COMP1720 Business Cyber Security

COMP1720 Business Cyber Security

Free Samples

COMP1720 Business Cyber Security

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

COMP1720 Business Cyber Security

0 Download13 Pages / 3,066 Words

Course Code: COMP1720
University: University Of Greenwich is not sponsored or endorsed by this college or university

Country: United Kingdom

As widely reported in the media, there has been a significant wave of ransomware attacks against a large number of NHS bodies and their access to data held on computer systems. NHS Digital has stated that it is working closely with the National Cyber Security Centre, the Department of Health and NHS England to support affected organisations and ensure patient safety is protected.
Ransomware is an increasingly prevalent threat, with a rising number of variants designed to target corporate networks. In spite of this, there are many pragmatic steps which organisations can take to reduce the likelihood of incidents, limit their impact when one does occur, and to recover swiftly and effectively. These span several aspects of IT operations and security, and primarily relate to:

Robust business continuity planning and exercising and the ability to restore systems rapidly from backups;
Crisis and incident response planning and exercising to ensure incidents are managed and resolved swiftly;
Strong security hygiene policies and user awareness to prevent ransomware entering your IT environment through both technical controls and vigilant employees; and
Rigorous patch and vulnerability management ensuring you make effective use of work already done to address vulnerabilities.

Introduction to the topic
In this modern era of technology, hackers are using ransomware to infect a computer or system before holding files hostage until a ransom is paid. It can infect a PC through a Trojan, infection or worm. Wanna Decryptor encodes clients documents utilising AES and RSA encryption figures meaning the programmers can straightforwardly unscramble framework records utilising a one of a kind decoding key. In May 2015, the UK government quit paying Microsoft for expanded Windows XP support (Rid and Buchanan 2015). At the time, the arrangement to get patches for the obsolete working framework would have taken a toll £5.5 million. Halting help for XP and the potential vulnerabilities it would make were outstanding to NHS cybersecurity staff and furthermore authorities who regulate the administrations gave. All the more as of late, security investigators said Windows 7 was affected by the malware more than Windows XP.
Aim and objectives of the study
As broadly detailed in the media, there has been a critical influx of ransomware assaults against countless bodies and their entrance to information hung on PC frameworks. NHS Digital has expressed that it is working intimately with the National Cyber Security Center, the Department of Health and NHS England to help influenced associations and guarantee persistent wellbeing is ensured (Sood and Enbody 2013). Ransomware is an undeniably common risk, with a rising number of variations intended to target corporate systems. Notwithstanding this, there are numerous down to earth steps which associations can take to lessen the probability of occurrences, confine their effect when one does happen, and to recuperate quickly and successfully. These traverse a few parts of IT operations and security, and principally identify with:

Robust business progression arranging and practising and the capacity to reestablish frameworks quickly from reinforcements
Crisis and episode reaction arranging and practising to guarantee occurrences are overseen and settled quickly (Hoeksma 2017)
Strong security cleanliness strategies and client attention to avert ransomware entering the IT condition through both specialised controls and cautious workers
Rigorous fix and weakness administration guaranteeing that viable utilisation of work is effectively done to address vulnerabilities

