Analysis of Privacy and Security Issues
VerifiedAdded on 2020/07/23
|19
|6874
|241
AI Summary
This assignment involves analyzing a collection of research papers on privacy and security issues. The papers cover topics such as differential privacy, secure data sharing, and threat detection in healthcare and finance. Researchers also discuss the use of homomorphic encryption and other techniques to ensure data protection. A summary of the key findings and recommendations from these studies is provided, highlighting areas for future research and development.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/5cecd1a3-7b8e-4c6f-ac63-386ec1e7f856-page-1.webp)
Risk Assessment
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/ee6d71e2-83f5-4457-8cc9-5a06eef2becf-page-2.webp)
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
Assessment 2....................................................................................................................................1
1. Consider the data and information that DAS holds on the employees in the current HR
system.....................................................................................................................................1
1). Establish the present threats and risks to the security of the data and information.........1
2). Other risks to the data after migration to SaaS application.............................................3
3). Assess the resulting severity of risk and threats to data and information of employees...4
2. Consider the privacy of data for those employees who will move to SaaS application.....4
1). Establish the existing risks and threats to the privacy......................................................4
2). Other risks and threats to the privacy of data and information during migration...........5
3). Resulting severity of risks and threats to the privacy of employees..................................6
3.Threats and risks to the digital identities of government employees from SaaS applications
................................................................................................................................................7
4. Considering operational solutions and locations of SaaS for HR and contractor
management............................................................................................................................9
5. Issues to data sensitivity or jurisdiction............................................................................12
CONCLUSIONS............................................................................................................................13
REFERENCES..............................................................................................................................15
INTRODUCTION...........................................................................................................................1
Assessment 2....................................................................................................................................1
1. Consider the data and information that DAS holds on the employees in the current HR
system.....................................................................................................................................1
1). Establish the present threats and risks to the security of the data and information.........1
2). Other risks to the data after migration to SaaS application.............................................3
3). Assess the resulting severity of risk and threats to data and information of employees...4
2. Consider the privacy of data for those employees who will move to SaaS application.....4
1). Establish the existing risks and threats to the privacy......................................................4
2). Other risks and threats to the privacy of data and information during migration...........5
3). Resulting severity of risks and threats to the privacy of employees..................................6
3.Threats and risks to the digital identities of government employees from SaaS applications
................................................................................................................................................7
4. Considering operational solutions and locations of SaaS for HR and contractor
management............................................................................................................................9
5. Issues to data sensitivity or jurisdiction............................................................................12
CONCLUSIONS............................................................................................................................13
REFERENCES..............................................................................................................................15
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/3865cbf8-a0e2-46e8-b26e-53844d63569c-page-3.webp)
INTRODUCTION
The aim of the study is to analyse the risk factors which are emerging under business
organisations. Australian state government has established 'the department of administrative
services' to ensure the services performed under every departments example HR, personnel
department etc. (Zhou & et. al., 2016) policies keep on fluctuating from nation to nation on a
timely basis however, to provide effective information's regarding their regulations to every
organization at different countries has been made possible due to emergence of SAAS provider's.
This assessment covers the entire risks and threats to the employee data and information that has
been revolved in different countries and places for the processing. There are various steps in
sending data from one place and the risks and all these phases involves some issues which needs
to be resolved in order to protect those data. In present report, the need of software up-gradation
has been observed by DAS and thus, the information is being shared at places accordingly. The
level at which the information has threats are the security problems at HR system of DAS
holding employee data, migration to SaaS, etc. and privacy issues at DAS internal system and
SaaS.
Assessment 2
1. Consider the data and information that DAS holds on the employees in the current HR system.
1). Establish the present threats and risks to the security of the data and information.
Current employees are considered as the most important resource for any organisation,
thus, it is mandatory to keep their data and information secure and confidential. It is a myth that
hackers are the main reason that causes security breaches in fact this information is leaker from
the insiders, either intentionally or unintentionally. Initially, when the data and information of the
employees is present in the HR house of the DAS itself, then there are some risks and threats
associated with its security and these are as follows:
Exploitation of information through remote access software: It is an intentional form of
data leakage. In this, some remote accessed software are used for stealing the data such as
terminal services, Citrix and GoToMyPC.
1
The aim of the study is to analyse the risk factors which are emerging under business
organisations. Australian state government has established 'the department of administrative
services' to ensure the services performed under every departments example HR, personnel
department etc. (Zhou & et. al., 2016) policies keep on fluctuating from nation to nation on a
timely basis however, to provide effective information's regarding their regulations to every
organization at different countries has been made possible due to emergence of SAAS provider's.
This assessment covers the entire risks and threats to the employee data and information that has
been revolved in different countries and places for the processing. There are various steps in
sending data from one place and the risks and all these phases involves some issues which needs
to be resolved in order to protect those data. In present report, the need of software up-gradation
has been observed by DAS and thus, the information is being shared at places accordingly. The
level at which the information has threats are the security problems at HR system of DAS
holding employee data, migration to SaaS, etc. and privacy issues at DAS internal system and
SaaS.
Assessment 2
1. Consider the data and information that DAS holds on the employees in the current HR system.
1). Establish the present threats and risks to the security of the data and information.
Current employees are considered as the most important resource for any organisation,
thus, it is mandatory to keep their data and information secure and confidential. It is a myth that
hackers are the main reason that causes security breaches in fact this information is leaker from
the insiders, either intentionally or unintentionally. Initially, when the data and information of the
employees is present in the HR house of the DAS itself, then there are some risks and threats
associated with its security and these are as follows:
Exploitation of information through remote access software: It is an intentional form of
data leakage. In this, some remote accessed software are used for stealing the data such as
terminal services, Citrix and GoToMyPC.
1
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/9b06a504-5b82-4aa4-a621-72ee3eb1b084-page-4.webp)
Sending out information through e-mails and instant messaging: This threat involves
sharing of personnel information with the help of E-mails and messaging.
File sharing on P2P: Peer-to-peer file sharing software such as IM is not the problem but
the trouble arises on the way of how it is used. A simple misconfiguration leads to the
network to go public which can be accessed by anyone (Cho & Chan, 2015). This is an
unintentional type of data leakage risk.
Recklessly using wireless networks: It is the biggest unintentional insider threat which
causes due to insecure wireless network usage. The most susceptible of these attacks are
the Wi-Fi networks. In addition to this, the WLANs provided to the employees in the
organisation also results in exploitation of data.
Posting information on the discussion boards: This is the easiest way to steal
information. If the entity reveals the data openly to every department then there are
threats of stealing them.
Moreover, there are various other risks which can be faced by the employees if their data
has been hacked by hackers. Under such circumstances there will be rise in the online scams,
phishing and other similar cases. As in the HR database personal sensitive information is there
that can be easily accessed by such people and they may collect personal information from other
family members through mails or fake websites (Yüksel, Küpçü & Özkasap, 2017) Along with
this, in Australia, cases related to the online theft and cybercrime has doubled. In 2016, many
companies have detected that they are facing the security incidents. A study on the IT companies
and cyber risk to them was commissioned by Telstra reported that the cases has doubled and will
further rise. In IT sector, there is another way by which private information can be accessed by
other people, that is Denial-of-service attack.
As personal information of all the companies will be mentioned in DAS so there can be
condition of cases where multiple outlooks computer-systems attack on the targeted source. Such
attacks increase the vulnerability factor of employee's personal details. By sending unlimited
messages or malformed packets they can directly hit the DAS system and can make it
slower/shut down or even crash (Wallentin & et. al, 2014)
Data breaches is another issue where information can be leaked. Person working in the
organization may also send the information to the other due personal conflict or else reason.
