This report explains the various risks and threats associated with the information system of WAS Swim Association. Proper solutions are also provided in this report for these identified risks. The report covers information security plan, risk assessment, classification table for confidential information and solutions for identified risks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION SECURITY Information Security Name of the Student Name of the University Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 INFORMATION SECURITY Table of Contents Executive Summary...................................................................................................................2 Introduction................................................................................................................................3 Discussion..................................................................................................................................3 1. Information Security Plan of WAS Swim Association......................................................3 2. Risk Assessment for WAS Swim Association...................................................................5 3. Classification Table for Confidential Information in WAS Swim Association.................6 4. Solutions for the Identified Risks in WAS Swim Association..........................................9 Conclusion................................................................................................................................11 References................................................................................................................................12
2 INFORMATION SECURITY Executive Summary The major objective of the report is knowing about the case study of WAS Swim Association. This is one of the fictional swimming associations, which is eventually the main body for complete administrations of each and every swimmer in Western Australia to represent over 500 members and 5 associated clubs. The information security is the security that is being applied to the computing devices like smart phones and computers and even the computer networks for securing the confidential information. This type of information is related to the mechanisms and processes, by which the organization is executing the various business operations. The unauthenticated data access is promptly stopped as well as mitigated with information security. Moreover, the data theft and damage is also stopped and hence the prevention of the service disruption is also possible. This report has properly explained the various risks and threats associated with the information system of WAS Swim Association. Proper solutions are also provided in this report for these identified risks.
3 INFORMATION SECURITY Introduction Information security could be designed for the protection of the three factors of confidentiality, integrity as well as availability of the information or data of computer systems from all those with all types of malicious intentions (Crossler et al., 2013). These three factors of CIA are together referred to as the triplet of the information security. This triad of CIA has evolved for including the possession, authenticity, utility, confidentiality, availability and integrity. The risk management is properly handled with the help of information security. Anything that could bring the negative impact within the organizational information system is termed as a risk. The confidential information should not be changed or altered under any circumstances. The message could be either modified while transmitting it someone or could be intercepted even before it is reaching to the intended recipient (Von Solms & Van Niekerk, 2013). There are various methodologies that are quite helpful in proper control and mitigation of all types of risks and threats. This report will be providing a brief description on the WAS Swim Association of Western Australia. The various details regarding this particular organization and the several threats of the information system of WAS Swim Association would be given here. Moreover, a risk matrix showing all the risks and their probable solutions would be provided in the report. Discussion 1. Information Security Plan of WAS Swim Association Information security planning for WAS Swim Association is extremely vital and significant for them to safeguard the data, resources and information (Peltier, 2013). This type of plan is extremely important for the protection of these above mentioned resources.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 INFORMATION SECURITY Some of the major reasons for the safeguards to these resources of WAS Swim Association are given below: i) The most important and significant reason to create an information security plan in WAS Swim Association is to properly protect the information from all types of anticipated risks or threats for maintaining the security and integrity of data (Siponen, Mahmood, & Pahnila, 2014). ii) The confidentiality of the sensitive information or data is also ensured with the proper implementation of this type of information security plan and also by making the major changes within it. iii) The next subsequent reason to create the information security plan for WAS Swim Association would be that a protection shield would be made by ensuring that all the policies and procedures are followed here (Yang, Shieh & Tzeng, 2013). Hence, the data, resources and information are utilized properly. This information security plan within the WAS Swim Association could eventually provide the mechanism to gain various advantages that are listed below: i) The most significant advantages of the information security plan is that there is a perfect identification of several risks and threats that are threatening for these resources and data (Peltier, 2016). ii) Another benefit of this type of planning would be that the various threats associated with the data can be easily and promptly controlled. iii) A perfect deployment as well as review of this plan help in understanding these risks and threats.
