logo

PICT3011 - Cyber Security in Practice Assignment

   

Added on  2022-08-20

11 Pages3522 Words16 Views
1/28/2020
Running Head: CYBER SECURITY IN PRACTICE 0
Student name
Cyber Security
in Practice
Report
PICT3011 - Cyber Security in Practice Assignment_1
CYBER SECURITY IN PRACTICE 1
Table of Contents
Introduction................................................................................................................................2
Issues in cybersecurity...............................................................................................................2
Permission to monitor............................................................................................................2
Sound recording.....................................................................................................................3
Prohibited areas......................................................................................................................3
Privacy and security of personal information........................................................................3
Destroy data and information.................................................................................................3
Solutions of those issues............................................................................................................4
Conclusion..................................................................................................................................6
References..................................................................................................................................7
PICT3011 - Cyber Security in Practice Assignment_2
CYBER SECURITY IN PRACTICE 2
Introduction
Cybersecurity is necessary to secure all the rights of people, which are under surveillance in
many places, such as public areas, restaurants, transportations, malls, and many more. This
report will discuss about those issues, which are currently experiencing an unprecedented
level of mass surveillance, not only by our own government but private organizations. There
are different types of digital identities, which are sensitive and confidential, such as
biometric, facial, and more (Gates, 2011). In addition, security cameras are allowed for
business. This report will explain the role of surveillance and its impact on the security of the
public. This report will provide different aspects of surveillance and how it is used for
security. It will provide a proper reason behind the surveillance and its impact on citizens.
Issues in cybersecurity
There are many issues occurred in the surveillance processes because of technical and non-
technical reasons. In addition, many organizations have used surveillance systems to avoid
theft and different crimes. Moreover, those systems have collected a large amount of data and
information, which is not secure in many organizations. Besides, CCTV surveillance is an
issue for personal security as per human rights (Kruegle, 2011). It is an issue in front of
citizens that their data has collected in the name of security, which is not secure. It is their
right to protect their identity from various unethical resources. There is a different act in
Australia, which makes secure the privacy of citizens. It is necessary to use a surveillance
camera and other things, which is a good way to identify any crime or mishappening and
many others. Risk analysis is necessary to avoid a critical situation because of privacy and
security (Andrijcic & Horowitz, 2016).
In addition, the workplace surveillance Act 2005 and Surveillance Device Act 2007 are
providing legal permission to monitor their employees as well as record those videos for
solving any issue in their firm (Landau, 2013). Moreover, surveillance has included many
things, such as tracking surveillance, camera surveillance, and computer surveillance. Thus,
cybersecurity is necessary to secure all the information, which has recorded for security as
well (Arlitsch & Edelman, 2014). However, there are some places and conversations, which
cannot record and listen. According to law, there is a strict restriction on the recording of a
private conversation. Besides, some industries allow it because of their necessity. There are
many changes in the basic security and privacy of a person. Moreover, the government
PICT3011 - Cyber Security in Practice Assignment_3
CYBER SECURITY IN PRACTICE 3
agencies and private organization must consider the following rules and regulations, which
areas:
Permission to monitor
It is a legal process to monitor and record people based on their consent. According to laws, it
has prohibited to record people for surveillance without their consent. It is necessary to show
all the visible to visitors and staff members. In addition, some private places cannot be
included in surveillance without the personal consent of that particular person. It is necessary
to provide security to the recorded information (Bendovschi, 2015).
Sound recording
According to laws, prohibit the sound recording of a private conversation without the consent
of people, which has included in the recording. It is the reason behind not saving the sound in
any place. In addition, cybersecurity can be implemented for securing many processes
(Bhagat, 2012).
Prohibited areas
There are some private areas in a business that are prohibited from monitoring, such as
change rooms, washrooms, and toilets. There are some specific laws of privacy at the
workplace for employees. It can also include personal offices and cubicles. Besides, cameras
must not intrude on any private place, which is adjacent to the business (Business, 2020).
Privacy and security of personal information
Any recording captured for security surveillance by security cameras must be kept secure
from different types of security threats, such as cybercrime, cyber-attacks, and more. It has
required physical and technical security systems to prevent data and information. Moreover,
online storage should be protected from best practices to protect that data (Landau, 2013).
Destroy data and information
It is a simple process to destroy information from local and cloud storage, which are no
longer required. It can be completed using a manual process. Surveillance is used for security
for a person or a firm (Landau, 2011). Moreover, it is necessary to reduce the storage from
local drive and online storage, which can be used for new recordings. There is some specific
reason behind the surveillance at the workplace, which areas:
increase employee productivity and job performance
discourage criminal activity
PICT3011 - Cyber Security in Practice Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Evaluating CCTV Surveillance Camera
|6
|1240
|364

Control System: Traffic Management
|6
|1499
|331

Rights to Privacy
|4
|783
|229

Security and Surveillance Technology
|17
|4380
|168

System Security Management
|6
|1504
|37

Relationship between NIST and FISMA
|4
|635
|21