These are the threats and risk which can be generated while storing the data at DAS.
2
sharing of personnel information with the help of E-mails and messaging.
File sharing on P2P: Peer-to-peer file sharing software such as IM is not the problem but
the trouble arises on the way of how it is used. A simple misconfiguration leads to the
network to go public which can be accessed by anyone (Cho & Chan, 2015). This is an
unintentional type of data leakage risk.
Recklessly using wireless networks: It is the biggest unintentional insider threat which
causes due to insecure wireless network usage. The most susceptible of these attacks are
the Wi-Fi networks. In addition to this, the WLANs provided to the employees in the
organisation also results in exploitation of data.
Posting information on the discussion boards: This is the easiest way to steal
information. If the entity reveals the data openly to every department then there are
threats of stealing them.
Moreover, there are various other risks which can be faced by the employees if their data
has been hacked by hackers. Under such circumstances there will be rise in the online scams,
phishing and other similar cases. As in the HR database personal sensitive information is there
that can be easily accessed by such people and they may collect personal information from other
family members through mails or fake websites (Yüksel, Küpçü & Özkasap, 2017) Along with
this, in Australia, cases related to the online theft and cybercrime has doubled. In 2016, many
companies have detected that they are facing the security incidents. A study on the IT companies
and cyber risk to them was commissioned by Telstra reported that the cases has doubled and will
further rise. In IT sector, there is another way by which private information can be accessed by
other people, that is Denial-of-service attack.
As personal information of all the companies will be mentioned in DAS so there can be
condition of cases where multiple outlooks computer-systems attack on the targeted source. Such
attacks increase the vulnerability factor of employee's personal details. By sending unlimited
messages or malformed packets they can directly hit the DAS system and can make it
slower/shut down or even crash (Wallentin & et. al, 2014)
Data breaches is another issue where information can be leaked. Person working in the
organization may also send the information to the other due personal conflict or else reason.
These are the threats and risk which can be generated while storing the data at DAS.
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/a5b2d8ca-2c8a-424f-8393-604b9353b0d8-page-5.webp)
2). Other risks to the data after migration to SaaS application.
After migration of data from the DAS to SaaS application, there are some risks and
threats associated with this process. They are as follows:
1. Data security: The confidential data of employees will be processed in the provider's cloud-
based infrastructure which will impact the security of the data. If the provider will be
unauthorised or comprises illegal systems then it is hazardous for the DAS to share this
information with the US and Germany based companies.
2. Bankruptcy or insolvency of the cloud provider: In case if the software provider faces any
financial problem then it will directly impact upon the employee’s security as they will to be able
to find access to recover their data (Wallentin & et. al, 2014). Further, there are also possibilities
that they may sell the data in deed of money.
3.Lacking antivirus- If the antivirus will not be present in the software then there are chances of
losing the data. Also, they are more likely to be hacked.
4. Malware: They are the hostile and annoying software which are generated by hackers in order
to steal the information of the employees. Malware includes the viruses, worms, trojan horses,
spyware and other malicious programs. They are explained further:
a). Virus: These are the written programs of computer or some other scripts that are spread from
one file to other, one computer to other with several methods. (Soni & Panchal, 2017, March)
They does not have any knowledge or computer user. This virus carries data and information of
the employees and propagates through various mediums making the information accessible at all
these areas.
b). Spam: In this the emails are send to unasked bulk messages to everyone which asks for
personal information with some fake questioning. Users being unaware of this scam, share their
data which is harmful for their privacy and security.
c). Cookies: Malware can attack the cookies that contains the data of the employees in form of
cookies. Cookies are the small files which are stored on the computers and laptops of the user.
d). Spyware: It is a type of malware which is installed in computers which gathers the
information of the employees and other user without their consent (Skopik, Settanni, & Fiedler,
2016). The installation is hidden from the user and consequently they share their information.
This can be done by some other workers in order to change the details of their colleagues.
3
After migration of data from the DAS to SaaS application, there are some risks and
threats associated with this process. They are as follows:
1. Data security: The confidential data of employees will be processed in the provider's cloud-
based infrastructure which will impact the security of the data. If the provider will be
unauthorised or comprises illegal systems then it is hazardous for the DAS to share this
information with the US and Germany based companies.
2. Bankruptcy or insolvency of the cloud provider: In case if the software provider faces any
financial problem then it will directly impact upon the employee’s security as they will to be able
to find access to recover their data (Wallentin & et. al, 2014). Further, there are also possibilities
that they may sell the data in deed of money.
3.Lacking antivirus- If the antivirus will not be present in the software then there are chances of
losing the data. Also, they are more likely to be hacked.
4. Malware: They are the hostile and annoying software which are generated by hackers in order
to steal the information of the employees. Malware includes the viruses, worms, trojan horses,
spyware and other malicious programs. They are explained further:
a). Virus: These are the written programs of computer or some other scripts that are spread from
one file to other, one computer to other with several methods. (Soni & Panchal, 2017, March)
They does not have any knowledge or computer user. This virus carries data and information of
the employees and propagates through various mediums making the information accessible at all
these areas.
b). Spam: In this the emails are send to unasked bulk messages to everyone which asks for
personal information with some fake questioning. Users being unaware of this scam, share their
data which is harmful for their privacy and security.
c). Cookies: Malware can attack the cookies that contains the data of the employees in form of
cookies. Cookies are the small files which are stored on the computers and laptops of the user.
d). Spyware: It is a type of malware which is installed in computers which gathers the
information of the employees and other user without their consent (Skopik, Settanni, & Fiedler,
2016). The installation is hidden from the user and consequently they share their information.
This can be done by some other workers in order to change the details of their colleagues.
3
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/e44fdda3-a8d9-4834-bb51-38a2c527fa75-page-6.webp)
e). Phishing: In this type of malware, masquerading is done to gain the usernames, passwords,
credit card numbers, etc. In this, some entities say themselves as authentic and obtain this data
from the other organisations through e-mails.
3). Assess the resulting severity of risk and threats to data and information of employees.
According to a recent survey it was preserved that 3 out of 4 companies are sicked to the
data security policies. The essentialness of the security can be evaluated from this too. In case
when the risks and threats arises with the security of the data and information then there are
many ways in which employees can get harm (Abbas, Ali, Khan & Khan, 2016) The insecurity
can lead to severe problems which are stated further;
1. The employees with the bad intent who hacked the data can alter or delete the
information, data, contacts and other important files.
2. In case when some employees leave the entity then the HR department deletes their
record which may sometime leads to deletion of some crucial work.
2. Consider the privacy of data for those employees who will move to SaaS application.
1). Establish the existing risks and threats to the privacy.
SaaS is indeed an effective e tool but there are some issues associated with the privacy of
the data and information of the employees. In order to steal the designed data or institutions and
organisations several attacks are made by the hackers. Data bases is the core heart of every
organisation and this is the major reason due to which it is often targeted. The major risks and
threats of SaaS application are present below:
External hackers- These are the outside elements that teals the information of the employees.
They can misuse this data (Beaty & et. al, 2016) For example- They can use the bank account
number, contact number and address of the employee.
Internal hackers: These are other employees who hacks the data and information and alters them
or deletes them in order to compete them.
Data Movement: Data can be moved from one device to other. This can cause sharing of data
which may harm in maintaining the confidentialness of the employee data.