Background to the study
Payments startup Stripe is including support for China’s Alipay and WeChat Pay, making it less demanding for Chinese clients to purchase from Western organisations. Versatile instalments make up 71% of Chinese online deals, Stripe stated, however, clients there incline toward portable wallets to Visas. Between them, Alibaba’s Alipay and Tencent’s WeChat Pay have more than a billion clients and a 91% offer of China’s portable instalments (Hawkes 2017). Such instalment frameworks are not effectively acknowledged outside of China, however, match PayPal has already collaborated with China UnionPay, a nearby credit and charge card supplier. Stripe has beforehand supported Alipay, however just for American stores. “By extending our current organisation with Alipay, and propelling another association with WeChat Pay, we are empowering organisations to effortlessly get to the once-impervious Chinese market, and in the way, Chinese customers incline toward,” said John Collison, president and fellow benefactor of Stripe, in an announcement.
Stripe proposed that help for Alipay and WeChat Pay could enable British organisations to venture into new markets post-Brexit, especially as Chinese customers are so enamoured with British brands inquire about from match PayPal recommended a fourth of British abroad deals are to Chinese customers (Martin et al. 2017). English startup Deliveroo has utilised Stripe to reach out into 11 nations, now including Hong Kong, where Stripe today propelled. Organisations utilising Stripe can set up Alipay and WeChat Pay support in “only a couple of snaps” without extra designer work on account of both being incorporated into Sources, Stripe’s instalment technique API (Nader, Honeine and Beauseroy 2016). Stripe will support repeating instalments for Alipay, helpful for administrations or memberships, and British organisations will get pounds in their ledgers. One-off buys through Alipay are accessible now, while repeating instalments and WeChat Pay stay in private beta.
Study Report
Fear of Technology
Programmers have been spreading “ransomware” called WannaCry, otherwise called WanaCrypt0r 2.0, WannaCry and WCry. It is regularly conveyed using messages which trap the beneficiary into opening connections and discharging malware onto their framework in a procedure known as phishing (Nader, Honeine and Beauseroy 2016). Once a PC has been influenced, it bolts up the records and encodes them in a way that the user cannot get to them any longer. It at that point requests instalment in bitcoin to recover get to. Security specialists caution there is no assurance that gets to will be conceded after instalment. Some ransomware that scrambles records ups the stakes following a couple of days, requesting more cash and undermining to erase documents by and large.
WannaCry misuses a powerlessness in Microsoft, which discharged a fix to settle it in March. Notwithstanding, individuals do not introduce refreshes and fixes on their PCs thus this implies vulnerabilities can stay open a great deal longer and make things less demanding for programmers to get in (Cook et al. 2016). With cutting edge against infection programming, it is conceivable to expel the infection from a PC. It should likewise be possible physically by putting a PC into experimental mode” and physically evacuating the contaminated documents. Be that as it may, anticipation remains the best type of safeguard.
Technology Failures
In Britain, the NHS was the most exceedingly bad hit. Clinics and GP surgeries in England and Scotland were among no less than 16 wellbeing administration associations hit by a “ransomware” assault on Friday, utilising malware called Wanna Decryptor – with reports possibly handfuls more were influenced (Fischer et al. 2014). Staff were compelled to return to pen and paper and utilise their particular mobiles after the assault influenced key frameworks, including phones. Healing centres and specialists’ surgeries in parts of England were compelled to dismiss patients and scratch off arrangements after they were contaminated with the ransomware, which mixed information on pcs and requested instalments of $300 to $600 to reestablish get to. Individuals in influenced ranges were being encouraged to look for medicinal care just in crises.
The nations most influenced by WannaCry to date were Russia, where the Interior Ministry was hit, Taiwan, Ukraine and India, as indicated by Czech security firm Avast (Margulies 2015). Driving worldwide shipper FedEx Corp was another prominent casualty, while in Spain Telecommunications Company Telefonica was among many focuses in the nation. Portugal Telecom and Telefonica Argentina both said they were additionally focused on. In Germany, railroad administrator Deutsche Bahn was a prominent focus, with screens at stations demonstrating the ransomware message (Czosseck, Ottis and Taliharm 2013). Ransomware is a sort of digital assault that includes programmers taking control of a PC framework and blocking access to it until the point that a payment is paid. For digital culprits to access the framework, they have to download a kind of noxious programming onto a gadget inside the system. This is frequently done by getting a casualty to tap on a connection or download it by batch. Once the product is on a casualty’s PC, the programmers can dispatch an assault that bolts all documents it can discover inside a system (Shackelford 2014). This has a tendency to be a progressive procedure with records being encoded in a steady progression.
Technology Capabilities
The risk of being infected by ransomware can be decreased fundamentally by making the standard PC security strides, for example, guaranteeing patches and refreshes are introduced as they are discharged by programming firms. As indicated by the National Cyber Security Center, an arm of insight organisation GCHQ, the programmers will abuse vulnerabilities in working frameworks, web programs, module and application that have regularly been thought about for quite a while (Wright, Aaron and Bates 2016). Sites ought to likewise be separated with the goal that individuals will not tap on a site that could contain the infection.
The impact of a fruitful ransomware assault can likewise be diminished by limiting access to parts of the organisation framework to the individuals who need to utilise them. Great get to control is imperative. The compartmentalization of client benefits can restrain the degree of the encryption to only the information claimed by the influenced client (Masceri, Singer and Pandit 2017). Re-assessment of consents can be completed on shared system drives consistently to keep the spreading of ransomware to mapped and unmapped drives. Framework chairmen with abnormal amounts of getting to ought to abstain from utilising their administrator represents email and web perusing. It likewise prescribes having a protected go down of records on machines that are not at risk of ransomware.
Recommendations and Justifications
In this section, various recommendations have been provided that organisations should do to implement a more robust and secure technology platform within the environment. The below-provided recommendations have been provided mainly in context to the ransomware attack on NHS:
Access Control to the Network

