the essential security and privacy features available on Facebook are:

- Two-Factor Authentication (2FA) - Facebook allows users to enable 2FA for their accounts, adding an extra layer of security.

- Privacy Settings - Users can control their privacy settings and determine who can see their profile and the information on it.

- Encrypted Communication - Facebook uses HTTPS to encrypt communication between the user's device and the server.

- Ad Preferences - Users can control the ads they see and the information used to show them.

- Data Download - Users can download their data, including their posts, messages, and other information, for backup purposes.

Based on the above security and privacy features, LinkedIn is the preferred platform for professional networking, while Facebook is suitable for social networking. However, users must also take additional measures, such as using strong passwords, avoiding clicking on suspicious links, and reporting any suspicious activities to the respective platform's support team (Germain 2022).

2.

It is vital to adhere to several techniques in order to secure users on LinkedIn and Facebook. Some of these strategies include:

• Using robust passwords and enabling two-factor authentication for all online accounts (Gerber 2019).
• When it comes to exchanging personal information and data online, use extreme caution (Gorton 2021).
• Make use of privacy settings to regulate who may see their profiles and information by restricting access to certain users or groups (Gorton 2021).
• Always use the most recent versions of your software and apps, and make sure you have anti-virus software installed (Gorton 2021).
• Immediately report any activities that you believe may be suspicious to the support personnel for the platform (Gerber 2019).

3.

Young people may protect themselves from potential dangers in their digital life by adhering to the following guidelines (Atamaniuk 2021):

- Users should not divulge any personal information online, including their complete name, address, phone number, or the name of your school (Atamaniuk 2021).

- Remember to use caution with any material that is to be uploaded online, such as images, videos, or comments (Atamaniuk 2021).

- Use extreme caution if interacting with unknown individuals online, particularly on social media sites (Newberry 2023).

- Make use of the privacy options so that users have control over who may see their profile and information (Newberry 2023).

- Users are required to report any instances of bullying, harassment, or suspicious actions to a responsible adult or a member of the support staff for the platform (Newberry 2023).

By adhering to these principles, young people may shield themselves from the dangers posed by the internet, including cyberbullying, harassment, identity theft, and other hazards. In addition, parents, individual and teachers have an important part to play in the process of teaching young people about online safety and monitoring the digital activities that their children engage in (Atamaniuk 2021).

References

Fill the form to continue reading

Download Samples PDF

Assignment Services