Excessive privileges – when organisation requires more job functions to be performed by their
workers, they aid in benefiting them by initiating several data base privileges. If such benefits are
4
credit card numbers, etc. In this, some entities say themselves as authentic and obtain this data
from the other organisations through e-mails.
3). Assess the resulting severity of risk and threats to data and information of employees.
According to a recent survey it was preserved that 3 out of 4 companies are sicked to the
data security policies. The essentialness of the security can be evaluated from this too. In case
when the risks and threats arises with the security of the data and information then there are
many ways in which employees can get harm (Abbas, Ali, Khan & Khan, 2016) The insecurity
can lead to severe problems which are stated further;
1. The employees with the bad intent who hacked the data can alter or delete the
information, data, contacts and other important files.
2. In case when some employees leave the entity then the HR department deletes their
record which may sometime leads to deletion of some crucial work.
2. Consider the privacy of data for those employees who will move to SaaS application.
1). Establish the existing risks and threats to the privacy.
SaaS is indeed an effective e tool but there are some issues associated with the privacy of
the data and information of the employees. In order to steal the designed data or institutions and
organisations several attacks are made by the hackers. Data bases is the core heart of every
organisation and this is the major reason due to which it is often targeted. The major risks and
threats of SaaS application are present below:
External hackers- These are the outside elements that teals the information of the employees.
They can misuse this data (Beaty & et. al, 2016) For example- They can use the bank account
number, contact number and address of the employee.
Internal hackers: These are other employees who hacks the data and information and alters them
or deletes them in order to compete them.
Data Movement: Data can be moved from one device to other. This can cause sharing of data
which may harm in maintaining the confidentialness of the employee data.
Excessive privileges – when organisation requires more job functions to be performed by their
workers, they aid in benefiting them by initiating several data base privileges. If such benefits are
4
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/7de1d303-8506-4fc9-8b55-7f9edb5d26a9-page-7.webp)
not provided by business firms than it will result in reduction of trust as well as loyalty of its
staff members.
Injection attacks of data base – they are comprised of two types such as- SQL injections and
NoSQL injections. Traditional data base systems are targeted by SQL injections whereas big data
platforms are attacked by NoSQL injections. Further, these are beneficial to be adopted because
it restricts the threat and risks of collected data.
Human factor – it has been identified that data breach is often conducted because of the
negligence of human resources (Saki & et. al., 2016) Ponemon institute of data breach has been
identified that lack of expertise under such factors can be overcome by enhancing enforce
policies, security controls and by establishing several processes.
Malware- it is the biggest threat of data exposures because when users maintains its data by
using infected devices it can be easily stole or hacked. Thus, for avoiding such threats,
organisations or institutions must restrict the use of such unprotected websites.
Weak audit trial - threats are emerged due to insufficient internal gaps or processes. However,
failure in monitoring compliance anomalies, appropriate audit details and security can cause
enormous threat or risks for the collected data.
Unsecured storage media – data base backup tapes and disks has encouraged numerous threats
regarding data breaches (Russo & Zou, 2016, May). Data can be of many types including-
duplicate, copy, big data, private data and many more. However, it is crucial to maintain copies
of sensitive data which will develop the security measures under every institution as well as
organisations.
2). Other risks and threats to the privacy of data and information during migration.
Sending of data from DAS to SaaS involves different platforms. All these information is
reached to California, Germany and India; thus, this migration has created so many risks with the
privacy of the information. The data can be accessed at many place and can be stolen at any
5
staff members.
Injection attacks of data base – they are comprised of two types such as- SQL injections and
NoSQL injections. Traditional data base systems are targeted by SQL injections whereas big data
platforms are attacked by NoSQL injections. Further, these are beneficial to be adopted because
it restricts the threat and risks of collected data.
Human factor – it has been identified that data breach is often conducted because of the
negligence of human resources (Saki & et. al., 2016) Ponemon institute of data breach has been
identified that lack of expertise under such factors can be overcome by enhancing enforce
policies, security controls and by establishing several processes.
Malware- it is the biggest threat of data exposures because when users maintains its data by
using infected devices it can be easily stole or hacked. Thus, for avoiding such threats,
organisations or institutions must restrict the use of such unprotected websites.
Weak audit trial - threats are emerged due to insufficient internal gaps or processes. However,
failure in monitoring compliance anomalies, appropriate audit details and security can cause
enormous threat or risks for the collected data.
Unsecured storage media – data base backup tapes and disks has encouraged numerous threats
regarding data breaches (Russo & Zou, 2016, May). Data can be of many types including-
duplicate, copy, big data, private data and many more. However, it is crucial to maintain copies
of sensitive data which will develop the security measures under every institution as well as
organisations.
2). Other risks and threats to the privacy of data and information during migration.
Sending of data from DAS to SaaS involves different platforms. All these information is
reached to California, Germany and India; thus, this migration has created so many risks with the
privacy of the information. The data can be accessed at many place and can be stolen at any
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/b3dc3e0d-9885-4dea-9f09-2292c4bc8d9c-page-8.webp)
level. Further, in recent years situation of Malware is happening to the SaaS application in which
the data are scan through the My document folders and send to the random email contacts of user
(Dhivya, Devi & Shanmugalakshmi, 2016, January) In addition to this, the application creates
increased data access which may results in the risks to the confidentiality if the data and
information of employees. Moreover, the 'access anywhere' tool is good as it enhances the
convenience but there are also some risks associated with the privacy as individual with the log
ins and passwords can access the data and information of others.
In day to day life of every institutions and organisations, migration of data under IT
department has become a big part. This encourages huge challenge for the organisations related
to its confidentiality, availability during its migration (Rahimian, Bajaj & Bradley, 2016). Cloud
based services are often threaten because in enhances the chances of data breaches. Therefore,
many business firms have restricted their employees in migrating their data through such
applications.
It further results in isolation failures. Such threats are occurred due to lack of mechanism,
storage, routing and reputation etc. however, adoption of resource isolation mechanism is
beneficial in eradicating the risks of data breaches (Perruche, Clauzon, Bonnefoy, Toussirot &
Saas, 2014). Moreover, migration of data encourages risks within deletion of incomplete or
insecure data. Timely changes are also restricted under such circumstances which increases the
risks and threats related to collected informations. Thus, these are some other threats and risks of
migration of data from DAS to SaaS which affects the privacy of the employees.
3). Resulting severity of risks and threats to the privacy of employees.
The risks and threats associated with the privacy in SaaS application results in failure in
maintaining confidentiality of the employees (Perruche, Clauzon, Bonnefoy, Toussirot & Saas,
2014). There are severe issues that can be generated with this error. Some major problems
include leaking of contact number that may trouble the holder by fake calls, in addition to this,
when the bank account number will be leaked then some hackers may misuse this and can steal
money.
Proactive or repetitive approach must be initiated by organisations for enhancing security
of the collected data. However, in order to enhance the security system of enterprises several
rationale has been emerged including- productivity, self-analysis, cost justification,
communication, breaking barriers etc. expenses are generally included while adding security
6
the data are scan through the My document folders and send to the random email contacts of user
(Dhivya, Devi & Shanmugalakshmi, 2016, January) In addition to this, the application creates
increased data access which may results in the risks to the confidentiality if the data and
information of employees. Moreover, the 'access anywhere' tool is good as it enhances the
convenience but there are also some risks associated with the privacy as individual with the log
ins and passwords can access the data and information of others.
