Risks faced by Huawei Company due to Cyber Security Challenges
Question:
Discuss Development of What Internet Have Helped the People ?
In the recent times the use of internet having been increasing at a great rate (Reddy and Reddy 2014). The development of the internet have helped the people of the whole world to attain great level of information very easily. The technologies such as the Internet of Things have been developed in the recent times. But, with the development in this technologies there has been a great risks that has emerged due to the development of these technologies. In addition to the development there has be in a development in the hacking techniques and the mal practices on the internet. These mal practices can be termed as cybercrimes. The rate of these cybercrimes has generated a great deal of fear in the minds of the people. In addition to the common people various kind of multinational and international companies are also facing the effects of the cybercrimes in today’s world. In addition to this they face great deal challenges from the cybercrimes that are taking place nowadays in today’s world. There are various kinds of risks that the Huawei Company are facing in the present situation and these have been mentioned in this article.
The risks that the Huawei Company is facing from the cyber security challenges have been provided in the report. The NIST framework has been used by the company for accessing the organizational cyber security risks of the company.
The main concern for the company has been the risks that have been involved with the Supply Chain Management. There is need for the organization to understand the risks and the importance of the cyber security challenges that would be faced by the company and would be effecting the supply chain management of the company. In addition to this this there is a need for the company to address the situation.
According to Shah et al. (2015), The USB encryption is one of the major concern of the Huawei Company regarding the cyber security challenges. Various kind of surveys were conducted in which it was seen that the respondents were lacking the techniques when it came to tackling the USB encryption challenges. The failure to ensure that the traffic that was flowing through the network was successfully encrypted before being allowed by the USB. The company were not able to ensure that the end points of the connections were properly secure. As a result this resulted in a hostile environment that resulted in the unsecure environment within the company. To solve tis issues the company can encrypt their USBs using the BitLocker before using the USB ports. The encryptions are to be done efficiently. It would be seen that the efficiency of the company increase to a great deal, also the security of the company can also be enhanced to great extent from the cybercrimes that are taking place.
In the present time the company is using third party products (Agarwal et al. 2015). The company is using various devices that are being integrated with their operations, these devices improve the data integration of the company. These can save the time to capture the data of the company and store them efficiently. In addition to this these instances can also control the flow of the data throughout the organization. Hence, this gives rise to the security issues that can be faced by the company. The company is obtaining the option of integrating their operations with the third party applications. This can hamper the security of the company as they are handing over very useful information of the company to these third party vendors. The company would easily lose their privacy and data security and can also be subjected to mal practices. These products might result in changing of the security settings and policies of the company and also result into allowing various kinds of viruses into the systems into the systems of the company and can affect the overall security and efficiency of the company.
USB Encryption
In addition to the USB encryptions the cybercrimes also produces threats to the USB control for the company (Shah et al. 2015). The threats generally changes the access control of the USBs. It has be noted that the company do not control the access of the USB. They also do not control the data that is flowing through the network. This would be allowing unauthorized to the network and would allow the outsiders to have access to the company’s network and the data that is flowing through the network. This can distribute the attacks to the various points on the network of the company. In addition to this, the unidentified devices if allowed access to the computers can allow very harmful malwares to get into the systems and these malwares would be harming the devices and reduce the overall efficiency of the systems. This as a result would be reducing the overall efficiency of the company. The security of the company can also be easily breached due this inefficiency. The data of the company would also be unprotected and they would be losing their privacy.
According to Guglemann et al. (2015), the company do not have any kind of data protection systems for their systems. The data loss prevention is a kind of strategy that would make sure that the critical data of the company is lost very easily, When a system is subjected to malware attack, it can lose a huge amount of data. In these kind of situation the company should possess an efficient data protection method or else a data recovery technique so that the data of the company that is very confidential is not lost or stolen very easily and it is also to be ensured that the data is recovered very easily. The data loss prevention also ensures that the company data are not sent outside the network of the company by the end users and also, the help the network admirations control the flow of the data and ensure that they keep track of the data. Failing to do so the company may face severe kind of consequences.
In addition to this it was found that the company have been working on the reverse engineering of the malware (Duchene et al. 2017). In addition to this, the organizations are still on the developing phase of the reverse engineering of the malwares. The reverse in engineering of the malwares would be nullifying the effects of the company and block all types of them, malware activities on the network of the company. The reverse engineering would also reduce the effects the malwares on the systems of the organization. In addition to this the reverse engineering would also cause the dis functionality of the malwares. This would not allow the malware to hamper the system. Even if the system is hampered the system can easily be recovered. Hence, the reverse engineering is very efficient for the company to protect their systems. Failing these processes would hamper the security of the company’s data and would result in inefficiency of the data recovery.
