logo

Risk Assessment for Cyber Security Management - Desklib

13 Pages3482 Words205 Views
   

Added on  2023-06-10

About This Document

This report covers tasks related to confidentiality, integrity, and accountability in cyber security management. It discusses Biden's cybersecurity executive order, Metaverse, biometric psychography, and more. The report also includes solved assignments, essays, and dissertations on Desklib.

Risk Assessment for Cyber Security Management - Desklib

   Added on 2023-06-10

ShareRelated Documents
ASSESSMENT 2 CRITICAL
THINKING TASK 2 T12022
RISK ASSESSMENT FOR
CYBER SECURITY
MANAGEMENT
1
Risk Assessment for Cyber Security Management - Desklib_1
TABLE OF CONTENT
INTRODUCTION...........................................................................................................................4
MAIN BODY..................................................................................................................................4
TASK 1............................................................................................................................................4
Confidentiality, integrity and accountability...............................................................................4
TASK 2............................................................................................................................................7
1. What is it:.................................................................................................................................7
Explaining Section 2 that allow removing barriers to share confidential and threat information
between government and private sectors:....................................................................................7
Giving reasons why IT service providers could refuse detailed threat incident information with
some cyberattack mitigation agencies such as CISA, FBI, and IC?............................................7
2. What does APP 8 say? Listing 2 steps that allow recipient to avoid violating APP guideline:
.....................................................................................................................................................8
3. The Protective Security Policy Framework (PSPF) and core requirement:............................8
4. What is ISO/IEC 27000:2018:.................................................................................................8
TASK 3............................................................................................................................................9
1. What is Metaverse:..................................................................................................................9
2. What is biometric psychography.............................................................................................9
3. Data protection law:...............................................................................................................10
4. current law for biometric:......................................................................................................10
5. Initiatives taken by the Australian government to mitigate data privacy issue:....................11
2
Risk Assessment for Cyber Security Management - Desklib_2
CONCLUSION..............................................................................................................................11
REFERENCES..............................................................................................................................13
3
Risk Assessment for Cyber Security Management - Desklib_3
INTRODUCTION
Cyber security management refer as the corporation strategic level ability that aims to
protect the information and other resources from being theft or from other malicious activities
(Nobles, 2018). Its management helps in preventing the sensitive data and other personal
information from being misuse by hackers or cyber attackers. Information technology asset refer
to the technologies and hardware, data communication lines etc. these can be utilised in making
the strategic decisions. Following report will cover the tasks that highlights the identification of
the asset that are related to confidentiality, integrity and accountability. Furthermore it will cover
the discussion over the biden’s cybersecurity executive and description of metaverse, biometric
psychography and so on.
MAIN BODY
TASK 1
Confidentiality, integrity and accountability
Confidentiality refer as the core concept in the cyber security, simply it ensures that the sensitive
or other data is protected and secured from any unauthorised disclosure. Protecting or securing
the confidentiality is the major responsibility of the technologist and others within the
organisation (Spremić and Šimunic, 2018). Violation of confidentiality can give the negative
impact over the business as well as it gives the advantage to other business rivalries. Integrity
define as the data in the system is managed and maintained, so that it cannot be upgraded and
modified by the attackers or unauthorised parties. It is the important aspect for maintaining the
reliability and accuracy in the data. Accountability gives the legitimacy to organisation, it helps
in preventing the corruption and to ensure the better governance. As in cyber security, security
aims that develops the needs for the actions about the entity to be track uniquely. It cooperates
with non-repudiation, isolation, intrusion identification (Aldawood and Skinner, 2018).
Confidentiality Integrity Accountability
ASSET 1:
Biometric
technology
ASSET 2:
Cryptography,
it is the
ASSET 1:
Cyclic
redundancy
ASSET 2:
Cryptographic
checksum
ASSET 1:
proxy re
encryption
ASSET 2:
Block chain
technology
4
Risk Assessment for Cyber Security Management - Desklib_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Biometrics and Cyber Security: Future Direction
|4
|825
|211

Principles of Information Security: Role of People and Physical Security in Data Centers
|10
|2296
|423

Assignment on Information Security
|13
|2568
|146

System Security Assessment using Vulnerability Repositories
|42
|12515
|74

IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61

Information Security for ATM: Confidentiality, Integrity, Availability, Biometric and Cypher Code
|9
|1921
|244