In day to day life of every institutions and organisations, migration of data under IT
department has become a big part. This encourages huge challenge for the organisations related
to its confidentiality, availability during its migration (Rahimian, Bajaj & Bradley, 2016). Cloud
based services are often threaten because in enhances the chances of data breaches. Therefore,
many business firms have restricted their employees in migrating their data through such
applications.
It further results in isolation failures. Such threats are occurred due to lack of mechanism,
storage, routing and reputation etc. however, adoption of resource isolation mechanism is
beneficial in eradicating the risks of data breaches (Perruche, Clauzon, Bonnefoy, Toussirot &
Saas, 2014). Moreover, migration of data encourages risks within deletion of incomplete or
insecure data. Timely changes are also restricted under such circumstances which increases the
risks and threats related to collected informations. Thus, these are some other threats and risks of
migration of data from DAS to SaaS which affects the privacy of the employees.
3). Resulting severity of risks and threats to the privacy of employees.
The risks and threats associated with the privacy in SaaS application results in failure in
maintaining confidentiality of the employees (Perruche, Clauzon, Bonnefoy, Toussirot & Saas,
2014). There are severe issues that can be generated with this error. Some major problems
include leaking of contact number that may trouble the holder by fake calls, in addition to this,
when the bank account number will be leaked then some hackers may misuse this and can steal
money.
Proactive or repetitive approach must be initiated by organisations for enhancing security
of the collected data. However, in order to enhance the security system of enterprises several
rationale has been emerged including- productivity, self-analysis, cost justification,
communication, breaking barriers etc. expenses are generally included while adding security
6
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/0ed4fb2b-70f9-4bf0-9266-ff1f9b1122b8-page-9.webp)
system under institutions (Pasupuleti, Ramalingam & Buyya, 2016) Development of IT security
software or any other reliable technologies would reduce every risk factors related to safety of
personal data. Effective information among multiple companies before taking necessary
decisions is also helpful in severity of threats among private data of staff members.
3.Threats and risks to the digital identities of government employees from SaaS applications
Saas application is the software in which third party give host application and provide
access to the customers on the internet. Severe issues that several business firms face is basically
related to the information security (Öğütçü, Testik & Chouseinoglou, 2016). Mainly they aid in
assessing, collecting or identifying measures to avoid such risks or hindrances related to privacy
of collected information’s. Basically, they had established SAAS applications which is beneficial
in providing effective information’s to several companies or entities.
Therefore, such factors influence long term risk factors along with involvement of
governance related to approval, ongoing support etc. however, to manage risks effectively is very
crucial to maintain effective structure of the organisations. The main risks and threats of SaaS
application to government employees are defined as follows:
Data breach:
In this there is risk of data stealing and loss. The data is stolen by hackers which stole the
important information regarding company’s business plans and other important business
information. It also hacks the credit card information of the employees (Lin & et. al., 2016).
Further, they can hack all the important details of the company when it hijacks the master
computers of the organisation. This will directly affect the company performance as their all data
are exposed to the hackers.
Service traffic hacking:
In this, accounts are hijacked by the hackers. It is very easy for the hackers to stole the
information of employee’s accounts by using phishing and social engineering methods. (Li, Dai,
Ming & Qiu, 2016). Employees which access their data with the help of cloud facilities then they
are more vulnerable to hijacked as they steal cookies of the user and steal whole information.
Access over personal information’s: -
7
software or any other reliable technologies would reduce every risk factors related to safety of
personal data. Effective information among multiple companies before taking necessary
decisions is also helpful in severity of threats among private data of staff members.
3.Threats and risks to the digital identities of government employees from SaaS applications
Saas application is the software in which third party give host application and provide
access to the customers on the internet. Severe issues that several business firms face is basically
related to the information security (Öğütçü, Testik & Chouseinoglou, 2016). Mainly they aid in
assessing, collecting or identifying measures to avoid such risks or hindrances related to privacy
of collected information’s. Basically, they had established SAAS applications which is beneficial
in providing effective information’s to several companies or entities.
Therefore, such factors influence long term risk factors along with involvement of
governance related to approval, ongoing support etc. however, to manage risks effectively is very
crucial to maintain effective structure of the organisations. The main risks and threats of SaaS
application to government employees are defined as follows:
Data breach:
In this there is risk of data stealing and loss. The data is stolen by hackers which stole the
important information regarding company’s business plans and other important business
information. It also hacks the credit card information of the employees (Lin & et. al., 2016).
Further, they can hack all the important details of the company when it hijacks the master
computers of the organisation. This will directly affect the company performance as their all data
are exposed to the hackers.
Service traffic hacking:
In this, accounts are hijacked by the hackers. It is very easy for the hackers to stole the
information of employee’s accounts by using phishing and social engineering methods. (Li, Dai,
Ming & Qiu, 2016). Employees which access their data with the help of cloud facilities then they
are more vulnerable to hijacked as they steal cookies of the user and steal whole information.
Access over personal information’s: -
7
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/db6a0291-bdda-4048-b465-2ac2247d4ba1-page-10.webp)
The biggest threat from SAAs applications relies over leakage of personal contents
related to its workers. Every business organisation possesses number of employees; however,
generation of applications has made it easier for the employers to collect information’s about a
particular person (Klein & et. al., 2016, May). Under this factor every individual has certain
rights to know about the information’s that are collected by their business firms or institutions. If
they find any wrong data regarding their personal information they possess rights to correct
them. Therefore, this is the most effective data collection strategy which secures the personal
information among other co-workers.
Denial of service attacks:
Denial of service is the main threat of the employees as they diminish the service before the user
can logout (Kennedy & Millard, 2016). Cloud computing has provided various options for the
hackers to enter and they will expire the cookies of the user which results in closing of the page
on which they are working. The employee's information is stolen in this way as this does not
give chance to the user to logout their window.
Collecting and managing personal information: -
Mainly the threat of government entities lies under gathering of personal data effectively
so that there are less emerging issues related to any misuse or harmful activities. In order to
avoid such factors effective security for collected information need to be generated. Protection of
personal data is appropriately encrypted to maintain sensitive information’s. Security source
code is established to control or manage the collected information related to support or project
activities in secured manner. In order to enhance effectiveness implementation of technical
vulnerability management has been undertaken. Therefore, these measures reduce the risk factors
related to misleading personal information of every individuals (Skopik, Settanni & Fiedler,
2016).
Security and usage of digital identities: -
Such factors provide important information external agent to the employers or managers.
It can be either applications, organisation or any useful devices. Such services are generated with
the help of computers and does not involve any human resources. Therefore, it emerges the
biggest threat related to misuse or misinterpretation of collected data. It is the effective method
8
related to its workers. Every business organisation possesses number of employees; however,
generation of applications has made it easier for the employers to collect information’s about a
particular person (Klein & et. al., 2016, May). Under this factor every individual has certain
rights to know about the information’s that are collected by their business firms or institutions. If
they find any wrong data regarding their personal information they possess rights to correct
them. Therefore, this is the most effective data collection strategy which secures the personal
information among other co-workers.
Denial of service attacks:
Denial of service is the main threat of the employees as they diminish the service before the user
can logout (Kennedy & Millard, 2016). Cloud computing has provided various options for the
hackers to enter and they will expire the cookies of the user which results in closing of the page
on which they are working. The employee's information is stolen in this way as this does not
give chance to the user to logout their window.
