Importance of Developing a Strategic Security Policy for Woolworths
Verified
Added on  2023/01/13
|11
|2671
|77
AI Summary
This study discusses the importance of developing a strategic security policy for Woolworths, an Australian chain of supermarkets, to protect their confidential information and prevent potential threats. It also highlights the potential threats and vulnerabilities that the company's network may face without an effective security policy.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Report Writing 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents INTRODUCTION...........................................................................................................................3 Background of the company........................................................................................................3 Strategic security policy...............................................................................................................3 CONCLUSION................................................................................................................................8 REFERENCES..............................................................................................................................10 2
INTRODUCTION Informationsecurityrefersa procedureof maintainingintegrity,confidentialityof company'' informations or data in its various forms (Safa, Von Solms and Furnell, 2016). This study is based on Woolworths which is an Australian chain of supermarkets which operates approximate 995 stores across Australia with having approximate of 115,000 employees which is the key of its success. Its headquarter is in the New South Wales, Australia. This study is going to show importance of developing a strategic security policy or information security which helps an organization in protecting their confidential informations. Further, it will discuss potential threats or problems which an organization face if it does not implement an effective security policy or information security. Background of the company Woolworth is an Australian chain supermarkets which was founded in the year of 1924 by Woolworth group. This supermarket is mainly popular for its qualitative products which include: fruits, vegetables, meat, packaged food etc. Rather, all these food products it offers household products, health and beauty products, stationeries etc. It is stated that it has around 995 Woolworth supermarkets and around 43 Woolworth metro convenience store. It provides qualitative and unique features of products which has made it able to increase consumers interest in it. It has also established branches across Australia and is providing facility to its customers of online shopping which save their time and cost as well. In the context of security policy, it is stated that this supermarket own systems and networks to which access is being given to users. It also complies with all requirements of legislations (Acceptable Use of Information System Policy, 2013). If it finds any type of illegal activity and have suspect ion they it immediately informs to the appropriate external authority. It knows that if it does not comply with all requirements of legislations then it may result in disciplinary actions or any lawsuit. It provides training to its all employees and make them aware about the importance of following guidelines relevant to the security and safety. Strategic security policy A security strategy refers a document that consists of all informations and steps required to be followed by the company in order to identify and manage risks as well as security. 3
Developing security strategy is an important and effective procedure in which company consists all steps, initial assessment, planning, implementation and continuous monitoring which can help them out in preventing themselves and others against any type of accident (Tan and et.al., 2017). In the context of Woolworth limited it can be said that, the primary aim of this retailer of developing strategic security policy is to educate employees on their responsibility to protect their company's confidentiality and integrity of informations. It is important for Woolworths to plan and develop an effective strategic security policy for prioritizing informations assurance and security initiatives with the main aim to increase protection of informations. Strategy, planning and development For making an effective strategy and planning about security policy, management and leaders plays an important role. So, it is important for company to make managers and leaders able to take an active participation in planning process. Cyber security and assurance of informations integrated functions which require team working and collaboration of leaders and manager to communicate it to all team members and give clear direction (Larson, E.V., 2019). For developing policy of security, company also requires to follow some steps in a sequence such as: determining current state, performing gap analysis, determining relevant resources, evaluation of control choices, designing controls with relevant resources, designing monitoringcontrolsanddevelopingprojectmanagementplan.Therearesomesecurity objectives which Woolworths want to accomplish by developing and implementing policy. Some strategic security objectives include: ď‚·Preventing hackers gaining unauthorized access to internal servers. ď‚·To make sure that effective controls are in place in order to reduce risks of claim under privacy legislations. 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
