Versand is a well-established international shipping firm engaged in various business activities connected with logistics and energy division. Assignments writing help for such cases highlights its main operational base in London and has staff strength of over 70000 employees spread across 100 countries. It has a vast and integrated system for shipping that involves a number of regional facilities based on New York, Seattle, London, Frankfurt, Singapore and Sydney. Some of these are shipment management, container tracking and inventory, and booking systems which are developed on Microsoft Windows servers in SQL database. In June 2017, Versand faced a ransomware attack just like Petya/NotPetya which targeted the companies using unpatched windows systems.
Versand’s world IT network arrangement is based on six centralised data centers situated in New York, Seattle, London, Frankfurt, Singapore city, and Sydney city. These data centres are fiber-linked regionally, which ensures high frame rate and cross-region data transfer. Every data centre contains materials management applications of shipping orders, container tracing, stock, and video conference equipment and systems all running on Microsoft Window servers with SQL server support (Tasueva and Borisova, 2021).
In the existing infrastructure, data transmission mainly relies on the VPN connection that ensures the communication of the port offices, regional offices, and data centers. Information traded includes the transactional information, inventory information and the information on the containers.
From one perspective of the application, it efficiently addresses the operational demands by enabling real-time data processing and international connection. However, the stabilization of branch office devices with Windows 7 opens doors for cyber threats. There are no set security policies, more so at the port offices with direct linkages to the internet; this is a major vulnerability against advanced cyber threats.
The internal threats that are major risks for Versand include extensive control throughout their large workforce that is located within offices and ports all over the world. Users who have access to such systems are vulnerable to social engineering techniques, for instance, phishing, which involves sending fake emails or even a communication to the user and tricking him or her to reveal credentials or open a link that contains a virus. Since email is crucial to the company’s shipping operations, a phishing attack would grant access to data and internal systems (Odimarha et al., 2024).
Versand is clearly a global company and depends on the internet connection which makes it vulnerable to various external risks and threats a worldwide Petya/NotPetya ransomware attack that occurred in 2017 targeted outdated Windows systems and led to a full cessation of operations to prevent the virus’s spread. This exemplifies a primary ransomware attack where the hackers locked the files and demanded payment in cryptocurrency for the key (Symes et al., 2024).
Get assistance from our PROFESSIONAL ASSIGNMENT WRITERS to receive 100% assured AI-free and high-quality documents on time, ensuring an A+ grade in all subjects.
There are several issues on both network and application levels within Versand’s System. Windows 7 systems that are present in the port offices are bad as they have reached their end-of-life support meaning that they don’t receive new patches and updates. This research established that there is a patchy implementation of firewalls and IPS in the global offices which are possibly openings that the attackers may exploit (Soner et al., 2024).
Versand’s global structure has several main entry points and components that are prone to certain degrees of risk. While regional data centres are very well prepared with good servers and storage boxes, these are vulnerable from outside cyber threats since they have direct connectivity to the cloud and inter-data centres. This is so because misconfigurations within virtual machines or inadequate patching mechanisms are other sources of threats. Regional and port offices are also other areas of weakness in terms of security policies, obsolete operating systems and weak control of local breakouts (Ganin et al., 2020).
These weaknesses can be potentially exploited by a hostile party in different ways. An adversary may modify a port office device to become a way into the network as it provides further access to other authorized networks hosting critical data centers in the vicinity (Škundrić et al., 2022). So, if there were no network segmentation, the attackers could take control of certain systems and gain access to other essential programs that might be used in container tracking or inventory.
The Entity Relationship Diagram (ERD) tries to unveil the existing relationship between the main systems of Versand and to clarify the flow of sensitive information together with the possible security interface points.
The above ER diagram identifies the major data entities involved in the shipping process of Versand. It employs a system of logging into the platform using credentials, and making shipments bookings associated with containers of inventory items.
As part of further improvement of network topology for Versand’s global network, it is necessary to ensure strong network segmentation, to localize core processes, including shipment data management and financial databases, from operational areas. This will avoid exposure of important resources in the organization in the event of an attack and prevent lateral movement. The improvement of firewalls at all the port and regional offices will maintain the strategic security perimeter to filter and monitor all traffic in conjunction with the existing security policy (Forguites, 2024).
Since Versand is an organization that is very inclined to utilize Microsoft-based systems, it is required to have a strict patch management policy for quick installation of all acquired patches for servers, applications, and endpoints. Any operation that does not prioritize the patching of known vulnerabilities such as the one that happened in the year 2017 makes the company vulnerable to the attacks (Liu et al., 2022).
Continuing education programs to enforce good security habits should be conducted or provided sessions should be mounted continuously at employee level for combating the dangers of phishing, social engineering, and human mistake. Security awareness activities for staff should focus on mimicking attacks and the correct way to handle emails, login credentials and security incidents.
The following use case for the interactions between the users, systems and the security controls in place in Versand will help in detailing the interactions on the Versand platform.
This use case illustrates how controls such as MFA, FW, IDS, Encryption and Patching manage to address the users, the administrators and the attackers.
A proper internal penetration testing plan should be developed to determine Versand’s internal network security weakness with specific focus in regional data centres, ports offices as well as employee workstations. The internal test will then act like there is an attacker from inside the trusted network where the firewall, an intrusion detection device, or people’s access privileges will be evaluated (Alkhurayyif and Almarshdy, 2024). Much attention will be paid to systems with the Windows 7 operating system as such systems remain vulnerable to malware extension and privilege escalation.
External penetration testing will concern issues that are within a system that can be attacked from beyond the network boundaries with the external firewall as a barrier, some of which are VPN gateways, web-based shipment booking and cloud-connected services. This realistic skills-based test will bring out shortcomings such as SQL injection, cross-site scripting, and the lack of or wayward validation and will help address them as well (Odimarha et al., 2024).
The findings, though, show that Versand has current cybersecurity vulnerabilities that may be assessed against the principles of the NIST, ISO 27001, and CIS Controls. Despite these preventive measures such as VPN connection and anti-virus, the organization has not applied the firewall consistently while still using Windows 7 which is not supported in the market contrary to the standards set by these frameworks (Korsvik, 2023).
The strategies recommended would go a long way in improving Versand’s levels of conformity to the existing practices in industries. The enhancements made to the legacy systems, implementation of proper network segmentation policy, and the use of modern intrusion detection systems will go a long way in fulfilling the requirements of SC of the NIST while at the same time addressing the technical controlling objectives of the ISO 27001.
Conclusion
The results further show internal threats including human mistakes and phishing in addition to external threats like ransomware and DDoS that comprise information and halt activities. Additionally, there is no clear formulation of the firewall deployment and unrestricted WLAN access, coupled with utilization of nonprofessional systems.
References
Journals
Introduction to Indigenous People Complements Modern-Day Conservation According to Edward Said (2021), the clash of definitions...View and Download
LO1: Understand Unit 520 Models of Disability Achieve your academic dreams with the Best Assignment Help Services for Students,...View and Download
Introduction – MG629 Developing Strategic Management And Leadership Skills Assignment Successful leadership within...View and Download
1. Introduction Get free samples written by our Top-Notch subject experts for taking online Assignment...View and Download
Introduction to Brexit's Economic Effects and Discrimination Laws Assignment Economic considerations are considered to be...View and Download
Introduction - TMDIBS109 Understanding the Entrepreneurial Spirit Assignment Sample EcoEssence is a start-up firm whose...View and Download