Collecting and managing personal information: -
Mainly the threat of government entities lies under gathering of personal data effectively
so that there are less emerging issues related to any misuse or harmful activities. In order to
avoid such factors effective security for collected information need to be generated. Protection of
personal data is appropriately encrypted to maintain sensitive information’s. Security source
code is established to control or manage the collected information related to support or project
activities in secured manner. In order to enhance effectiveness implementation of technical
vulnerability management has been undertaken. Therefore, these measures reduce the risk factors
related to misleading personal information of every individuals (Skopik, Settanni & Fiedler,
2016).
Security and usage of digital identities: -
Such factors provide important information external agent to the employers or managers.
It can be either applications, organisation or any useful devices. Such services are generated with
the help of computers and does not involve any human resources. Therefore, it emerges the
biggest threat related to misuse or misinterpretation of collected data. It is the effective method
8
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/b7919ab7-99d9-42dd-bdb0-2d93e871f3a5-page-11.webp)
of collecting personnel digital identities if required by the business firms (Sakib & et. al., 2016).
Digital identity involves online search activities, social security, usernames or passwords etc.
however, this ensures security of the collected information and reduces risks factors. Therefore,
it incurs a lot of threat related to identities of government.
Correction and Quality of private information’s: -
It is applicable when any organisation possesses false information of the workers.
Therefore, it is needed to be corrected on a timely basis by adopting several additions,
corrections, deletions etc. (Hemphill & Longstreet, 2016) however, by adopting this privacy
strategy of DAS companies can easily edit the false information by replacing it with the correct
one. Thus, it develops private data of personnel with adequate quality and correctiveness.
Disclosure and usage of personal information:
SAAS is established to protect the personal data of employees and workers under
institutions as well as organisations. However, such information sources ned to be highly
protected to eradicate its misuse or misinterpretation which is the biggest threat that has been
encouraged. Thus, DAS has formulated such privacy strategy to collect all relevant information
of personnel’s which is very beneficial in every management activities. This data provides
accountability of generated information, the purpose of collection, its accuracy, safeguard,
openness etc (Angurala & Pal, 2017). However, any information about some personnel is
disclosed among governments or other authorities if there is any negative occurring or for proof
readings. Likewise, information’s of employees may be shared for encouraging staff
innovations. Therefore, it is effective in providing safeguard to the collected data.
Shared technology:
Cloud computing provides hare technology as they have to provide resources to many
organisations and people. This give rise to insecurities and other risks to the services of other
users. This includes losing of data or problems in resource sharing.
4. Considering operational solutions and locations of SaaS for HR and contractor management.
SAAs provider technology is improvising at huge context in providing several solutions
to the problems that are emerging under organisations and IT departments from last many years.
Maintaining IT is very challenging aspect faced by smaller as well as larger firms (Dhivya, Devi
9
Digital identity involves online search activities, social security, usernames or passwords etc.
however, this ensures security of the collected information and reduces risks factors. Therefore,
it incurs a lot of threat related to identities of government.
Correction and Quality of private information’s: -
It is applicable when any organisation possesses false information of the workers.
Therefore, it is needed to be corrected on a timely basis by adopting several additions,
corrections, deletions etc. (Hemphill & Longstreet, 2016) however, by adopting this privacy
strategy of DAS companies can easily edit the false information by replacing it with the correct
one. Thus, it develops private data of personnel with adequate quality and correctiveness.
Disclosure and usage of personal information:
SAAS is established to protect the personal data of employees and workers under
institutions as well as organisations. However, such information sources ned to be highly
protected to eradicate its misuse or misinterpretation which is the biggest threat that has been
encouraged. Thus, DAS has formulated such privacy strategy to collect all relevant information
of personnel’s which is very beneficial in every management activities. This data provides
accountability of generated information, the purpose of collection, its accuracy, safeguard,
openness etc (Angurala & Pal, 2017). However, any information about some personnel is
disclosed among governments or other authorities if there is any negative occurring or for proof
readings. Likewise, information’s of employees may be shared for encouraging staff
innovations. Therefore, it is effective in providing safeguard to the collected data.
Shared technology:
Cloud computing provides hare technology as they have to provide resources to many
organisations and people. This give rise to insecurities and other risks to the services of other
users. This includes losing of data or problems in resource sharing.
4. Considering operational solutions and locations of SaaS for HR and contractor management.
SAAs provider technology is improvising at huge context in providing several solutions
to the problems that are emerging under organisations and IT departments from last many years.
Maintaining IT is very challenging aspect faced by smaller as well as larger firms (Dhivya, Devi
9
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/87622cb7-4026-428b-8e7b-25bcde5cec7a-page-12.webp)
& Shanmugalakshmi, 2016) . Larger firms comprise of large data, variety of external and
internal application, traffic of high volume etc. whereas small or medium firms consists of less
resources and fewer data. Likewise, every organization faces challenges under different aspects.
It is the basic responsibility of every business organisation to identify the prevailing risks and
likewise generate effective measures to overcome those risks. However, there are several risks
which are difficult to overcome. Thus, effective measures are recommended by SAAS to
overcome with the issues of large burdens, storage of huge data effectively etc. Dealing among
low probability risks with high impact cannot be easily covered through contingencies. With the
reduction of likelihood or impact low probability high impact can be easily mitigated. However,
such mitigation of risks incurs huge amount of costs due to which firms or institutions need to
formulate budgets (Batra & Arora, 2016). Therefore, it is very crucial to firstly identify the
prevailing risks and likewise generates measures to track or eradicate them. Risk mitigation
activities are uncertain and cannot be predicted that it will be beneficial or not.
The most effective solution emerged by SAAS is Organizational flexibility. Every
business organisations possess several components that causes uncertainty among business
undertakings. Such uncertainties further cause generation of risk factors that are crucial to be
determined before initiating project planning process (Clement & Obar 2016). Such risk factors
can be controlled if there would be timely reduction by discouraging the influence of uncertain
business environment (Klein & et. al., 2016, May). Moreover, flexibility under institutions as
well as organisations is the best solution of SAAS for HR and contractor management. This
further relies over network consists of virtual servers connected over internet to manage, access,
store or process data to perform the tasks effectively. Therefore, it provides effective services
which decreases the burden or headaches of IT departments (Öğütçü, Testik & Chouseinoglou,
2016).
According to the laws and regulations of Australian laws Privacy act 1988 is developed
to protect personal information’s of every employees which need to be protected from several
misuses, disclosures, modifications etc. however, development of SAAS applications under
organisations or institutions has adopted several services such as APP services, ICT security,
blacklisting and whitelisting, software security, access, data handling, network security,
encryption, backing up , testing, data breaches, physical security, workplace policies, governance
and many more. Therefore, adoption of effective ICT security is beneficial in protecting the
10
internal application, traffic of high volume etc. whereas small or medium firms consists of less
resources and fewer data. Likewise, every organization faces challenges under different aspects.
It is the basic responsibility of every business organisation to identify the prevailing risks and
likewise generate effective measures to overcome those risks. However, there are several risks
which are difficult to overcome. Thus, effective measures are recommended by SAAS to
overcome with the issues of large burdens, storage of huge data effectively etc. Dealing among
low probability risks with high impact cannot be easily covered through contingencies. With the
reduction of likelihood or impact low probability high impact can be easily mitigated. However,
such mitigation of risks incurs huge amount of costs due to which firms or institutions need to
formulate budgets (Batra & Arora, 2016). Therefore, it is very crucial to firstly identify the
prevailing risks and likewise generates measures to track or eradicate them. Risk mitigation
activities are uncertain and cannot be predicted that it will be beneficial or not.
