logo

Information Security Risk Case Study

6 Pages916 Words175 Views
   

Added on  2020-04-01

Information Security Risk Case Study

   Added on 2020-04-01

ShareRelated Documents
Running head: FUTURE ASSIGNMENT 1Future assignment 1Name of studentName of UniversityAuthor note
Information Security Risk Case Study_1
1FUTURE ASSIGNMENT 1Contents5. Security and ethical risks during the introduction of an Information system..............................36. COBIT IT governance plan by addressing four codes................................................................4References........................................................................................................................................5
Information Security Risk Case Study_2
2FUTURE ASSIGNMENT 1Von Solms, R., & Van Niekerk, J. (2013). From information security to cybersecurity.computers & security,38, 97-102.5. Security and ethical risks during the introduction of an Information systemThere are several security related issues and ethical risks that have created complexities forCougar Couriers to introduce the information system within the organization. There could besecurity risks like cyber crime consisting of major problems of identity theft, phishing,infringement of copyrights, etc (Kayworth & Whitten, 2012). There could also be hackingrelated issues that could not only result in disclosure of important data and information but mighteven allow the hackers to gain access to the organisation’s database run by Anjal and Asmita.Based on the case study, the security risks included the major ransom ware attacks that hadtargeted the entire computer system and the operating system through encryption of data andasking for ransom payments in the form of Bitcoin crypto currency. The ethical harms could bedeterioration of business processes, which would not only result in inappropriate servicesdelivery to the consumers but might also create huge amount of loss in business for CougarCouriers in Australia (Von Solms & Van Niekerk, 2013). Though Anjal somehow managed toovercome from this critical security problem by performing incremental backup and even usedantivirus, firewall and malware detection software to ensure that these security related risks wereovercome, still a proper IT governance plan is required. This is possible with the help offollowing the four major codes that are present in the COBIT, which is an effective ITGovernance approach for focusing on the various aspects of IT functions at Cougar Couriers. O’Brien, J. and Marakas, G. (2017). Management information system. 10th ed. McGraw-Hill/Irwin, pp.1-673.
Information Security Risk Case Study_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Awareness Training for Widget Inc Dot Com
|11
|855
|364

IT Security Risks and Proposed Solutions for an Organization
|8
|396
|52

Importance of Privacy in Instagram Privacy Name of the Student Name
|8
|377
|457

Cyber Security: Attacks and Mitigation Techniques
|11
|2291
|301

Information Security Management PDF
|4
|361
|54

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57