5 INFORMATION SECURITY iv) WAS Swim Association can adjust the various reflection of changes within the technology and thus all types of internal and external threats to the data security are properly identified (Singh, 2013). 2. Risk Assessment for WAS Swim Association Two kinds of risks and threats are associated with information and data of WAS Swim Association. These are external risks and internal risks. The risks are extremely dangerous and vulnerable to the association members, council members, policies as well as other media in WAS Swim Association (Xu et al., 2014). Hence, the risk assessment for all the risks in WAS Swim Association are as follows: Identified RisksInternal/ External SeverityProbabilityImpact 1.EasilyIdentifiable Security Vulnerabilities ExternalCatastrophic (4)High (4)High (4) 2.NoriskAssessments fromtheThirdParty Providers InternalCritical (3)Medium (3)Medium (3) 3. Technical IntegrationInternalMarginal (2)Low (2)Low (2) 4.InadequateSystem Administrators InternalCritical (3)Medium (3)Medium (3) 5.ImproperDatabase System InternalMarginal (2)Low (2)Low (2) 6. Data CorruptionInternalCatastrophic (4)High (4)High (4) 7. System ErrorsInternalNegligible (1)Very Low (1)VeryLow (1) 8. Physical Loss of DataInternalCritical (3)Medium (3)Medium (3)
6 INFORMATION SECURITY 9. Network Security IssuesExternalCatastrophic (4)High (4)High (4) 10. Malware AttacksExternalMarginal (2)Low (2)Low (2) Table 1: Risk Assessment Table of WAS Swim Association The above risk assessment table has clearly depicted all the risks of this organization with the levels of severity. Here, 4 is depicted as the highest severity and is termed as catastrophic and 1 is depicted as the lowest severity and is termed as negligible (Safa, Von Solms & Furnell, 2016). The probabilities as well as the respective impacts of these identified risks are also provided here. All of these risks should be removed and eradicated on an immediate purpose for maintaining the balance between the organization as well as the confidential and sensitive data or information. 3. Classification Table for Confidential Information in WAS Swim Association A classification table for the confidential information is responsible for dividing the various information or data to four specified classes, namely confidential, regulated, internal uses as well as external uses (Andress, 2014). The classification table of information is helpful for the organization in dealing with the several kinds of information. Hence, the utmost protection of all types of information is possible with it. Examples are also provided within this table. The respective classification table for the information of the WASSA is given below: Class of Information in WASSA Explanation of the ClassExample of these Information 1. ConfidentialTheconfidentialclassofsensitive information is related to WASSA and The various illustrations of theseinformationmainly
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 INFORMATION SECURITY thus it is termed as confidential. This specificaccesstoalltypesof unauthenticated or unauthorized parties can subsequently cause the entity to incuralltypesofcompanylosses (Parsons et al., 2014). This particular classificationofconfidentialis responsible for involving all the details of information that can solely affect the respective brand names of the WAS Swim Association. This information is notsharedwiththeexternalusers. Furthermore,thesensitiveand important information can also develop all types of insider threats within the organization (Soomro, Shah & Ahmed, 2016).Moreover,theseinformation that can be kept secret from the various unauthenticated parties is even called the confidential. involve the documentations of administrators and even allotherboardmembers, budgetsandstrategy memoranda,non-published accountingmaterial,the transactionalinformation andthevariousstrategies regardingthelongterm developmentandmany others. 2. RegulatedThe second kind of information that is eventually governed by each and every regulatory restriction is regulated type. Thisregulateddatacanonlybe accessedbytheauthorizedor Themostsignificant examples of these regulated informationmajorinvolve the procedures and policies thatareassociatedwith
8 INFORMATION SECURITY authenticated members of WAS Swim Association. The utmost care is taken forthecaseevenbeforethis information could be utilized, stored andalsotransmitted.Thereisan authenticateddisclosureofthe regulated information that can affect theclientsandemployeesofWAS SwimAssociation.Thiscanalso violateguidelinesforregulatory compliance (Baskerville, Spagnoletti & Kim, 2014). information,whichis helpfulinkeepingthe sensitive data for protecting withfederallawsand regulations(Shropshire, Warkentin&Sharma, 2015).PIIdataofWAS Swim Association are also examplesofsuch information.Regulated informationisquite important. 3. Internal UsesInternal use category deals with those data that are used by only the internal members of WAS Swim Association. This type of information is not being accessed by any of the external sources andhenceisaccessedbyonlythe internal users of the organization that too with proper permission. Theexamplesofthis informationareelectronic mail, reports, internal letters and memos for WAS Swim Association (Ab Rahman & Choo, 2015). Moreover, the instructions and processes of theseinformationarealso accessedbytheinternal users. 4. External UsesThe external use category deals with those data that are used by the external users. There is no restriction for data Thebestexamplesofthe external use information are mediaposteddataor
9 INFORMATION SECURITY access at any cost and the data loss is nopossible(Dotcenko,Vladyko& Letenko,2014).Theexternalusers couldonlyusethosedatathatare already available in public. marketingdetailsofWAS Swim Association. 4. Solutions for the Identified Risks in WAS Swim Association There are several important and significant risks that are being identified within the respective risk matrix of WAS Swim Association. This risk matrix is required to understand the severity of all risks. A proper removal of these risks are required for WAS Swim Association so that their confidential information is safe and secured (Flores, Antonsen & Ekstedt, 2014). There are four type of risks identified in the risk matrix, which are catastrophic, critical, marginal and negligible and the impacts of these risks are high, medium, low and very low. However, these risks could be removed by undertaking some of the most significant and important solutions, which are given below: i)Implementation of Antivirus Software: The first and the most significant and important solution for the proper removal of all types of identified risks and threats that are associated with the information system of WAS Swim Association is to implement the software of antivirus (Layton, 2016). The antivirus software is one of the most basic and primitive kind of computer program, which could be easily used to properly and perfectly prevent, detect and finally eradicate the malicious software and malware. All types of malware attacks and virus attacks could be perfectly and easily eradicated with the help of this particular software. Moreover, the other computer threats and risks are also removed with the help of this particular software (Kolkowska & Dhillon, 2013). Phishing, online identity threats and risks are easily stopped or removed with the antivirus software.