The most effective solution emerged by SAAS is Organizational flexibility. Every
business organisations possess several components that causes uncertainty among business
undertakings. Such uncertainties further cause generation of risk factors that are crucial to be
determined before initiating project planning process (Clement & Obar 2016). Such risk factors
can be controlled if there would be timely reduction by discouraging the influence of uncertain
business environment (Klein & et. al., 2016, May). Moreover, flexibility under institutions as
well as organisations is the best solution of SAAS for HR and contractor management. This
further relies over network consists of virtual servers connected over internet to manage, access,
store or process data to perform the tasks effectively. Therefore, it provides effective services
which decreases the burden or headaches of IT departments (Öğütçü, Testik & Chouseinoglou,
2016).
According to the laws and regulations of Australian laws Privacy act 1988 is developed
to protect personal information’s of every employees which need to be protected from several
misuses, disclosures, modifications etc. however, development of SAAS applications under
organisations or institutions has adopted several services such as APP services, ICT security,
blacklisting and whitelisting, software security, access, data handling, network security,
encryption, backing up , testing, data breaches, physical security, workplace policies, governance
and many more. Therefore, adoption of effective ICT security is beneficial in protecting the
10
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/563efcb6-3db2-454a-bd78-66c422414426-page-13.webp)
hardware system of computers which holds up the personal data of several legitimate users.
Regular monitoring of such data should be ensured which would eradicate the pertaining risks or
threats by encouraging sense of security among them (Chang & Ramachandran, 2016).
In order to overcome with the issues of large burdens, storage of huge data effectively
etc. SAAS has emerged with several solutions. This further relies over network comprises of
virtual servers connected over internet to manage, access, store or process data to perform the
tasks effectively. Therefore, it provides effective services which decreases the burden or
headaches of IT departments (Öğütçü, Testik & Chouseinoglou, 2016). Although this service is
beneficial in several aspects but it should not be adopted without concerning about their
securities. Under SAAS provider an organization creates cluster of valuable data through virtual
machines, to perform the tasks and therefore, represents each point of entry inside the systems.
Such machines mitigate the prevailing risks and further creates an effective understanding for the
discussion about risks and suggests several measures to overcome them.
Risk buffering identifies the risks that may occur under business organisation. One of the best
example of risk buffering is contingency (Cho & Chan, 2015). Those projects which are running
out of money and consists of large risks are merely eradicated by applying this control method.
These are basically applied by owners or contractors. Buffering can further result in declining
every major issue that can harm the private information’s of the individual.
On the other hand, control over risks is the best solution for SAAS application for
mitigation, reduction or managing the prevailed risks which will be beneficial for attaining
livelihood of individuals. By developing warning systems, installation of data gathering,
assessing of accurate information’s, indicating timings of prevailing risks etc. are some effective
measures that can be adopted for controlling the prevailed risks (Chang & Ramachandran, 2016).
Controlling risks is an expensive process when these are occurred due to introduction of new
products, adoption of the latest technologies, analysing market competition etc. for example-
studying or monitoring the development in technologies is the most effective way of controlling
the emerging risks. Further, SAAS provides every user an account to access their applications
easily. For example- Facebook, Adobe marketing cloud, google apps, Cisco Web-ex etc.
thereafter SAAS includes many risks such as- shared technology, insufficient due diligence,
insecure APIs etc. For overcoming such risks implementations should be emerged to provide
protections between users, trusted business partners. Therefore, it should enhance CSP securities
11
Regular monitoring of such data should be ensured which would eradicate the pertaining risks or
threats by encouraging sense of security among them (Chang & Ramachandran, 2016).
In order to overcome with the issues of large burdens, storage of huge data effectively
etc. SAAS has emerged with several solutions. This further relies over network comprises of
virtual servers connected over internet to manage, access, store or process data to perform the
tasks effectively. Therefore, it provides effective services which decreases the burden or
headaches of IT departments (Öğütçü, Testik & Chouseinoglou, 2016). Although this service is
beneficial in several aspects but it should not be adopted without concerning about their
securities. Under SAAS provider an organization creates cluster of valuable data through virtual
machines, to perform the tasks and therefore, represents each point of entry inside the systems.
Such machines mitigate the prevailing risks and further creates an effective understanding for the
discussion about risks and suggests several measures to overcome them.
Risk buffering identifies the risks that may occur under business organisation. One of the best
example of risk buffering is contingency (Cho & Chan, 2015). Those projects which are running
out of money and consists of large risks are merely eradicated by applying this control method.
These are basically applied by owners or contractors. Buffering can further result in declining
every major issue that can harm the private information’s of the individual.
On the other hand, control over risks is the best solution for SAAS application for
mitigation, reduction or managing the prevailed risks which will be beneficial for attaining
livelihood of individuals. By developing warning systems, installation of data gathering,
assessing of accurate information’s, indicating timings of prevailing risks etc. are some effective
measures that can be adopted for controlling the prevailed risks (Chang & Ramachandran, 2016).
Controlling risks is an expensive process when these are occurred due to introduction of new
products, adoption of the latest technologies, analysing market competition etc. for example-
studying or monitoring the development in technologies is the most effective way of controlling
the emerging risks. Further, SAAS provides every user an account to access their applications
easily. For example- Facebook, Adobe marketing cloud, google apps, Cisco Web-ex etc.
thereafter SAAS includes many risks such as- shared technology, insufficient due diligence,
insecure APIs etc. For overcoming such risks implementations should be emerged to provide
protections between users, trusted business partners. Therefore, it should enhance CSP securities
11
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/bd2d2eb2-a36a-47f0-985c-bc277b52ad56-page-14.webp)
to avoid risks of transferring data. They even work among experts to assure its security either as
business consultant, or third-party auditor etc. on a regular basis (Hemphill & Longstreet, 2016).
Apart from this SAAS uses in house applications as well as up to date systems which supports
out dated software like windows XP, internet explorer & with complete security.
5. Issues to data sensitivity or jurisdiction
It is very necessary to protect data of the organization as well as employees. Information
are directly saved on computers which are hacked by the hackers. The data is stolen by the
stealer very easily as they can apply different techniques which are quite easy to steal the
important information (Beaty & et. al, 2016). The main issue comes during data storage is
internal storage. The massive data of company's work and employee’s information increases
daily and it is very difficult to manage them with high security.
Another issue is that data is used by the organisation to increase their productivity can be
hacked by anyone. So, there is great need to protect data and important information to work
successfully (Kennedy & Millard, 2016). Employees information must be kept safe by the
company so that no one can access to them. In order to protect all this information, the company
has to take help of cloud and Saas software to properly maintain them. Storage of information on
the cloud is quite risky as it increases the threat of stealing. So, every organisation has to put
their information on the cloud with high security.
Security and control is very important to be performed under every business organisation or
institution to generate a sense of security among every individual. Risk related to security of
employee’s personal data can be overcome by adopting several security measures such as
responding over the uncertainty level in business operations can generate risks in the security of
personal information data (Batra & Arora, 2016). Therefore, they should adopt the policy of risks
transferring, risk control, risk buffering, risk avoidance, flexibility under organisational
undertakings, risk assumption etc. all these strategies are very crucial to be implied for
eradicating the risk factors related to the security of personal data.
In order to protect personal information data organisations must concentrate over the data
controllers, its obligations and exemptions, data processors etc. further, they should undergo the
examination of several ranges or data such as sensitive materials, personal data as well as other
records which are relevant to the personal information (Angurala & Pal, 2017). Therefore, they
12
business consultant, or third-party auditor etc. on a regular basis (Hemphill & Longstreet, 2016).
