Addressing Data Breach and Information Security Measures in National Australia Bank
Verified
Added on  2023/01/12
|8
|2394
|35
AI Summary
This report addresses the issue of data breach in National Australia Bank (NAB) and highlights the security concerns, NAB's response to the breach, information security measures, and the role of cloud computing in safeguarding data.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
CASE STUDY 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION...........................................................................................................................3 Overview of Addressed problem............................................................................................3 Different security issue that an auditor has to consider..........................................................4 NAB response to data breaching............................................................................................5 Purpose of Information security measures.............................................................................5 Describe the role of cloud computing in Information Security..............................................7 CONCLUSION...............................................................................................................................7 REFERENCES................................................................................................................................8 2
INTRODUCTION Databreachisaconfirmedincidentinwhichsensitive,confidentialorotherwise protecteddatahasbeenaccessedand/ordisclosedinanunauthorizedfashion.National Australia Bank is one of the four largest financial institutions in Australia in terms of market capitalization, earnings and customers. This report highlights the main issue which is faced by the organization. After that the report highlights the security concern in the organization and different response of same in an organization. After that the report highlights different security measure and how cloud computing can help company in safeguarding different information breaching issue. Overview of Addressed problem Main problem which is seen by the organization is the publish of different customer information in the market by human mistake. Information of different customer was uploaded by two companies without any authorization company has contacted with different company has deleted all the information which was uploaded on the portal. This has creates variety of issue and given birth to variety of organizational problem for the company. As it has been identified that due to same organization has to invest more resources toward promoting and contacting different customer who’s data has wrongly promoted by the company this will increase the amount of expenditure of the company in the market(Hadlington and et.al., 2019). This issue is not come under data breaching issue as in this organization has not deliberately sold the information of consumer to other interested party. At the same time this issue is also not comes under cyber security reason behind the same is that bank has identified that this type of issue in the organization was not occurred due to problem in the security software of the company, this issue was occurred due to human mistake in the organization and organization are trying to make sure that this type of mistake will not occur again in an organization(McCormac and et.al., 2017). Another issue which was highlighted by case study was that to build as good as infrastructure in the organization, as CEO has highlighted that building the infrastructure like big four company in the organization will demand good amount of finance from the company but company is not having that good amount of finance to build that sort of infrastructure, so it is one of the biggest issue which is being faced by the company in the market. 3
Different security issue that an auditor has to consider There are many different type of issue which needs to be looked by auditor in context of investigation. First think which has to be looked by the auditor is the IT infrastructure of the company. As it has been find out in recent past it has been find out that technology is one thing which used to support different hacker in the nation to perform variety of unlawful or data breaching activity in the market. CEO of company has also highlighted that due to availability of less amount of finance in the organization is not able to maintain the optimum quality of the infrastructure which is demanded by today’s world. so NAB has to make sure that they used to consider looking at the infrastructure of the company in the market, as it is providing support to different hacker or interested party to use the same data in Lawfull manner in the organization. Change management technique is the best technique through which this issue can be consider by the company. Another security which has to be considering by the organization is the training of different employee in the organization. As it has been seen that security of the company is generally look by the human resource of the company. So it very important for all the human resource to have very good technical skill to maintain good security in an organization. So organization has to make sure that they used to provide good sort of training to all employee in the organization so that organization will able to maintain good human force in the organization. This will eventually help the company in building and maintaining good sort of security in the organization. As all employee will ready for future challenges which will be faced by them in the market. In this report CEO of bank has also highlight that the reason behind this issue in the organization was due to human mistake in the organization. Training of different employee can be organized by the company, another way through which this issue can be reduced in the organization is by providing proper guideline and roadmap to different employee through which they can perform different activity in a way in the organization it will bring good amount of clarity in the organization, this will eventually help the company in maintaining good amount of security in the organization. Another issue which is faced by the company in the market is maintaining confidentiality of customer information in the market, so auditor has to make sure that they used to consider the security of customer in the organization. As not maintaining this sort of thing in the Bank will create variety of legal compliance in the market this will eventually impact the goodwill of the 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