Third-Party Products Integration
In addition to this it was also found that the company was not in possession of a fully capable emergency response team (Cranmer and Biddinger 2014). The company was able to put together a response team but they were not efficient at all. The response team would be responsible in handling the malware attacks and the intrusions that were faced by the systems. They would be responsible for detecting the cyber-attacks and cleaning up the cyber-attacks. This would be hampering the organizations in a bad way as they would not be able to perform proper analysis of the attacks that had took place in the organization and also would be viable to more number of cyber-attacks. This would be hampering the security of the company and also the overall efficiency of the company.
According to Piccoli and De Witte (2015), the company is also required to have breach indicators in the systems. The breach indicators raise an alarm immediately when the security of the company is breached. The main components of the breach indicators include, Reporting Systems, log managers, security information, and also some of the event management techniques. These systems altogether are also known as the SIEM systems. They stop the breaches to the network of the company. They can actively monitor the breaches that are taking place in the systems of the company’s networks. The company possess the systems that are almost unable to identify the breaches that are taking place in the company. This result in hampering the effectiveness of the company.
The company is also affected in the areas of disk encryption (Skillen et al. 2013). The company should have systems in which the disk encryptions can be performed successfully. This would prevent the systems against potential data losses and also protect them against the data theft of the company. The survey has shown that not more than 30 per cent of the company uses the disk encryption techniques. The company is viable to loss of data and also theft of very confidential data to the outside world. These would result in inefficiency of protecting the private data of the company. This would hamper the security of the company to a great extent. The efficiency of the business of the company would also be lost.
According to Ferguson et al. (2013), the company have the application control system at their possession. They are running an application control that is presently active in the systems. The organization can perform the application control very effectively and in addition to this the other organizations can perform the quality control of the application. The company has only started the process of controlling the application. The company can control the applications that can have access to the systems of the company and also perform various kind of activities that they are entitle to perform. The operations of the company would be very inefficient if they cannot perform the procedures successfully. Hence, the companies must perform the application control techniques very efficiently and this would also improve the business efficiency of the company in addition to increasing the efficiency in the security of the company.
USB Access Control
The company is required to perform some efficient Mobile device management. Only a part of the company performs the mobile device techniques very efficiently (Harris and Patten 2014). The mobile devices that are running and connected to the network of the organization are needed to be secured efficiently as do the computers and the laptops that are connected to the network of the organization. The Companies that do not have these policies in place are viable to the security breaches that can be conducted via the mobile devices that are connected to the network of the company. Even if a single device is hacked the hacker would be getting access of the full network and all the information regarding the company. This would decrease the efficiency of the security of the company.
Conclusion
For conclusion it can easily be said that the, results from various kind of surveys have shown that there are various kind of security facilities that are available to counter the effects of the cyber-crimes techniques that can be implemented by the Huawei Company for their security from the external threats. Although the company have implemented these techniques successfully in their businesses but they have still ignored various other technologies and also have tried to implement the cyber security measure but are unable to implement many of the techniques efficiently. Hence, it can easily be said that the cyber security measures are necessary for the company to provide security to their data and also increase the efficiency of their business to a great extent.
References
- Harris, M. and P. Patten, K., 2014. Mobile device security considerations for small-and medium-sized enterprise business mobility.Information
- Management & Computer Security,22(1), pp.97-114.
Agrawal, V.V., Atasu, A. and Van Ittersum, K., 2015. Remanufacturing, third-party competition, and consumers’ perceived value of new products. Management Science, 61(1), pp.60-72.
Cranmer, H.H. and Biddinger, P.D., 2014. Typhoon Haiyan and the professionalization of disaster response. The New England journal of medicine, 370(13), p.1185.
Duchêne, J., Le Guernic, C., Alata, E., Nicomette, V. and Kaâniche, M., 2017. State of the art of network protocol reverse engineering tools. Journal of Computer Virology and Hacking Techniques, pp.1-16.
Ferguson, A.D., Guha, A., Liang, C., Fonseca, R. and Krishnamurthi, S., 2013, August. Participatory networking: An API for application control of SDNs. In ACM SIGCOMM Computer Communication Review (Vol. 43, No. 4, pp. 327-338). ACM.
Gugelmann, D., Studerus, P., Lenders, V. and Ager, B., 2015. Can content-based data loss prevention solutions prevent data leakage in Web traffic?. IEEE Security & Privacy, 13(4), pp.52-59.
He, D., Kumar, N., Lee, J.H. and Sherratt, R., 2014. Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics, 60(1), pp.30-37.
Piccoli, B. and De Witte, H., 2015. Job insecurity and emotional exhaustion: Testing psychological contract breach versus distributive injustice as indicators of lack of reciprocity. Work & Stress, 29(3), pp.246-263.
Reddy, G.N. and Reddy, G.J., 2014. A Study of Cyber Security Challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842.
Shah, N.N., Kumar, G.N. and Raval, J.A., 2015. Web Based Framework for Data Confidentiality in Removable Media ensuring safe cyber space. International Journal of Science, Engineering and Technology Research (IJSETR), 4(5).
Skillen, A., Barrera, D. and Van Oorschot, P.C., 2013, November. Deadbolt: locking down android disk encryption. In Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices (pp. 3-14). ACM.