logo

Assignment Information Security Hitches in Te Mata Estate

15 Pages5013 Words179 Views
   

Added on  2019-09-30

Assignment Information Security Hitches in Te Mata Estate

   Added on 2019-09-30

ShareRelated Documents
AssignmentOn Information SecuritySubmitted byNameRegistration NoDate
Assignment Information Security Hitches in Te Mata Estate_1
Information Security[Student Full Name], [Student Id]ContentsTask 1:..................................................................................................................................................2Four components of information security risk management............................................................2Task 2:..................................................................................................................................................3Assurance and compliance components...........................................................................................3Task 3:..................................................................................................................................................4a) Risk management controls and standards...................................................................................4Risk management controls...........................................................................................................4Risk management standard...........................................................................................................4b) Identify and analyze hgt4.............................................................................................................4Task 4...................................................................................................................................................5Unethical hacking.............................................................................................................................5Task 5...................................................................................................................................................5Countermeasures against phishing attack.........................................................................................5Phishing attack at Te Mata Estate.................................................................................................5Countermeasures against Phishing attack....................................................................................6Task 6...................................................................................................................................................6Approaches for improvement of security of network components..................................................6Task 7...................................................................................................................................................7Recommendations/solutions for Security of communication..........................................................7Task 8...................................................................................................................................................8Components of information security operations..............................................................................8Task 9...................................................................................................................................................8Vulnerabilities assessment and testing.............................................................................................8Vulnerability assessment..............................................................................................................8Vulnerability testing.....................................................................................................................9Task 10.................................................................................................................................................9Incident management.......................................................................................................................9Task 11................................................................................................................................................10Codes of Professional Practice.......................................................................................................10Task 12................................................................................................................................................11IT Professionals New Zealand’s Code of Ethics............................................................................11Examine......................................................................................................................................11Discussion...................................................................................................................................11References..........................................................................................................................................11LEVEL 7, Assessment 2, Feb 2019Page 2 of 15
Assignment Information Security Hitches in Te Mata Estate_2
Information Security[Student Full Name], [Student Id]Task 1:Four components of information security risk management Te Mata Estate is one of New Zealand’s oldest wine producers in the country. Most of the activitiesof this system are automated in order to enhance the effective management of the supply chain. Asat the year 2008 and the year 2011, the company experienced some critical hitches in its informationsystem. In 2008, a hacking took place which not only denied access to the administrator of thesystem but also the functionality of the whole system was highly downgraded. Thus to fight fromsuch serious security consequences there is need to analyze possible reasons for security breaches inthe system. To establish a quality information security risk assessment there is a need to chooseimportant parameters for this risk assessment process. Four components of information security riskmanagement technique are I. Risk AvoidanceThe first step is to protect the database with necessary software so that unauthorized access could beblocked on correct timing and that is known as risk avoidance. II. Risk transfer If by any reason risk has made an effect on sensitive and important data then that needs to betransferred immediately to prevent loss. There is a need to take steps so that the company “Te MataEstate” could choose to transfer the risk. III. Risk Mitigation or prevention A further step is to mitigate risk by choosing the optimum solution for it. For example, a companycan use specific and smart software which can detect the threat and guide possible solution tomitigate it. IV. Risk prevention The most important step which the company can choose to prevent risk from an occurrence. Eitherthey can generate a strong policy for maintaining optimum security or they can use networkmonitoring which can analyze the threat and correct it before its occurrence. It is very important to identify risk and fix it on the correct time so that we can avoid heavy lossesand penalty. Even though there is a need to upgrade the security system, policy and guidelines sothat any upcoming threat could not make huge destruction for the business. LEVEL 7, Assessment 2, Feb 2019Page 3 of 15
Assignment Information Security Hitches in Te Mata Estate_3
Information Security[Student Full Name], [Student Id]Task 2:Assurance and compliance componentsAt present, there are so different types of ethical issues that need to be evaluated. To enhance thesystem security there is need to focus on assurance and compliance components. To ensure theassurance and compliance policy has been followed completely on not there is a need to evaluatedifferent policy separately and we will discuss four policy her, PAPA- Privacy, Accuracy, Property, and Accessibility. a) In privacy, we mainly work on what an individual data and information are going to exchangeand share under some specific terms and conditions with other people as well as also help indeciding what to keep safe and what to share with others.b) Whereas inaccuracy we look for the data and information validity, as well as find out theresponsible authorities for error in data and information and also the affected party lost. c) In property, we basically tried to find out the owner of the data and information and also tried tofix the prices for its exchange. d) And at last inaccessibility, we mainly work on what type of data and information any individualor organization have the right to obtain under certain terms and conditions.Though four policy has been incorporated very clearly not more than two policies have beenfollowed correctly. As we see that there are many problems which occur due to the communicationproblem between developers, managers, and customers. Currently, there are two main forces whichput major risk on the privacy of the individual and organization. First one is a sudden rise in the useof information technology with more new capabilities of communications, surveillance, and storage.Whereas the second one is a more dangerous threat in which information plays a major role in thedecision-making process. Information leaks lead to invading the privacy of individuals andorganization.Task 3:a) Risk management controls and standardsThe new risk management standard has many definitions and approaches to managing the riskfactor. All the new method and theory which is developed in AS/NZS ISO 31000:2009 for thebenefits of the organization which helps in making confident and balanced decisions about all therisks which Te Mata Estate are going to face in the future.LEVEL 7, Assessment 2, Feb 2019Page 4 of 15
Assignment Information Security Hitches in Te Mata Estate_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assessment | DIPLOMA IN NETWORKING (LEVEL 7)
|13
|4898
|279

Information Security Risk Management for Te Mata Estate Company
|13
|4898
|293

Components of Information Security Risk Management | Report
|13
|4756
|555

Task 1. Based on the case study, identify and analyse a
|11
|4510
|1781

Effective Risk Management in Te Mata Estate
|15
|4917
|694

Components of Information Security Risk Management, Assurance and Compliance, and Countermeasures against Phishing Attack
|14
|4507
|192