Cyber Security and Cyber Resilience: A Board of Directors' Guide
Verified
Added on 2023/06/10
|9
|2583
|350
AI Summary
This report provides necessary and sufficient knowledge to the board of the directors of the company about the cyber security and related concepts of the cyber security. It discusses the concept of the cyber security, cyber resilience, cyber resilience policy, and recommendations.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Corporate Governance and Ethics2 Part 3 Executive summary: Cyber security is defined as the security related to the computer and information technology, which means, it is the tool which protect the computer systems of the organization against any theft or damage related to the hardware, software, electronic data, disruption, etc. This security system mainly ensures the control in context of the system hardware, and it also ensures the protection of the system against any damage occurred because of the access of the network capture the corrupt data and code inoculation. Computer systems also have threat from the operator’s negligence, and whether negligence conduct by them is intentional or non-intentional in nature.
Corporate Governance and Ethics4 Introduction: Cyber security is the tool through which protection of the computer system is ensured through different types of cyber threats. In other words, cyber security ensures safeguarding of the internet-connected systems and other devices such as data related to the hardware and software in terms of the cyber-attacks. Security related to the computer devices is differentiated in two types that are cyber-security and physical security. It must be noted that, company use both type of securities for ensuring the safeguarding against the illegal access to the data centers of the organization and other systems of the organization. Information technology is considered as the subpart of the cyber security, because IT is designed for ensuring the confidentiality and integrity related to the data. This paper mainly discusses the concept ofthe cyber security, and it is prepared for the purpose ofboardofdirectorsoftheorganization.Thisreportprovidesnecessaryandsufficient knowledge to the board of the directors of the company about the cyber security and related concepts of the cyber security. Structure of this report includes the brief introduction of the cyber security and cyber resilience. Numbers of issues are addressed by this report such as it determines the way through which management ensure the cyber security in its organization and also the protocol related to the cyber resilience. Further this report states the illustrations of best practices and recommendations related to the cyber resilience policy at the board level. Cyber Security: Cyber security deals with number of issues in the organization and these issues occurred at each level of its implementation. The most important issue which needs to handle by the board is the continuous evolution of the risks related to the security. It is not possible to handle these issues with the traditional approach of the cyber security. Computer systems deals with number of threats related to the cyber security. Modern approach of the cyber security handles with these issuesineffectivemanner,andthisincludestheadoptionofthenewtechnologiesand digitalization. It is important to ensure the asset and information protection from different type of cyber threats (Herington & Aldrich, 2013). There is different type of cyber threats which affects the computer systems: Ransom-ware is the type of threat which relates with the malicious software and does not allowed the individual to use the data or software until payment is made by the victim. This threat is rapidly increase and affect different types of users such as individuals, business organizations, etc. Phishing is the threat which opposes sent number of e-mails to the large groups for the purpose of asking sensitive information from these groups such as personal and bank details.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Corporate Governance and Ethics5 Another threat is the distributed denial of service (DDOS) attack, as this threat block the access of the legal user. In other words, system denies the legal user access, and in this services overcome with appeal from other bases (Peter, 2017). Scams are considered as most common threat which not only targets the business organizations but affects the individuals also. In these oppose use the social engineering techniques which are advanced in nature for targeting the staff members and increase the insight of being legal. Secondary targeting is the threat which mainly affects those small networks which are connected with the IT systems in context of adequately affects the companies of higher value. Through these threat opponents exploits the customer and network data with direct and indirect ways. Targeting bulk personally identifiable information is the threat which directly affects the personally identifiable information (PII) in adequate manner. As, Australian networks contain large amount of data in terms of PII, and opponents target this information for using that information for wrong purpose such as theft, extorting money, etc. Crypto currency mining is the malware which is used by the opponents for the purpose of destroying the processing power related to the systems. After understanding the above stated threats, it can be said that cyber security ensures the protection of the organization against the cyber-attacks, breach of data, and theft identification. Cyber security also provides the facility related to the risk management. For dealing with these issues, organization must develop the security system which is enough strong, response plan, and must adopt the practices which help in removing with these risks (ASIC, 2017). Cyber Resilience: Another important topic is the cyber resilience, as it is considered as the tool which consists both in its ambit that is business management and cyber security. The main purpose of this tool is to provide the protection against the cyber-attacks and also help the management in ensuring the long term survival of the organization. Cyber resilience is the wider term as compared to the cyber-attacks, and in future terms it is the most important attribute of the organization for ensuring survival (ASIC, 2017). There are number of best practices which are recommended by the government authorities of the Australia through which organizations can prevent cyber-attacks in the organization. These practices are defined as the cyber resilience practices, and some of these practices are defined below: Management of board: In this management of the board is held responsible in terms of different elements of the organization, as it impose obligations on the board to ensure the effective cyber resilience culture
