Ask a question from expert

Ask now

ENGR9742 - Standards, Ethics & Compliance

14 Pages3407 Words130 Views
   

International Standards For Engineering Applications (ENGR9742)

   

Added on  2020-05-01

ENGR9742 - Standards, Ethics & Compliance

   

International Standards For Engineering Applications (ENGR9742)

   Added on 2020-05-01

BookmarkShareRelated Documents
Running head: STANDARD ETHICS AND COMPLIANCEStandard Ethics and ComplianceName of the StudentName of the UniversityAuthor Note
ENGR9742 - Standards, Ethics & Compliance_1
1STANDARD ETHICS AND COMPLIANCETable of Contents1.0 Introduction................................................................................................................................22.0 Discussion..................................................................................................................................22.1 Approaches for causing cyber crime.....................................................................................42.2 The Maroochy Water Services Case......................................................................................42.3 Cause of the adversity............................................................................................................52.4 The identified problem..........................................................................................................62.5 The proposed solution implemented by Maroochy Water Services......................................73.0 Conclusion.................................................................................................................................94.0 Reference List..........................................................................................................................10
ENGR9742 - Standards, Ethics & Compliance_2
2STANDARD ETHICS AND COMPLIANCE1.0 Introduction The illegal activity that involves a computer and network is termed as cyber crime.Moreover, the protection approaches taken for avoiding threats, disruption, misdirection andtheft from computer system referred to cyber security.Amin et al. (2013) stated that controllingphysical access where hardware of the computer system can be accessed for protection againstharm is a common method for implementing cyber security.There are many methods forimplementing cyber security- taking security measures, implementing secured architecture,designing vulnerability management, obtaining secured operating systems, formulating hardwareprotection mechanisms and implementing secure coding (Australia, C.E.R.T 2012). According to the new Telstra study 2016, it is found that almost 60% of the Australiancompany suffered from security incident (Aic.gov.au 2017). According to another research it isalso estimated that cyber security spending will exceed to $1 trillion from 2017 to 2021 (Zhanget al. 2012). Each business have to incur a loss of $276,323 through a cyber attack in which ondetection up to 53% can be recovered (Acsc.gov.au 2017). In this business assessment, theMaroochy Water Services is taken into consideration. One of the employees of the concernedorganization stole the SCADA control system and radio equipments and control the entiresystem for taking revenge from the company. Thus, issues of cybercrime and the solution that istaken by the organization will be illustrates in the business report. 2.0 Discussion In Australia, the threat for cyber security raises significantly and between the month of2015, July to 2016, June, CERT Australia has found that total of 14,804 cyber crime cases has
ENGR9742 - Standards, Ethics & Compliance_3
3STANDARD ETHICS AND COMPLIANCEbeen observed (Acsc.gov.au 2017). Expert also represented that the most targeted businesses ofcyber attack are energy sectors (18.0% chances), banking and financial services (17.0%),communication sector (11.7%), transportation services (10.3%) and mining and resources (8.6%)(Acsc.gov.au 2017).Image 1: CERT Australia report on highest number of compromised systems from cybersecurity (Source: Acsc.gov.au 2017) Hooper et al. (2013) depicts that more than 4,000 ransom ware attacks cases werewitnessed since the beginning of the year 2016 and people also know about the risk of the mostcommon internet fraud that is unknown links in emails. Lim et al. (2016) moreover stated thathackers are knowledgeable in computer programming languages so well that they identify lapse
ENGR9742 - Standards, Ethics & Compliance_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
HI6008 - Business Research - Cyber Crime
|14
|3076
|39

Challenges for Australian Law Enforcement in Investigating and Prosecuting Cybercrime
|12
|4695
|320

Importance of Cyber Security in Modern Companies and Organizations
|8
|1647
|421

Professional Skills for Information and Communication
|18
|4309
|40

Cyber Security Challenges in Organizational Context: A Case Study of ABC Technology Company
|12
|3788
|45

Effectiveness of The Approached Strategies
|13
|2989
|19