logo

Security Vulnerabilities and Privacy Policies in Organizations

14 Pages3028 Words316 Views
   

University of Southern Queensland

   

Management of Information Security (CIS5205)

   

Added on  2020-02-24

About This Document

Security flaws are becoming increasingly widespread, necessitating the adoption of strategies that might help organizations supplement their security standards. The core notion of security vulnerability, as well as essential issues linked with this concept, were examined in this paper. The focus has primarily been on privacy policies, which are critical for preserving information security.

Security Vulnerabilities and Privacy Policies in Organizations

   

University of Southern Queensland

   

Management of Information Security (CIS5205)

   Added on 2020-02-24

ShareRelated Documents
MANAGEMENT OF INFORMATION SECURITY: PRIVACYPOLICY1
Security Vulnerabilities and Privacy Policies in Organizations_1
Executive summary Security vulnerabilities are common these days and thus there is an immense need fororganizations to indulge into practices that can complement their security standards. In this studythe main idea of security vulnerability as well as relevant aspects associated with this concepthas been discussed. Main emphasis has been laid on privacy policies that are essential formaintaining safety of information security. Theoritical frameworks associated with informationsecurity system have been considered and possible reasons for increased security breaches havealso been discussed. Finally, recommendations have been provided and conclusion has beendrawn out. 2
Security Vulnerabilities and Privacy Policies in Organizations_2
Table of contentsIntroduction......................................................................................................................................4Findings...........................................................................................................................................4Security issues faced by business organization and measures adopted to tackle those...................4Theoretical frameworks for security management..........................................................................6Analysis...........................................................................................................................................8Impact of security breach on business values..................................................................................8Potentiality of proper privacy policies...........................................................................................10Recommendations..........................................................................................................................10Conclusion.....................................................................................................................................12Reference list.................................................................................................................................13Appendix........................................................................................................................................153
Security Vulnerabilities and Privacy Policies in Organizations_3
Introduction In the current era, almost each and every business firm uses digital standards to maintaincompany data, MIS records and customer as well as service records. In such type of digitalmaintenance standards, security vulnerabilities are natural, as any information that goes onlineposes a risk regarding theft or manipulation. Vulnerabilities can be of two types, with risk andwithout risks. Potential company information that may affect company value can be consideredas vulnerability with risk, while information that does not affect any company operation, arevulnerabilities without risks. Privacy policies for a business organization has been considered forthis study to discuss about issues as well as existing Australian privacy policies for those issues.Finally recommendations have been provided and conclusion has been drawn out from the same.FindingsSecurity issues faced by business organization and measures adopted to tacklethose With emerging trend of digitalized world, issues regarding security breach and leakage ofinformation have also increased. From 2015 to present number of cyber security incidents haveincreased considerably. Rate of phishing increased to about 31%, ransomware to 15%,unauthorized disclosure of information to 36% and denial of service to about 4% (Allen &Peloza, 2015, p. 640). 4
Security Vulnerabilities and Privacy Policies in Organizations_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Crime and Digital Forensic : Report
|15
|3299
|123

Data Breaches and Identity Theft
|4
|701
|18

IS Security and Risk Management Assignment PDF
|10
|3410
|84

Communication Network Security
|14
|2944
|307

Threats to Internet of Things Devices
|18
|4722
|17

Cyber Security and Phishing Attacks on Customers and Companies
|8
|1902
|456