Apart from this SAAS uses in house applications as well as up to date systems which supports
out dated software like windows XP, internet explorer & with complete security.
5. Issues to data sensitivity or jurisdiction
It is very necessary to protect data of the organization as well as employees. Information
are directly saved on computers which are hacked by the hackers. The data is stolen by the
stealer very easily as they can apply different techniques which are quite easy to steal the
important information (Beaty & et. al, 2016). The main issue comes during data storage is
internal storage. The massive data of company's work and employee’s information increases
daily and it is very difficult to manage them with high security.
Another issue is that data is used by the organisation to increase their productivity can be
hacked by anyone. So, there is great need to protect data and important information to work
successfully (Kennedy & Millard, 2016). Employees information must be kept safe by the
company so that no one can access to them. In order to protect all this information, the company
has to take help of cloud and Saas software to properly maintain them. Storage of information on
the cloud is quite risky as it increases the threat of stealing. So, every organisation has to put
their information on the cloud with high security.
Security and control is very important to be performed under every business organisation or
institution to generate a sense of security among every individual. Risk related to security of
employee’s personal data can be overcome by adopting several security measures such as
responding over the uncertainty level in business operations can generate risks in the security of
personal information data (Batra & Arora, 2016). Therefore, they should adopt the policy of risks
transferring, risk control, risk buffering, risk avoidance, flexibility under organisational
undertakings, risk assumption etc. all these strategies are very crucial to be implied for
eradicating the risk factors related to the security of personal data.
In order to protect personal information data organisations must concentrate over the data
controllers, its obligations and exemptions, data processors etc. further, they should undergo the
examination of several ranges or data such as sensitive materials, personal data as well as other
records which are relevant to the personal information (Angurala & Pal, 2017). Therefore, they
12
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/760ba518-90e9-4ae7-a677-e7dca77b5249-page-15.webp)
should concern over the data protection principles including rights of individuals or their
security.
Moreover, organisation can outline the structure for preparation of its data audit. For
securing the personal information they should develop a strategy or procedures which can
enhance the quality and security in preserving data from any misuses. As per the Australian law's
organisation must monitor the aspects of business and private aspects which can secure the
security or confidentiality of collected data.
Institutions or business firms must establish the compliance of data protection which is
the most highlighted strategy that can reduces the security of personal data of employees (Abbas,
Ali, Khan & Khan, 2016). Thus, to avoid risks of security for the personal information of staff
members every institution as well as organisations must adopt the above strategies to control
such factors.
However, risk assumption states that issues and hindrances that are faced by the
organisation cannot be ignored and therefore measures or plans are required to be implemented
in such a way that it eradicates the prevailing factors. Firstly, risks need to be assumed by the
employers or managers and likewise must be communicated among its employees in an effective
manner (Rahimian, Bajaj & Bradley, 2016). So, every organisation has to put their information
on the cloud with high security.
CONCLUSIONS
The above study highlighted that every business organization faces several threats and
issues regarding management of data and other securities from its rivals. SAAS is the most
effective service provider which identifies every risks and issues that are undertaking under
business organisations. Thus, it further adopts several implications in overcoming such risk
factors to enhance security as well as safety among business organization. Further, organisations
as well as institutions should control the risks and issues that are overcoming due to misuse of
personal information’s of every individual.
DAS has formulated several strategies in providing protection to the risks that are
prevailing under business organisations. Assessing, securing, protecting of personal data is very
crucial so that no risk factors are prevailed. Further, companies must adopt ICT services of
several other software's to secure the data of its employees confidentially under them. Not only
13
security.
Moreover, organisation can outline the structure for preparation of its data audit. For
securing the personal information they should develop a strategy or procedures which can
enhance the quality and security in preserving data from any misuses. As per the Australian law's
organisation must monitor the aspects of business and private aspects which can secure the
security or confidentiality of collected data.
Institutions or business firms must establish the compliance of data protection which is
the most highlighted strategy that can reduces the security of personal data of employees (Abbas,
Ali, Khan & Khan, 2016). Thus, to avoid risks of security for the personal information of staff
members every institution as well as organisations must adopt the above strategies to control
such factors.
However, risk assumption states that issues and hindrances that are faced by the
organisation cannot be ignored and therefore measures or plans are required to be implemented
in such a way that it eradicates the prevailing factors. Firstly, risks need to be assumed by the
employers or managers and likewise must be communicated among its employees in an effective
manner (Rahimian, Bajaj & Bradley, 2016). So, every organisation has to put their information
on the cloud with high security.
CONCLUSIONS
The above study highlighted that every business organization faces several threats and
issues regarding management of data and other securities from its rivals. SAAS is the most
effective service provider which identifies every risks and issues that are undertaking under
business organisations. Thus, it further adopts several implications in overcoming such risk
factors to enhance security as well as safety among business organization. Further, organisations
as well as institutions should control the risks and issues that are overcoming due to misuse of
personal information’s of every individual.
DAS has formulated several strategies in providing protection to the risks that are
prevailing under business organisations. Assessing, securing, protecting of personal data is very
crucial so that no risk factors are prevailed. Further, companies must adopt ICT services of
several other software's to secure the data of its employees confidentially under them. Not only
13
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/e460a7a0-bf98-4cd2-9ead-5d9df388110a-page-16.webp)
this, they should develop control factors to overcome risks and for generating privacy as well as
security within the collected information.
14
security within the collected information.
14
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/ded85c7e-0394-4b1a-9c25-e329c64c9373-page-17.webp)
REFERENCES
Books and Journal
Abbas, A., Ali, M., Khan, M. U. S., & Khan, S. U. (2016). Personalized healthcare cloud
services for disease risk assessment and wellness management using social
media. Pervasive and Mobile Computing, 28, 81-99.
Angurala, A., & Pal, S. (2017). Forest Tree-An efficient proposal approach for Data Mining.
Journal of Computers & Technology.1(1).
Batra, M., & Arora, A. (2016). Cloud computing security: A review.International Journal.4(5).
Beaty, K. A. & et.al, (2016). Managing sensitive applications in the public cloud. IBM Journal
of Research and Development, 60(2-3), 4-1.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud
computing adoption framework. IEEE Transactions on Services Computing.9(1). 138-
151.
Cho, V., & Chan, A. (2015). An integrative framework of comparing SaaS adoption for core and
non-core business operations: An empirical study on Hong Kong industries. Information
systems frontiers, 17(3), 629-644.
Clement, A., & Obar, J. A. (2016). Keeping internet users in the know or in the dark: An analysis
of the data privacy transparency of Canadian internet carriers. Journal of Information
Policy.6(1). 294-331.
Dhivya, R., Devi, R., & Shanmugalakshmi, R. (2016, January). Parameters and methods used to
evaluate cloud service providers: A survey. In Computer Communication and
Informatics (ICCCI), 2016 International Conference on (pp. 1-5). IEEE.
Hemphill, T. A., & Longstreet, P. (2016). Financial data breaches in the US retail economy:
Restoring confidence in information technology security standards. Technology in
Society.44. 30-38.
Kennedy, E., & Millard, C. (2016). Data security and multi-factor authentication: Analysis of
requirements under EU law and in selected EU Member States. Computer Law &
Security Review.32(1). 91-110.
15
Books and Journal
Abbas, A., Ali, M., Khan, M. U. S., & Khan, S. U. (2016). Personalized healthcare cloud
services for disease risk assessment and wellness management using social
media. Pervasive and Mobile Computing, 28, 81-99.
