logo

Information Governance And Cyber Security

   

Added on  2023-01-19

11 Pages3243 Words86 Views
Information Governance And CyInformation Governance And Cy--
ber Securityber Security
1
Information Governance And Cyber Security_1
Table of Contents
Introduction......................................................................................................................................3
Task 1...............................................................................................................................................3
Critically appraise latest cyber security threats along with need of information governance.....3
Task 2...............................................................................................................................................5
Justify the approaches used as well as rationale for scope of ISMS. Evaluate information
governance frameworks...............................................................................................................5
Task 3...............................................................................................................................................8
Justify significance of information governance to along with risk assessment methodologies.. 8
Conclusion.....................................................................................................................................10
References......................................................................................................................................11
2
Information Governance And Cyber Security_2
Introduction
Information governance refers to overall strategies of information that are liable for
balancing the risk associated with value that is being rendered by data. It assists firms within
operational and legal compliance with reduction in expenditures that are related with legal
discovery (Abomhara, 2015). Cyber security denotes securing of computer systems from any
kind of damage or theft. It refers to practices, technologies and processes which are designed for
protection of programs, networks and devices from unauthorised access. This report is based on
Wallington Trust Hospital which is liable for rendering secondary health services. It is important
to maintain confidentiality as well as privacy of digital information. This report comprises of
cyber security threats, information security management system, and information governance.
Apart from this, it includes risk assessment methodologies.
Task 1
Critically appraise latest cyber security threats along with need of information governance.
The defensive techniques which are being used for protection of programs, data as well as
network from unwanted access, attack or damage are defined as cyber security. This comprises
of protecting information along with systems from threats that are in the form of phishing,
malware, exploit kit and ransomware (Brown, Gommers and Serrano, 2015). The threats which
might be faced by Wallington Trust Hospital are illustrated beneath:
Ransomware: It is a kind of malicious software or malware which makes an attempt to
scramble or encrypt data and carry out extortion for releasing unlocked data. Basically, it is
delivered by the usage of emails. To ensure that Wallington Trust Hospital have ransonware
systems or information, they need to make their people aware about the mails which prompt a
response. Along with this anti-virus along with malware protection software must be installed as
well as maintained. Furthermore, technical team needs to ensure that their systems are kept up to
date so that any kind of vulnerability is not present within which will lead intruder to enter
within their system.
Phishing: This implies an effort for gaining access to sensitive information while
pretending like a trustworthy source like online services or bank. It is highly targeted for
attaining information from individual (Collins, 2016). The emails which are sent through
phishing seem to be authenticated as genuine logos and faultless wording. This denotes form of
3
Information Governance And Cyber Security_3
spear phishing n which fake mails are sent from CEO or CFO for making some payments, it
implies whaling. To protect information from phishing Wallington Trust Hospital must be
suspicious from unexpected emails that are being received, along with this, their employees need
to ensure that any company will not ask for confidential information and if this happens it must
be immediately told to the technical team. Apart from this, spam filters must be turned on.
Cryptojacking: It is referred to as secret usage of computing devices for mining
cryptocurrency. They are installed within the system of victim unknowingly and are responsible
for secretly mining cryptocurrency (Graham, Olson and Howard, 2016). This is being carried out
by hackers by making casualty to click on the malicious links which are being sent through mails
which loads codes of cryptomining on systems or by creating infection on online ad or website
with JavaScript which is liable for auto implementing when it is loaded on the browser of victim.
Wallington Trust Hospital can prevent such kind of attack from occurring by making use of
installing anti-cryptomining or ad-blocking extension on their website or web pages and making
use of endpoint protection which is capable for detecting crypto. Apart from this, web filtering
tools can be used which must be up to date, this will enable technical team of Wallington Trust
Hospital to ensure that third person do not get access into their systems.
Some cyber security threats have been mentioned above and it is important for
organisation (Wallington Trust Hospital) to furnish appropriate training to their employees so
that they do not click on or provide any kind of information to anyone even if they seem
authenticated. Breaches always lead to pessimistic impact on overall operations of organisation
as well as their customers (Gupta, Agrawal and Yamaguchi, 2016). An instance can be taken into
consideration with respect to Wallington Trust Hospital, if system is hacked then details of their
patients will also be leaked which denotes that hospital needs to carry out appropriate actions
through which privacy can be maintained. For this, they can opt for information governance so
that such kind of things can be prevented. It is important to make sure that systems are updated
which will enable them to eliminate any kind of exploits or vulnerabilities present within their
system. Along with this, it is important to monitor the activities that are carried out in network on
regular basis so that in case if any kinds of unauthenticated actions are carried out then they can
be identified before things get worst (Hendrix, Al-Sherbaz and Bloom, 2016).
Information governance refers to holistic approach that is used for management of
information by implementation of controls, processes, roles and metrics that is liable for treating
4
Information Governance And Cyber Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Importance of Information Governance and Cyber Security Threats
|10
|2965
|32

Cyber Security Threats and Information Governance
|16
|4128
|21

Information Governance and Cyber Security: Risks and Mitigation Strategies
|13
|3198
|416

Information Governance and Cyber Security (Part 2)
|12
|3275
|90

Analysis of It Security And Management
|8
|832
|14

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274