Access to the system will be using a safe sign on method, intended to limit the open door for unapproved get to.
Where remote access to the system is actualized remote get to strategy and home working/portable working strategies will apply (Clarke and Youngstein 2017).
There are a formal, archived client enlistment and de-enrollment method for access to the system. Structures for new client, changes and leavers are accessible on the Extranet.
The staff part’s Line Manager must support the application.
Access rights to the system will be dispensed on the prerequisites of the client’s employment, as opposed to on a status premise.
Security benefits (i.e. ‘super client’ or system chairman rights) to the system will be assigned on the necessities of the client’s occupation, as opposed to on a status premise.
Access will not be allowed until the point when the Network Support Manager, IT Helpdesk, or Head of IT enlists a client (Hoeksma 2017).
All clients to the system will have their own particular individual client recognisable proof and secret key.
Users are in charge of guaranteeing their password is kept a mystery.  
User gets to rights will be quickly evacuated or looked into for those clients who have left the association or changed employments (Martin et al. 2017).

Third party access to the system will be founded on a formal get that incorporates a standard proviso which fulfils every single important NHS classification and security conditions and fruition of A New User Form should likewise be finished, and all outsider access to the system must be logged.
Data Backup and Restoration

The Network Support Manager and their group are in charge of guaranteeing that reinforcement duplicates of system design information are frequently taken.
Documented strategies for the reinforcement procedure and capacity of reinforcement tapes will be created and imparted to all significant specialized staff (Hawkes 2017).
All reinforcement tapes will be put away safely, and a duplicate will be put away off-site.
Documented systems for the sheltered and secure transfer of reinforcement media will be delivered and imparted to all pertinent staff.
Users are in charge of guaranteeing that they move down their own business related information to the system server i.e. not putting away information on a nearby hard drive (Mathers et al. 2017).

Unauthorized Software
Required utilisation of any non-standard programming gear preparing CCG data must be told to the Head of IT before establishment. All product utilised on NHS hardware must have a legitimate permit understanding (O’Dowd 2017). It is the duty of the “proprietor” or capable client of non-standard programming to guarantee this is the situation. Any new extra PCs added to the system must have a permit for the suitable programming i.e. Working System, SQL Client, Exchange Client, AntiVirus, Microsoft Office and so forth.
Changes to the Network

Any proposed changes to the system will be surveyed and affirmed by the Head of IT and passed where fitting to the Chief Technology Officer. The Network Support Managers are in charge of refreshing all significant outline documentation, security working methodology and system working techniques (Martin, Kinross and Hankin 2017).
The Head of IT or the Chief Technology Officer may require keeps an eye on, or an evaluation of the real usage given the proposed changes.
The Head of IT is in charge of guaranteeing that chose equipment or programming meets concurred security measures.
As part of acknowledgement testing of all new system frameworks, the Head of IT will endeavour to cause a security disappointment and record other criteria against which tests will be attempted preceding formal acknowledgement (Chinthapalli 2017).
Testing offices will be utilised for all new system frameworks. Improvement and operational offices will be isolated.