Angurala, A., & Pal, S. (2017). Forest Tree-An efficient proposal approach for Data Mining.
Journal of Computers & Technology.1(1).
Batra, M., & Arora, A. (2016). Cloud computing security: A review.International Journal.4(5).
Beaty, K. A. & et.al, (2016). Managing sensitive applications in the public cloud. IBM Journal
of Research and Development, 60(2-3), 4-1.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud
computing adoption framework. IEEE Transactions on Services Computing.9(1). 138-
151.
Cho, V., & Chan, A. (2015). An integrative framework of comparing SaaS adoption for core and
non-core business operations: An empirical study on Hong Kong industries. Information
systems frontiers, 17(3), 629-644.
Clement, A., & Obar, J. A. (2016). Keeping internet users in the know or in the dark: An analysis
of the data privacy transparency of Canadian internet carriers. Journal of Information
Policy.6(1). 294-331.
Dhivya, R., Devi, R., & Shanmugalakshmi, R. (2016, January). Parameters and methods used to
evaluate cloud service providers: A survey. In Computer Communication and
Informatics (ICCCI), 2016 International Conference on (pp. 1-5). IEEE.
Hemphill, T. A., & Longstreet, P. (2016). Financial data breaches in the US retail economy:
Restoring confidence in information technology security standards. Technology in
Society.44. 30-38.
Kennedy, E., & Millard, C. (2016). Data security and multi-factor authentication: Analysis of
requirements under EU law and in selected EU Member States. Computer Law &
Security Review.32(1). 91-110.
15
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/84e3bd39-5d1c-431a-9c24-cbce0e47c1ae-page-18.webp)
Klein, J. & et.al., (2016, May). A reference architecture for big data systems in the national
security domain. InProceedings of the 2nd International Workshop on BIG Data
Software Engineering (pp. 51-57). ACM.
Li, Y., Dai, W., Ming, Z., & Qiu, M. (2016). Privacy protection for preventing data over-
collection in smart city. IEEE Transactions on Computers.65(5).1339-1350.
Lin, C. & et.al., (2016). Differential privacy preserving in big data analytics for connected health.
Journal of medical systems.40(4). 97.
Öğütçü, G., Testik, Ö. M., & Chouseinoglou, O. (2016). Analysis of personal information
security behavior and awareness. Computers & Security.56. 83-93.
Pasupuleti, S. K., Ramalingam, S., & Buyya, R. (2016). An efficient and secure privacy-
preserving approach for outsourced data of resource constrained mobile devices in
cloud computing. Journal of Network and Computer Applications.64. 12-22.
Perruche, S., Clauzon, A., Bonnefoy, F., Toussirot, E., & Saas, P. (2014). AB0120 Apoptotic
Cell-Based Therapy to Treat Collagen-Induced Experimental Arthritis. Rationale for the
Use of Apoptotic Cells in the Treatment of Rheumatoid Arthritis. Annals of the
Rheumatic Diseases, 73(Suppl 2), 843-844.
Rahimian, F., Bajaj, A., & Bradley, W. (2016). Estimation of deficiency risk and prioritization of
information security controls: A data-centric approach. International Journal of
Accounting Information Systems.20. 38-64.
Russo, D., & Zou, J. (2016, May). Controlling bias in adaptive data analysis using information
theory. In Artificial Intelligence and Statistics (pp. 1232-1240).
Sakib, N. & et.al., (2016). A Proposal on Cloud Based Data Centre Using Shared Memory of
Mobile Storage by Virtualization. International Journal of Applied Information
System.11(12). 1-6.
Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey
on the dimensions of collective cyber defense through security information sharing.
Computers & Security.60. 154-176.
16
security domain. InProceedings of the 2nd International Workshop on BIG Data
Software Engineering (pp. 51-57). ACM.
Li, Y., Dai, W., Ming, Z., & Qiu, M. (2016). Privacy protection for preventing data over-
collection in smart city. IEEE Transactions on Computers.65(5).1339-1350.
Lin, C. & et.al., (2016). Differential privacy preserving in big data analytics for connected health.
Journal of medical systems.40(4). 97.
Öğütçü, G., Testik, Ö. M., & Chouseinoglou, O. (2016). Analysis of personal information
security behavior and awareness. Computers & Security.56. 83-93.
Pasupuleti, S. K., Ramalingam, S., & Buyya, R. (2016). An efficient and secure privacy-
preserving approach for outsourced data of resource constrained mobile devices in
cloud computing. Journal of Network and Computer Applications.64. 12-22.
Perruche, S., Clauzon, A., Bonnefoy, F., Toussirot, E., & Saas, P. (2014). AB0120 Apoptotic
Cell-Based Therapy to Treat Collagen-Induced Experimental Arthritis. Rationale for the
Use of Apoptotic Cells in the Treatment of Rheumatoid Arthritis. Annals of the
Rheumatic Diseases, 73(Suppl 2), 843-844.
Rahimian, F., Bajaj, A., & Bradley, W. (2016). Estimation of deficiency risk and prioritization of
information security controls: A data-centric approach. International Journal of
Accounting Information Systems.20. 38-64.
Russo, D., & Zou, J. (2016, May). Controlling bias in adaptive data analysis using information
theory. In Artificial Intelligence and Statistics (pp. 1232-1240).
Sakib, N. & et.al., (2016). A Proposal on Cloud Based Data Centre Using Shared Memory of
Mobile Storage by Virtualization. International Journal of Applied Information
System.11(12). 1-6.
Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey
on the dimensions of collective cyber defense through security information sharing.
Computers & Security.60. 154-176.
16
![Document Page](https://desklib.com/media/document/docfile/pages/risk-assessment-of-data-and-information-592y/2024/09/06/da876f1f-8498-4c4f-8a01-4f1a650b434a-page-19.webp)
Soni, K., & Panchal, G. (2017, March). Data security in recommendation system using
homomorphic encryption. In International Conference on Information and
Communication Technology for Intelligent Systems (pp. 308-313). Springer, Cham.
Wallentin, L. & et.al, (2014). Growth differentiation factor 15, a marker of oxidative stress and
inflammation, for risk assessment in patients with atrial fibrillation: insights from the
ARISTOTLE trial. Circulation, CIRCULATIONAHA-114.
Yüksel, B., Küpçü, A., & Özkasap, Ö. (2017). Research issues for privacy and security of
electronic health services. Future Generation Computer Systems. 68. 1-13.
Zhou, P. & et.al., (2016). Differentially private online learning for cloud-based video
recommendation with multimedia big data in social networks. IEEE transactions on
multimedia.18(6) 1217-1229.
17
homomorphic encryption. In International Conference on Information and
Communication Technology for Intelligent Systems (pp. 308-313). Springer, Cham.
Wallentin, L. & et.al, (2014). Growth differentiation factor 15, a marker of oxidative stress and
inflammation, for risk assessment in patients with atrial fibrillation: insights from the
ARISTOTLE trial. Circulation, CIRCULATIONAHA-114.
Yüksel, B., Küpçü, A., & Özkasap, Ö. (2017). Research issues for privacy and security of
electronic health services. Future Generation Computer Systems. 68. 1-13.
Zhou, P. & et.al., (2016). Differentially private online learning for cloud-based video
recommendation with multimedia big data in social networks. IEEE transactions on
multimedia.18(6) 1217-1229.
17
1 out of 19
Related Documents
![logo.png](/_next/image/?url=%2F_next%2Fstatic%2Fmedia%2Flogo.6d15ce61.png&w=640&q=75)
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.