SlideShare a Scribd company logo
1 of 1
Download to read offline
CASE STUDY
The threat of cyber espionage and similar attacks present a great danger to many organisations,
particularly those that embrace the use of modern technology to enhance efficiency. Although new
off-the-shelf applications for enterprise resources planning (ERP) and management provide higher
availability and better service, they are often customised, that can leave some scope for security
gaps. While organisations have put in place tight security measures, malicious end users use
security loopholes found in various systems to commit common cybercrimes such as denial of
services, web hacking and defacement, malware, spam and phishing. The Supply Chain
Management System (SCMS) is no stranger to such cybercrimes and certainly requires an
Information Systems (IS) Security Framework in fighting off malware attacks.
Deliverable:
Assuming the role of Chief Information Officer, prepare a position paper on the benefits of
implementing the COBIT 5 Framework in the reduction of risk of Cyber Attacks on SCMS and ERP
systems. (1000 words)

More Related Content

Similar to CASE STUDY The threat of cyber espionage and similar attacks.pdf

br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
Christopher Bennett
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
Susan Darby
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
ARIV4
 
digital marketing
digital marketingdigital marketing
digital marketing
abdullahanwarabdulla
 

Similar to CASE STUDY The threat of cyber espionage and similar attacks.pdf (20)

Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
 
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdfUNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Cybersecurity Software Development Services.
Cybersecurity Software Development Services.Cybersecurity Software Development Services.
Cybersecurity Software Development Services.
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
 
TechFai.com.pdf
TechFai.com.pdfTechFai.com.pdf
TechFai.com.pdf
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gateway
 
digital marketing
digital marketingdigital marketing
digital marketing
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 

More from aaseletronics2013

Modify the Time classattached to be able to work with Date.pdf
Modify the Time classattached to be able to work with Date.pdfModify the Time classattached to be able to work with Date.pdf
Modify the Time classattached to be able to work with Date.pdf
aaseletronics2013
 
Please Create a Level 1 dfd diagram based on the usecase bel.pdf
Please Create a Level 1 dfd diagram based on the usecase bel.pdfPlease Create a Level 1 dfd diagram based on the usecase bel.pdf
Please Create a Level 1 dfd diagram based on the usecase bel.pdf
aaseletronics2013
 
Kaputun Altndan Bakmak ORION UPSte Yeni Navigasyon Sistem.pdf
Kaputun Altndan Bakmak ORION  UPSte Yeni Navigasyon Sistem.pdfKaputun Altndan Bakmak ORION  UPSte Yeni Navigasyon Sistem.pdf
Kaputun Altndan Bakmak ORION UPSte Yeni Navigasyon Sistem.pdf
aaseletronics2013
 

More from aaseletronics2013 (20)

why Tesla was excluded from the iShares MSCI World ESG Enhan.pdf
why Tesla was excluded from the iShares MSCI World ESG Enhan.pdfwhy Tesla was excluded from the iShares MSCI World ESG Enhan.pdf
why Tesla was excluded from the iShares MSCI World ESG Enhan.pdf
 
What is the average wait time for the following processes us.pdf
What is the average wait time for the following processes us.pdfWhat is the average wait time for the following processes us.pdf
What is the average wait time for the following processes us.pdf
 
Which of the following statement is INCORRECT a Net proper.pdf
Which of the following statement is INCORRECT a Net proper.pdfWhich of the following statement is INCORRECT a Net proper.pdf
Which of the following statement is INCORRECT a Net proper.pdf
 
The Magazine Mass Marketing Company has received 14 entries .pdf
The Magazine Mass Marketing Company has received 14 entries .pdfThe Magazine Mass Marketing Company has received 14 entries .pdf
The Magazine Mass Marketing Company has received 14 entries .pdf
 
Susan is the president of United Food Corporation a wholesa.pdf
Susan is the president of United Food Corporation a wholesa.pdfSusan is the president of United Food Corporation a wholesa.pdf
Susan is the president of United Food Corporation a wholesa.pdf
 
Seleccione la afirmacin que describa correctamente un error.pdf
Seleccione la afirmacin que describa correctamente un error.pdfSeleccione la afirmacin que describa correctamente un error.pdf
Seleccione la afirmacin que describa correctamente un error.pdf
 
Required information Skip to question The following infor.pdf
Required information Skip to question   The following infor.pdfRequired information Skip to question   The following infor.pdf
Required information Skip to question The following infor.pdf
 