Reporting Security Incidents and Weaknesses
A noteworthy incident would constitute lost the capacity of a framework or breach of classified data for at least one people or a rupture of data which is probably going to prompt damage to an individual, in this manner:

All potential security breaks must be accounted for as per the prerequisites of the Incident Reporting Policies, and the SIRO must be educated about genuine occurrences.
Investigations will be embraced by the proper Information Technology Officers or somebody designated by them.
Incidents will be checked on by the Incident Reporting Policies (Athinaiou 2017).
For any data administration related episode, particularly identified with a rupture of the Data Protection Act, for example, one that can be classed as Information Governance and Cyber Security Serious Incidents Requiring Investigation, this should be signed on the Incident Reporting Module on the Information Governance Toolkit to review the occurrence. The CCG Information Toolkit Administrator will approach the module and can give access to proper staff (Mansfield-Devine 2017). Cases of SIRIs are when there is lost individual information including numerous people or where especially touchy individual data is lost or sent to the wrong address. Staff must read the Incident Reporting Policy for the general revealing of occurrences and the procedure for SIRIs.

Conclusion and Future Directions
For conclusion, it can be said that the ransomware has been the most recent improvement in the field of innovations and are one of the real issues incorporating security ruptures in the previous couple of years. This investigation is worried about one of the most recent security ruptures that have occurred in the previous couple of years and furthermore the effect it made both actually and furthermore covers the business parts of it. The investigation has given a short presentation about the circumstance. It has likewise given the impacts of it in fact and furthermore the impacts of the episodes on the business and furthermore on the general public. Moreover, the exposition likewise gives a few proposals to the determination of the circumstances and furthermore closes on the current circumstance. The investigation utilises the instance of the NHS for the portrayal of the circumstance and furthermore depicts the reasons that are causing the breaks in the security. The investigation likewise gives the suggestions to the cure of the circumstance.
At last, it has been noticed that the current rash of ransomware assaults has produced a great deal of short of breath news scope, for the most part since it is a takeoff from past patterns in monetarily propelled malware which had a tendency to be stealthy and accordingly not information harming. Ransomware can surely be unnerving; however, there are numerous non-threatening issues that can cause the same amount of annihilation. That is the reason it has dependably been, and dependable will be best practice to secure against information misfortune with consistent reinforcements. That way, regardless of what happens, the user will have the capacity to restart the advanced life rapidly. It is being expected that on the off chance that anything great can leave this ransomware incline, it is a comprehension of a significance of performing normal, visit reinforcements to ensure profitable information.
Athinaiou, M., 2017, May. Cyber security risk management for health-based critical infrastructures. In Research Challenges in Information Science (RCIS), 2017 11th International Conference on (pp. 402-407). IEEE.
Chinthapalli, K., 2017. The hackers holding hospitals to ransom. BMJ, 357, p.j2214.
Clarke, R. and Youngstein, T., 2017. Cyberattack on Britain’s National Health Service—A Wake-up Call for Modern Medicine. New England Journal of Medicine.
Cook, A., Nicholson, A., Janicke, H., Maglaras, L.A. and Smith, R., 2016. Attribution of Cyber Attacks on Industrial Control Systems. EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 3(7), p.e3.
Czosseck, C., Ottis, R. and Talihärm, A.M., 2013. Estonia after the 2007 cyber attacks: Legal, strategic and organisational changes in cyber security. Case Studies in Information Warfare and Security: For Researchers, Teachers and Students, 72.
Fischer, E.N., Dudding, C.M., Engel, T.J., Reynolds, M.A., Wierman, M.J., Mordeson, J.N. and Clark, T.D., 2014. Explaining variation in state involvement in cyber attacks: A social network approach. In Social networks: A framework of computational intelligence (pp. 63-74). Springer International Publishing.
Hawkes, N., 2017. Avoiding another cyberattack will take human and technical solutions, say experts.
Hoeksma, J., 2017. NHS cyberattack may prove to be a valuable wake up call. BMJ, 357, p.j2818.
Mansfield-Devine, S., 2017. Leaks and ransoms–the key threats to healthcare organisations. Network Security, 2017(6), pp.14-19.
Margulies, P., 2015. Sovereignty and cyber attacks: Technology’s challenge to the law of state responsibility.
Martin, G., Kinross, J. and Hankin, C., 2017. Effective cybersecurity is fundamental to patient safety.
Martin, G., Martin, P., Hankin, C., Darzi, A. and Kinross, J., 2017. Cybersecurity and healthcare: how safe are we?. BMJ, 358, p.j3179.
Masceri, N., Singer, B. and Pandit, R., 2017, August. Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks. In Social, Cultural, and Behavioral Modeling: 10th International Conference, SBP-BRiMS 2017, Washington, DC, USA, July 5-8, 2017, Proceedings (Vol. 10354, p. 127). Springer.
Mathers, N., Sullivan, R., Dhillon, A., Rafi, I. and Bell, A., 2017. The use of NHS patient data: report by the National Data Guardian for Health and Care.
Nader, P., Honeine, P. and Beauseroy, P., 2016, April. Detection of cyberattacks in a water distribution system using machine learning techniques. In Digital Information Processing and Communications (ICDIPC), 2016 Sixth International Conference on (pp. 25-30). IEEE.
O’Dowd, A., 2017. Labour calls for inquiry into NHS cyber-attack.
Rid, T. and Buchanan, B., 2015. Attributing cyber attacks. Journal of Strategic Studies, 38(1-2), pp.4-37.
Shackelford, S.J., 2014. Managing cyber attacks in international law, business, and relations: In search of cyber peace. Cambridge University Press.
Sood, A.K. and Enbody, R.J., 2013. Targeted cyberattacks: a superset of advanced persistent threats. IEEE security & privacy, 11(1), pp.54-61.
Wright, A., Aaron, S. and Bates, D.W., 2016. The Big Phish: Cyberattacks Against US Healthcare Systems.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 13 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). Business Cyber Security. Retrieved from