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 INFORMATION SECURITY ii)Deployment of Firewalls: Another important and significant solution that would be extremely efficient as well as effective for the appropriate removal of all types of identified risks and threats associated with the specific information system of the WASSA is to deploy the software of firewalls (AlHogail, 2015). This firewall, as the name suggests, acts like a specific wall for any type of threat and risk. This is the significant system of network security that helps in the proper monitoring as well as controlling the incoming and outgoing network traffics over the subsequent basis of all pre determined security regulations, policies and rules. The firewall eventually establishes the barrier within the trusted internal networks and the untrusted external networks like the Internet connection. There could be two types of these firewalls, which are either host based firewall and the network firewall. This network firewall could sieve the traffic within networks (Peltier, 2013). On the other hand, the host- based firewall runs on the specific host computers and then controls the traffic of the machines. iii)Network Controls as well as Network Access: Another important and significant solution for any type of issues or problems that are associated with the network of the organization of WAS Swim Association is the significant network control and the network access. This is a major step for reducing any type of information related threat or risk (Von Solms & Van Niekerk, 2013). The information or the confidential and sensitive data often gets hacked and damaged by the hackers or attackers. Several activities are present that can negatively affect or impact the complete and important operations of peripherals, computers as well as networks to impede the capability of this network access. iv)Deployment of DHCP and DNS Servers: The servers of the dynamic host configuration protocol or the DHCP as well as the domain name system or the DNS should be eventually deployed in the respective network of WAS Swim Association for perfectly mitigating all the risks and threats effectively and efficiently (Siponen, Mahmood & Pahnila,
11 INFORMATION SECURITY 2014). The main benefit of this deployment of DHCP and DNS server is that the access of data and the loss or damage of data is strictly prohibited by all types of unauthorized access or hackers. Hence, the confidentiality and integrity of the data is secured. v)Restriction of the Physical Accessing of Data: Another important and noteworthy solution for the information security of the organization of WAS Swim Association is keeping a restriction on the physical accessing of any type of confidential data or information (Peltier, 2016). WAS Swim Association should ensure the fact only the authorized users are accessing the data and hence there is absolutely no chance for the data manipulation and data loss. Conclusion Therefore,fromthisdiscussion,aproperconclusioncouldbedrawnthatthe information security or simply infosec can be stated as the significant set of various strategies, which would be helpful for the management of various tools, technologies, procedures and policies that are needed to prevent, detect, document and counter the risks for bothnondigitalanddigitalinformation.Themostimportantresponsibilitiesofthis information security would be an establishment of a collection of several business procedures that would be substantially required for the protection of information assets and not on the processing procedure and the process of keeping the information within storage. The major goals of these programs of IS are CIA for the respective systems of information technology. These goals eventually ensure the fact that sensitive information or data are getting disclosed in front of only authenticated partiesand thus there is a prevention of unauthorized modifications of those data. Furthermore, these data can also be accessed and retrieved by all authorized parties anytime. The process of the risk management is required for this purpose to assess these vulnerabilities and threats continuously. The above provided report has clearly demonstratedthevariousdetailsregardingWASSwimAssociationtosubsequently
12 INFORMATION SECURITY understand these threats and risks that are associated with this organization. The report has provided a risk matrix to know about the severity of risks as well as a classification information scheme for WAS Swim Association.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13 INFORMATION SECURITY References Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling in the cloud.Computers & Security,49, 45-69. AlHogail,A.(2015).Designandvalidationofinformationsecurityculture framework.Computers in Human Behavior,49, 567-575. Andress, J. (2014).The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress. Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information security: Managingastrategicbalancebetweenpreventionandresponse.Information& management,51(1), 138-151. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research.computers & security,32, 90-101. Dotcenko, S., Vladyko, A., & Letenko, I. (2014, February). A fuzzy logic-based information security management for software-defined networks. InAdvanced Communication Technology (ICACT), 2014 16th International Conference on(pp. 167-171). IEEE. Flores, W. R., Antonsen, E., & Ekstedt, M. (2014). Information security knowledge sharing inorganizations:Investigatingtheeffectofbehavioralinformationsecurity governance and national culture.Computers & Security,43, 90-110. Kolkowska, E., & Dhillon, G. (2013). Organizational power and information security rule compliance.Computers & Security,33, 3-11. Layton, T. P. (2016).Information Security: Design, implementation, measurement, and compliance. Auerbach Publications.
14 INFORMATION SECURITY Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., & Jerram, C. (2014). Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q).Computers & Security,42, 165-176. Peltier, T. R. (2013).Information security fundamentals. CRC Press. Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications. Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations.Computers & Security,56, 70-82. Shropshire, J., Warkentin, M., & Sharma, S. (2015). Personality, attitudes, and intentions: Predictinginitialadoptionofinformationsecuritybehavior.Computers& Security,49, 177-191. Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications,67(19). Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study.Information & management,51(2), 217- 224. Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review.International Journal of Information Management,36(2), 215-225. VonSolms,R.,&VanNiekerk,J.(2013).Frominformationsecuritytocyber security.computers & security,38, 97-102. Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in big data: privacy and data mining.IEEE Access,2, 1149-1176.
15 INFORMATION SECURITY Yang, Y. P. O., Shieh, H. M., & Tzeng, G. H. (2013). A VIKOR technique based on DEMATEL and ANP for information security risk control assessment.Information Sciences,232, 482-500.