company in the market and also will create wrong impact on the mindset of the consumer toward the company in wrong run. So it is very important for the organization in maintaining good security in context of different information related to customer satisfaction in an organization. NAB response to data breaching NAB has taken very good initiative to response to this issue in the organization, as organization has decided to contact to all 13000 customer. This will increase the cost of the company in long run but organization has considered customer relation above all other in an organization(Peltier, 2016). This will provide all the customer a good sort of assurance in the market that organization used to consider about them, also organization will able to reduce some sort of uncertainty among employee in an market, as it has been find out that customer are having thought that there data will be used in a wrong way by conveying all the customer that their data was not used or taken by any other organization it will eventually help the company in maintaining the same amount of relationship with customer in the market. At the same time apologizing customer on contact will also bring variety of benefit. Also it has been highlighted that if any individual or customer need to make any document again due to data breaching activity it will eventually be funded by NAB in the market. Also, any fraud if happen to customer in future due to this activity all the remedies of this fraud will be born by organization in the nation, this has eventually pass on better image of company. Not only that organization is considering at improving the IT unit of the company by looking at building more secure infrastructure of the company, so that this type of issue can not occur in an organization again. This will also help the company in overcoming some of the critics which are there for organization in current scenario Purpose of Information security measures Antivirus protection, it is one of the measure which need to be consider by organization to overcome same kind of the issue in future. In this measure bank has to make sure that they have installed antivirus software in all the system of the company in the market. Antivirus software will help the bank in getting notification of any issue which is occurring in an organization, at the same time this will also restrict different virus to enter into system. As virus are the bases on 5
which different hacker used to hack different information of company. So it is very important for the company to have antivirus protection. Not only that organization has to make sure that they used to update the antivirus software on timely basis, as almost all the antivirus used to come with the license of 1-2 year. So organization has to make sure that they are always updated with antivirus protection. Another measure which has to be taken by the organization, as they have to build firewall in the organization. This will eventually help the company in controlling internet traffic coming and leaving your business. This will help the company in getting good sort of control over the different data which has been transfer over internet for the company. As it has been find out that all the hacker generally used to take help of internet to breach different data in an organization. As it has been find out that all the hacker generally used to take help of internet to hack different data of the customer from organization. So organization has to make sure that they used to set up firewall in the organization. Also, organization has to make sure that they used to establish strong password in the organization so that organization is able to safe different data and confidential information of customer from the market. Intrusion detection system: It is the types of network system which can be bring in the organizationtosafeguarddifferentinformationofcustomerorreducingtheamountof information breaching in the organization. There are two types of IDS which can be installed by an organization.Host-based IDS,this system are generally installed on a particular important machine and this used to make sure that different system used to match the particular set baseline in market. It used to create data base of file signature system and also regularly check current system files against their safe signature. Network based IDS is another measure which need to be install by the organization, these systemconsist of a normal network sniffer running in promiscuous mode(Safa, Von Solms and Furnell, 2016). This decision system used to sniffer its attached to a database of known attack signature.For example, there might be a common Web attack which may be containing the string /system32/cmd.exe? in the URL. The IDS systems of an organization generally help company in will have a match for this in the database and will alert the administrator, on the basis of which different decision can be made in an organization. 6
Describe the role of cloud computing in Information Security One of the biggest role which is played by cloud computing in the organization is that it used to create the multiple backup of your data. It generally help the company in overcoming variety of issue related to information breaching that is system shutdown, disaster, brute force attacketc.Thisisgenerallybeneficialwhendealingwithlargeamountofdatainthe organization. Another role which is played by Cloud computing is that it will help them in bringing good sort of innovation and creativity in an organization. Cloud computing generally used to allow different files to accessed from any place and at any tome. Also cloud computing used to help the company in ensuring optimum delegation of authority in an organization. Overall it used to help the company in creating the atmosphere of collaborating and will also help the company in building good sort of security in the team atmosphere. Alsocloud computing used to better collaboration in the organization this eventually used to reduce the amount of security concern in the organization in long run(Soomro, Shah and Ahmed, 2016). CONCLUSION After going through the report it has been summarized that data breaching is the issue faced by the organization. After that report concludes three security measure which need to consider by the organization. After that report summarizes different response of company and different measure through which it can be improved in the organization. In the end report summarized the way through which organization can use cloud computing in the organization to safeguard information breaching. 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
REFERENCES Books and Journals Safa, N. S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model in organizations.computers & security.56. pp.70-82. Peltier, T. R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Soomro, Z. A., Shah, M. H. and Ahmed, J., 2016. Information security management needs more holisticapproach:Aliteraturereview.InternationalJournalofInformation Management.36(2). pp.215-225. McCormac, A and et.al., 2017. A reliable measure of information security awareness and the identification of bias in responses.Australasian Journal of Information Systems,21. Wiley, A., McCormac, A. and Calic, D., 2020. More than the individual: Examining the relationshipbetweencultureandInformationSecurityAwareness.Computers& Security,88, p.101640. Bada, M., Sasse, A. M. and Nurse, J. R., 2019. Cyber security awareness campaigns: Why do they fail to change behaviour?.arXiv preprint arXiv:1901.02672. Hadlington, L. and et.al., 2019. Exploring the role of work identity and work locus of control in information security awareness.Computers & Security.81. pp.41-48. 8