Ask a question from expert

Ask now

CoRPORATE GOVERNANCE

12 Pages3133 Words112 Views
   

Added on  2020-02-24

About This Document

4 4) How to manage the risk: 5 Qualities of Directors 6 Project Plans 7 How to Monitor 7 Uses of Consultants 8 Recommendation 9 References 9 Introduction Irrespective of the size or magnitude of the firm, companies today emphasise on implementing network security measures to improve data protection and prevent unauthorised access or misuse of information. As far as this report here is concerned, as a corporate governance consultant one is expected to address the issue of cyber security in a proper manner and also help the company board in understanding the

CoRPORATE GOVERNANCE

   Added on 2020-02-24

BookmarkShareRelated Documents
CORPORATE GOVERNANCE1 | Page
CoRPORATE GOVERNANCE_1
ContentsIntroduction......................................................................................................................................2Main Body:..................................................................................................................................21)Cyber Name..........................................................................................................................22)How do company respond....................................................................................................33)It will affect current operation and new ones.......................................................................44)How to manage the risk:.......................................................................................................5Qualities of Directors...................................................................................................................6Project Plans.................................................................................................................................7How to Monitor............................................................................................................................7Uses of Consultants......................................................................................................................8Recommendation.........................................................................................................................9References........................................................................................................................................92 | Page
CoRPORATE GOVERNANCE_2
IntroductionIrrespective of the size or magnitude of the firm, companies today emphasise on implementingnetwork security measures to improve data protection and prevent unauthorised access or misuseof information. The system also helps the user to regulate and monitor unauthorised modificationin a computer network. In short it enhances the overall data security of an organisation. As far asthis report here is concerned, as a corporate governance consultant one is expected to address theissue of cyber security in a proper manner and also help the company board in understanding theneed for implementing certain changes in the technical department and overall system to ensuredata security and monitor unauthorised activity of any nature (Amoroso, 2007).In this report as a consultant of cyber security a complete evaluation on ways in which cyberprotection could be improved has been discussed in detail so that the company could improvebusiness performances in a defined way. The report discusses key approaches in a step by stepmanner to help in proper implementation and understanding of the same.In this report as per instruction the company Ansell Limited has been selected for discussing thecyber security issue. The company is listed the Australian Stock Exchange and ranked within theASX 200 and hence selected here for discussion.Main Body:1)Cyber Name Cyber security is of key importance for any firm across the world. In the health care domain,there are endless information that is needed for patient care and treatment. Ansell is primarilyinto manufacturing special protecting items such as medical gloves and other essential items foroperation and health care. Cyber security is a most important topic for both the company ingeneral and for the managing directors. Stories on data breaches are common these days and thisaffects millions of customer records, payment and even on the final accounts as the purchase andstore data is affected (Augastine, 2007). Hence professionals are needed to focus on cybersecurity and for data management and stopping hackers from damaging internal data or deface3 | Page
CoRPORATE GOVERNANCE_3
the website. Attacks are common these days and hence impact on the conventional datamanagement system. Some of the common threats impacting on business are,i.Software bugsii.Trojan horsesiii.Exploiting passwords iv.IP address spoofingv.Sniffers Research also confirms that attack trends have grown over the years;2)How do company respond Risk management is important here so as to identify and eliminate key threats coming frombreach of networking system (Cyber-security, 2014). Management should focus on altering theexisting system and improve four key functional areas, namelya.alignment of the entire organisation that will include implementation of monitoringapproaches and tools in horizontal, vertical and flat organisational structure so as toidentify and eliminate cyber risks.b.Analytics to transform from an indicator-driven approach to evolve as pattern detention c.Data to support business event detection instead of technology detection4 | Page
CoRPORATE GOVERNANCE_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Importance of Cyber Security in Retail Industry
|21
|7572
|72

Challenges in Cyber Security Assignment PDF
|14
|3395
|193

MN692 Capstone Project (pdf)
|20
|4252
|34

Cyber Security: Policies, Training, Detection, Assessment, Recovery
|10
|1480
|414

Educational Program Risk Management
|5
|808
|17