Corporate Governance and Ethics6 in the organization. Following are the different attributes related to the cyber resilience culture are: It is the responsibility of the board of directors to take the responsibility related to the cyber resilience policy, and they are also responsible to conduct periodic assessment of the strategy for review the working of the strategy against those measures which determine the success standards of this strategy. Board also holds the responsibility to ensure that cyber resilience becomes the important tool of the management for implementing the risk management policy in effective manner and also in taking the decisions which relates with the cyber securities. For resolving the issues related to the cyber risk, it is important for board members to understand the risk related to cyber security in well manner. This helps the board members in frame effective policy, and answers the questions asked by the risk and audit committees. Effective Governance: Effective governance is important for the purpose of dealing with the cyber risk in well manner, as following are the elements of the effective governance in the organization: Management must make required changes traditional governance approach adopted by the organization, as these changes makes the governance process more responsive in nature. These changes are important for making the process more compatible with this changing requirement of the cyber risks, current strategies and provisions, etc. It must be noted that these changes must be occurred on continuous basis. Cyber security governance must be related to the current governance framework and policiesoftheorganizationsuchaswiththosestrategieswhicharedocumented, principles, plans, directions and procedures of the company (ASIC, 2017). Cyber Risk Management: This is the current approach of the risk management in the organization and very useful approach from future perspectives because of the digitalization. This process rapidly becomes the process of intelligence, and following are some important elements of this process which must be considered by the organization: Companies are required to take the steps in terms of making the expert functional group for ensuring effective monitoring of cyber risk management process. It is also important for the management to understand the risk related to third party, as now a days outsourcing and cloud services are common at every part of the organization. In other words, these services become important part of the organization working. Organization on some part becomes dependent on the third party service distributors and
Corporate Governance and Ethics7 because of this it is important for them to understand the risk related to them, so that they can mitigate it in effective manner. Third party risk management: Risk based assessment frameworks must be developed by the organizations for ensuring that risk related to these third party suppliers are assessed oncontinuous basis, as it also helps the organization in complied with the defined security standards. Different companies are there which appoint the external service providers for conduct assessment of these third parties in periodic manner (ACS, 2017). Cyber Resilience policy: Cyber resilience is the approach which can only be ensured in the organization through the strategy which is both effective and efficient in nature otherwise it is not possible for the organization to ensure cyber resilience in their organization. Management of the organization must make sure that they adopt the best practices defined by the expert authorities at both national and international level. Through this strategy, management ensures the skills and competencies development, expert’s leadership in this context, required tools, and publications for ensures effective implementation of this strategy in each and every department of the organization (ACSC, 2017). Some important considerations which must be considered by the organization for the purpose of preparing the right cyber resilience strategy are stated below: Management must ensure the skill development, competency, and expert advice while making the plan related to the cyber resilience policy and also for ensuring the effective delivery of this. Management also ensures the skills development in terms of public training courses, and these courses are framed on the basis of the provisions stated by the ISO27001 and ISO22301, risk management training, CISA, CISM, CRISC and CISSP. Management of the organization is also under responsibility ensures that cyber resilience policy framed by the organization complied with the guidelines stated below: Risk management strategy and framework developed by the management and board of the organization. Guidelines defined by the national and international authorities in terms of the cyber resilience. Guidelines defined by the ISO27001 and ISO22301. Strategy developed by the organization for achieving the aims and objectives (ASIC, 2017).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Corporate Governance and Ethics8 Recommendations: Some recommendations are stated below which contributes in the cyber resilience strategy framed by the organization, and make that strategy more effective in nature: Broader approach in context of the objectives of the organization must be considered by the organization, as it ensures that cyber resilience strategy developed by the organization complied with the overall objectives of the organization. Obligations related to this concept must not be only imposed on the IT sector, which means, it is not only the IT sector which is accountable for any cyber resilience issue. Leaders across the organization must also be held accountable in this context. There must be effective communication at each and every level of the organization in terms of the cyber resilience strategy, which means, this strategy must be communicated to all the staff members and other employees of the organization. It must be noted that, only effective communication of the strategy is not sufficient, as organization must take stepstoensurethat’sstaffunderstandtheimportantaspectsofthepolicyalso (AUSTRALIA’S CYBER SECURITY STRATEGY, 2017). Conclusion: Security related to the computer devices is differentiated in two types that are cyber-security and physical security. It must be noted that, company use both type of securities for ensuring the safeguarding against the illegal access to the data centers of the organization and other systems of the organization. Management of the organization must make sure that they adopt the best practices defined by the expert authorities at both national and international level. Through this strategy, management ensures the skills and competencies development, expert’s leadership in this context, required tools, and publications for ensures effective implementation of this strategy in each and every department of the organization .
Corporate Governance and Ethics9 References: ACS, (2017). Cyber security Threats Challenges Opportunities. Available at: https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Cybersecurity_Guide.pdf. Accessed on 1stJuly 2018. ACSC, (2017). Cyber Threat. Available at: https://www.acsc.gov.au/publications/ACSC_Threat_Report_2017.pdf. Accessed on 1stJuly 2018. ASIC, (2017). Cyber resilience good practices. Available at:https://asic.gov.au/regulatory- resources/digital-transformation/cyber-resilience/cyber-resilience-good-practices/. Accessed on 1stJuly 2018. ASIC, (2017). Cyber resilience in Australia’s financial markets. Available at: https://asic.gov.au/regulatory-resources/markets/resources/markets-articles-by-asic/cyber- resilience-in-australia-s-financial-markets/. Accessed on 1stJuly 2018. ASIC, (2017). Cyber resilience. Available at:https://asic.gov.au/regulatory-resources/digital- transformation/cyber-resilience/. Accessed on 1stJuly 2018. ASIC, (2017). Key questions for an organization’s board of directors. Available at: https://asic.gov.au/regulatory-resources/digital-transformation/cyber-resilience/key-questions- for-an-organisation-s-board-of-directors/. Accessed on 1stJuly 2018. Australia’s cyber security strategy, (2017). First Update. Available at: https://cybersecuritystrategy.pmc.gov.au/cyber-security-strategy-first-annual-update-2017.pdf. Accessed on 1stJuly 2018. Herington, L. & Aldrich, R. (2013). The Future of Cyber-Resilience in an Age of Global Complexity. International Journal of Management, Volume 33(4), Pp 299-310. Peter, A. (2017). Cyber resilience preparedness of Africa’s top-12 emerging economies, International Journal of Critical Infrastructure Protection, Volume 17.