There are several other factors which also plays an important role in developing process which are: People, process and technology It is important to have knowledge about information security and consequences of it if Woolworths do not implement and develop it in an efficient manner. The most important factor and key element which can help an organization in making policy development process successful is efforts, time, money, technology. Deciding that how much time, human resources and efforts will be required in development process can help them in protecting them against any problem and threat (Jayanthi, 2017). Employees and technology plays an important role in information security so, it is required by Woolworths to align IT goals with business by taking account of some factors such as: workflows informations management system, databases, networks etc. Identification of requiredskillsandtrainingforemployeesisalsoimportantastrainedemployeeshave knowledge about all processes and importance of information security. By providing training to 5 Illustration1: Development process of security policy Sources: (Acceptable Use of Information System Policy, 2013)
employees, Woolworths can make aware to its employees about concepts of integrity, privacy as well as confidentiality. Rather, internal factors, there are several external factors which also plays an important role in developing and implementing an effective strategic security policy (Furness and Gänzle, 2017). Some external factors on which company should focus include: internet service providers, some IT services such as: maintenance, testing, hardware support etc. As Woolworths operates to the great extent and large level, so it is important for it to maintain all systems, software and hardware. So, it can be said that an effective strategic security policy requires to include some steps on how external factors must be assessed for security and compliance. ForaccomplishingdifferentstrategicsecurityobjectivesofWoolworths,adequate functions need to be performed for example: Objective 1. To provide security infra-structure in order to reduce development costs For accomplishing this objective security functions require implementing security infra- structure like access management, authentication services and can be re used by several systems. Re uses of that infra-structure and systems can help the company in reducing development cost. Objective 2. To protect assets For accomplishing this goal, it is important to focus on risk assessment as well as security reviews. The main aim of focusing on risk assessment by security functions is to make sure that assets are protected in an efficient manner. Objective 3:To reduce legal penalties For gaining this important goal, it is important for manager of Woolworth to protect employees from personal liability as well as damages. By developing effective policies within an organization it can make them accountable for their performed activities and protect them against lawsuit (Dhillon, Torkzadeh and Chang, 2018). Objective 4: To reduce fraud It can be accomplished by Woolworths by developing or imposing access control as it limits opportunities to change and modify data for financial gain. It can impose logging as well in order to identify unauthorized activities at the time of events. Objective 5:To reduce third party risks 6
By reducing all factors and unauthorized access events, it can accomplish its goal and reduce risks which can occur due to third party involvement. It can also add some security requirements to contact and policy that can avoid liability for security related events. So, from above discussed process and objectives, it can be said that, Woolworths can prevent itself and its all sensitive informations from getting leaked. By making an effective security policy it does not only secure its informations and access of third party but also improves its brand image and retain potential workforces (Anton, 2017). As workers prefer to work with an organization who has effective security measurements and policies as well as brand image. Potential threats and vulnerabilities of the company's network Company has to face several problems if it does not make an effective policy and plan related to security. So, it is important for Woolworths to understand threats and vulnerabilities in order to prevent itself against any danger and threats. There are several threats and problems which can occur due to lack of effective security policy and company's bad network such as: Phishing attacks:Phishing attacks is one of the main threat which Woolworths can face. In this type of threat, attackers attempts to trick an employee of victim organization into giving sensitive and professional informations or into downloading malware. Attackers send E-mail to people or an organization which seems like an effective E-mail like click this link to secure your password for preventing illegal activities (Broda, Hervieux and Habib, 2018). But this given fake link and E-mail download malware to user's computer. Other types of phishing and E-mail ask users to give their user account details or credentials in order top solve problems. It happens due to lack or awareness and knowledge among