“Business Cyber Security.” My Assignment Help, 2021,

My Assignment Help (2021) Business Cyber Security [Online]. Available from:[Accessed 18 December 2021].

My Assignment Help. ‘Business Cyber Security’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Business Cyber Security [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



Robotics and AI (Artificial Intelligence) are interesting domains that are currently on the rise. However, it is challenging to come across authentic programming help since this is relatively new. Experts at are efficient in providing Java help. You may also require decent mathematical concepts in order to write the programs. Now, where would you find both math question solver as well as coding help? is your answer here. They carry out proper proofreading tests to help maintain accuracy.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Our Essay Writing Service Features

Qualified Writers
Looming deadline? Get your paper done in 6 hours or less. Message via chat and we'll get onto it.
We care about the privacy of our clients and will never share your personal information with any third parties or persons.
Free Turnitin Report
A plagiarism report from Turnitin can be attached to your order to ensure your paper's originality.
Safe Payments
The further the deadline or the more pages you order, the lower the price! Affordability is in our DNA.
No Hidden Charges
We offer the lowest prices per page in the industry, with an average of $7 per page
24/7/365 Support
You can contact us any time of day and night with any questions; we'll always be happy to help you out.
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$3.99 Outline
$21.99 Unlimited Revisions
Get all these features for $65.77 FREE
Do My Paper

Frequently Asked Questions About Our Essay Writing Service

Academic Paper Writing Service

Our essay writers will gladly help you with:

Business Plan
Presentation or Speech
Admission Essay
Case Study
Reflective Writing
Annotated Bibliography
Creative Writing
Term Paper
Article Review
Critical Thinking / Review
Research Paper
Thesis / Dissertation
Book / Movie Review
Book Reviews
Literature Review
Research Proposal
Editing and proofreading
Find Your Writer

Latest Feedback From Our Customers

Customer ID:  # 678224
Research Paper
Highly knowledgeable expert, reasonable price. Great at explaining hard concerts!
Writer: Raymond B.
Customer ID: # 619634
Essay (any type)
Helped me with bear and bull markets right before my exam! Fast teacher. Would work with Grace again.
Writer: Lilian G.
Customer ID: # 519731
Research Paper
If you are scanning reviews trying to find a great tutoring service, then scan no more. This service elite!
Writer: Grace P.
Customer ID: #499222
Essay (any type)
This writer is great, finished very fast and the essay was perfect. Writer goes out of her way to meet your assignment needs!
Writer: Amanda B.
Place an Order

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:

Powered by

× WhatsApp Us