Proje Ynetimi Durum raporunuzda u EV bilgilerini saladnz .pdf
Proje Ynetimi  Durum raporunuzda u EV bilgilerini saladnz .pdfProje Ynetimi  Durum raporunuzda u EV bilgilerini saladnz .pdf
Proje Ynetimi Durum raporunuzda u EV bilgilerini saladnz .pdf
 
Principles of Quality Management in Clinical Laboratory.pdf
Principles of Quality Management in Clinical Laboratory.pdfPrinciples of Quality Management in Clinical Laboratory.pdf
Principles of Quality Management in Clinical Laboratory.pdf
 
Modify the Time classattached to be able to work with Date.pdf
Modify the Time classattached to be able to work with Date.pdfModify the Time classattached to be able to work with Date.pdf
Modify the Time classattached to be able to work with Date.pdf
 
Please Create a Level 1 dfd diagram based on the usecase bel.pdf
Please Create a Level 1 dfd diagram based on the usecase bel.pdfPlease Create a Level 1 dfd diagram based on the usecase bel.pdf
Please Create a Level 1 dfd diagram based on the usecase bel.pdf
 
La cavidad peritoneal es el espacio hueco presente entre el .pdf
La cavidad peritoneal es el espacio hueco presente entre el .pdfLa cavidad peritoneal es el espacio hueco presente entre el .pdf
La cavidad peritoneal es el espacio hueco presente entre el .pdf
 
Lotsa Lenses pag un dividendo de 121 el ao pasado y plan.pdf
Lotsa Lenses pag un dividendo de 121 el ao pasado y plan.pdfLotsa Lenses pag un dividendo de 121 el ao pasado y plan.pdf
Lotsa Lenses pag un dividendo de 121 el ao pasado y plan.pdf
 
KUHampS Corp has 200000 shares of preferred stock outstan.pdf
KUHampS Corp has 200000 shares of preferred stock outstan.pdfKUHampS Corp has 200000 shares of preferred stock outstan.pdf
KUHampS Corp has 200000 shares of preferred stock outstan.pdf
 
Kaputun Altndan Bakmak ORION UPSte Yeni Navigasyon Sistem.pdf
Kaputun Altndan Bakmak ORION  UPSte Yeni Navigasyon Sistem.pdfKaputun Altndan Bakmak ORION  UPSte Yeni Navigasyon Sistem.pdf
Kaputun Altndan Bakmak ORION UPSte Yeni Navigasyon Sistem.pdf
 
In one month Sri Lankas floatingrate currency the rupee .pdf
In one month Sri Lankas floatingrate currency the rupee .pdfIn one month Sri Lankas floatingrate currency the rupee .pdf
In one month Sri Lankas floatingrate currency the rupee .pdf
 
Harriet saw Josephine cheating on a test in their OB class .pdf
Harriet saw Josephine cheating on a test in their OB class .pdfHarriet saw Josephine cheating on a test in their OB class .pdf
Harriet saw Josephine cheating on a test in their OB class .pdf
 
For your discussion this week I would like you to carefully .pdf
For your discussion this week I would like you to carefully .pdfFor your discussion this week I would like you to carefully .pdf
For your discussion this week I would like you to carefully .pdf
 
Cul es el mejor ejemplo de un tipo de cambio de patrn de .pdf
Cul es el mejor ejemplo de un tipo de cambio de patrn de .pdfCul es el mejor ejemplo de un tipo de cambio de patrn de .pdf
Cul es el mejor ejemplo de un tipo de cambio de patrn de .pdf
 
Given the following information about events A B and C de.pdf
Given the following information about events A B and C de.pdfGiven the following information about events A B and C de.pdf
Given the following information about events A B and C de.pdf
 

Recently uploaded

Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
Elizabeth Walsh
 

Recently uploaded (20)

Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 

CASE STUDY The threat of cyber espionage and similar attacks.pdf

  • 1. CASE STUDY The threat of cyber espionage and similar attacks present a great danger to many organisations, particularly those that embrace the use of modern technology to enhance efficiency. Although new off-the-shelf applications for enterprise resources planning (ERP) and management provide higher availability and better service, they are often customised, that can leave some scope for security gaps. While organisations have put in place tight security measures, malicious end users use security loopholes found in various systems to commit common cybercrimes such as denial of services, web hacking and defacement, malware, spam and phishing. The Supply Chain Management System (SCMS) is no stranger to such cybercrimes and certainly requires an Information Systems (IS) Security Framework in fighting off malware attacks. Deliverable: Assuming the role of Chief Information Officer, prepare a position paper on the benefits of implementing the COBIT 5 Framework in the reduction of risk of Cyber Attacks on SCMS and ERP systems. (1000 words)