Report on Cyber Crime in Australia

Added on - 26 Nov 2019

  • 16

    Pages

  • 3636

    Words

  • 136

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 16 pages
Running head: CYBER CRIME (AUSTRALIA)Cyber Crime (Australia)Name of the StudentName of the UniversityAuthor Note
1CYBER CRIME (AUSTRALIA)Table of ContentsRisks and Issues with Data Security and Cybercrime.................................................................2Cyber Security Incident Contributing Factors.............................................................................6Key Threats..................................................................................................................................6Measures to Mitigate Cyber Intrusions............................................................................................8Responds to externally attempted cybercrime and data security breach.....................................9References:....................................................................................................................................13
2CYBER CRIME (AUSTRALIA)Risks and Issues with Data Security and CybercrimeThe cyber threat that is Australia facing is an unrelenting and undeniable issue thatshould be concerned to the IT security professionals but the rate of vulnerabilities and attacks isextending the room for the shareholders and individuals to get involved in this situation.CertAustralia, the partner agency of the Australian Cyber Security Centre (ACSC) can be consideredas the primary point-of-contact for the cyber security issues that are affecting major of theAustralian businesses and firms (Jennings and Feakin 2013). Cert Australia reported that therewere 11,733 incidents that affected the firms and their businesses in 2014 – 2015. 218 amongthose incidents were reported to be the national interests and critical infrastructure. With thedevelopment of technology the cyber threats will continue to increase parallel to theadvancement in technologies (Pandey et al. 2016).Effective cyber-security is increasingly muchcomplex to deliver because of the following reasons:Mobility and consumerization:The organizational boundaries are becoming blurred withthe adoption of mobile computing in the organization, which is letting IT to get closer to theconsumers and further from the firm. The organization’s data are becoming accessibleeverywhere by the incorporation of bring-your-own-device and use of internet connecting viasmart-phones, tablets and other mobile devices.Cloud:Many organizations are using cloud-based services that are being managed by thethird party including storage which is leading toward new risks (Kshetri 2013).Change: Nowadays the organizations are adopting the post-economic-crisis world inorder to run fast and fulfill the business needs. Market expansion, introduction of newtechnologies, and mergers acquisition all are expanding rapidly into the organization which is
3CYBER CRIME (AUSTRALIA)increasing the complications in strengthen the cyber-security system of the organization. Internettechnology can be stated as the primary medium or path for the intruders to enter the system ofthe organization and spread into different systems.Infrastructure:Transformation of traditional close operation technologies systems into IPaddresses leading cyber threats toward the automation system and operations of the back-officesystems. This threat is also being spread to the critical infrastructure of the organization thatincludes transportation systems, power generation and other automation systems.Ecosystem:Nowadays environment are changing to the digital connectivity or digitalworld which is connecting people and data, which results in increment of the likelihood ofexposing to the cybercrime both at work and home environment (VonSolms and Van Niekerk2013).Based on the survey among the industries including financial, banking and other sectors, madeby ACSC (Australian cyber security center 2015) following graph has been proposed:
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document