logo

Assignment on Briefing Paper: Information Security

   

Added on  2022-08-23

9 Pages2153 Words17 Views
Running head: BRIEFING PAPER: INFORMATION SECURITY
Briefing Paper: Information Security
Name of the Student
Name of the University
Author Note

BRIEFING PAPER: INFORMATION SECURITY1
Name:
[Name of the Person addressed to]
Date:
Subject:
Information Security issues due to lack of Cyber Hygiene
Background:
As per the report that is being talked about in this case, there are several issues that
has been detected in the previous times due to the cyber-attacks impacting on an organisation
only because of the lack of knowledge of Cyber hygiene in the people within the
organisation. There has been several expose attack that were analysed and it was found that
online security was not maintained (Such et al. 2019). There were two attacking incidents
that are involving in this case that would be described in details. This would begin with the
analysis of attacks on the ACT government and the analysis of the same attack which show
that there was lack of awareness in the security expert that would protect the cyber hygiene of
the organisation.
However, it was also found that when the security personnel were asked about the
absence of Cyber hygiene methods to protect the information security of the people working
within the organisation, they responded that they did not understand why they would have to
develop a two-step authentication verification process or even maintain a cyber hygiene
procedure to protect the data as they were not a bank where transactions would occur every
now and then (Laws et al. 2018). This point clearly states that this was not an act of data
breaching due to the occurrences of malicious activities by hacker but clearly states how lack
of awareness about computer security has got into the security officers within the
organisation. These people do not understand that the employees and their information that

BRIEFING PAPER: INFORMATION SECURITY2
are registered within the organisation directory, are extremely important it and severely prone
to data breach attacks. The value of employee personal information and their confidentiality
over the cyber world is not known to the people within the organisation or even the security
expert (Fabiano 2019). They are of the opinion that since these do not fall under the
transactional details of a person to be recovered online, the organisation does not require
maintenance of Cyber hygiene.
Analysis:
Analysing the case, it should be said that there are several cyber security measures
taken within different organisations, yet there are several cases and news reports that still
claim that very few organizations are also falling victim to cyber security attacks (ABC News
2020). When mostly the attacks are often seen to be occurring due to the malicious acts by
unauthorised hackers, there are other reports that clearly show that all of these attacks could
have been clearly avoided.
Control Weaknesses: In this case, it should be mentioned what cyber hygiene means
as a concept. The definition of Cyber hygiene clearly describe that the practices are the steps
that computers and other devices take for maintaining the health of the system and for
increasing the amount of online security (Nolan, Lawyer and Dodd 2019). Mostly it forms
within a routine of an organisation or even for an individual user to decipher and maintain
several steps that would maintain the system health and online security of a device.
Irrespective of the offline and online activities, cyber hygiene will maintain the online
security and system health of the device when it is implied carefully (Vishwanath et al.
2020). Now in this case, the government organisation had reported that its critical data and
confidential information was except by the outside unauthorised hackers twice in in a time
period of less than 6 months right in the year 2018 (Corradini and Nardelli 2019). The first

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity: Protecting Home and Office from Cyberattacks
|12
|2626
|224

Cyber Security: Detection and Prevention of Data Breaches
|16
|5388
|304

Engineering Innovation and Ethics : Facebook Data Privacy Scandal
|13
|3872
|19

System Security: Data Breach Attack on eBay and WannaCry Ransomware Attack
|8
|1892
|123

Argument Against Hiring Hackers in Businesses
|5
|799
|496

Canva under Cyber-Attack
|6
|1400
|34