employees and ineffective tools. So, it is important for Woolworths to implement effective tools and adopts some ways such as: E-mail virus detention tool, employee training regarding cyber attacks awareness, multi factor authentication. Own employees:Sometimes the biggest vulnerability in an organization are employees which can create several problems for an organization, For instance: employee may abuse their access privileges for personal gain. Due to lack of awareness, they click on the wrong link given in the E-mail and download the wrong file, give their all details and user credentials to wrong person by which attackers to get easy access to system and get all sensitive and personal informations (Vaidya and Vaidya, 2019). But with the help of using some preventive techniques, Woolworths can prevent itself and data breaches caused by employees. For example: using a 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
policy that gives less access and privileges of having access can become difficult for attackers to get informations and getting access. Malware:There are several types of malware that are affecting the target's system to the great extent in a negative manner. Created different types of malware are affecting in different ways such as: Worms, which refers programs that can be spread via variety of modes like E- mails. Work will search some form of contacts databases once on a system. It looks like an authenticate E-mail but it compromise users system. The main aim of malware is to get access on links for getting professional and sensitive data of an organization and take undue advantage of all these informations. Internet of things:Internet of things consists of several smart devices or company's network which is mainly used in retail sector such as: manufacturing robots, Wi-Fi capable refrigerators. These devices support company in increasing productivity and saving time of manufacturing but on the flip side all these devices can be hijacked by attackers in an easy manner. Companies can not even identify that how many internet of things devices they have on their networks as Woolworths operates to the great extent so, it becomes difficult to identify. It means they have several unprotected vulnerabilities from which they are not aware. Attackers take several opportunities from these devices. So, it is important for Woolworths to identify risks which can occur due to these devices and solve problems. For solving this threat, they require to perform security audit which can help them out in identification all the disparate assets on network (Kimani, Oduol and Langat, 2019). So, it can be said that knowing the biggest threat and reasons of problems can be an effective step by which company can protect its professional as well as sensitive data. It can take time, human resources, efforts, cost and expertise but can help to the great extent. CONCLUSION From the above study it has been summarized that safety and security policy played a vital role in retail sector as it help them in preventing against any accident and dangers. By developing and implementing strategic security policy, retail sector companies made themselves able to improve their brand image and decrease all relevant threats. Further it has also discussed all problems and threats which company face due to lack of strategic security policy such as it affects their productivity, brand image, increase staff turnover etc. Due to lack of awareness, 8
company has to face problems of loss of important and sensitive data. Phishing, malware are some types of threats which has been shown in this report. 9
REFERENCES Books and journals Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model in organizations. computers & security. 56. pp.70-82. Tan, T.H. and et.al., 2017, July. Information Security Governance: A Case Study of the Strategic Context of Information Security. In PACIS (p. 43). Larson, E.V., 2019. Force Planning Scenarios, 1945–2016: Their Origins and Use in Defense Strategic Planning. RAND Corporation. Jayanthi, M.K., 2017, March. Strategic Planning for Information Security-DID Mechanism to befriend the Cyber Criminals to Assure Cyber Freedom. In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (pp. 142-147). IEEE. Furness, M. and Gänzle, S., 2017. The Security–Development Nexus in European Union Foreign Relations after Lisbon: Policy Coherence at Last?. Development Policy Review. 35(4). pp.475-492. Dhillon, G., Torkzadeh, G. and Chang, J., 2018, June. Strategic planning for IS security: Designing objectives. In International Conference on Design Science Research in Information Systems and Technology (pp. 285-299). Springer, Cham. Anton, T., 2017. STRATEGIC PLANNING–AN ANALYSIS OF THE MAIN STRATEGIC PLANNINGDOCUMENTSANDTHEIRRELEVANCEINTHECURRENT ENVIRONMENT (CASE STUDY OF THE REPUBLIC OF MOLDOVA). Defense Resources Management in the 21st Century. 12(12). pp.30-40. Broda, M., Hervieux, M.A. and Habib, H., BCE Inc, 2018. Cyber threat intelligence threat and vulnerability assessment of service supplier chain. U.S. Patent Application 15/857,815. Kimani, K., Oduol, V. and Langat, K., 2019. Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection. 25. pp.36-49. Vaidya, V. and Vaidya, S., 2019. Method and apparatus for measuring and predicting threat responsiveness. U.S. Patent Application 16/247,412. 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser