Victoria Protective Data Security Framework

Added on - 23 Feb 2020

  • 12

    Pages

  • 3162

    Words

  • 45

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 12 pages
Assessment 2Student’s Name:VICTORIANPROTECTIVEDATASECURITYFRAMEWORK(VPDSF)
Table of ContentQuestion 1...................................................................................................................................................2Solution 1....................................................................................................................................................2Question 2...................................................................................................................................................3Solution 2....................................................................................................................................................3Question 3...................................................................................................................................................4Solution 3....................................................................................................................................................4Question 4...................................................................................................................................................5Solution 4....................................................................................................................................................6Question 5...................................................................................................................................................7Solution 5....................................................................................................................................................7Question6....................................................................................................................................................9Solution 6....................................................................................................................................................9References.................................................................................................................................................10Bibliography...............................................................................................................................................10List of FiguresFigure 1: Risk & Issues considered by Victoria Government......................................................................2Question 1.
Use a diagram (produced by the means of using Rationale, Visio or any other relevant softwareapplication of your choice) to illustrate current security risks and concerns considered by the VICgovernment.Solution 1.VPDSF (Victoria Protective Data Security Framework) is the rules created for the use byVictoria open segment associations to comprehend on data security commitments, create abilitiesfor overseeing dangers and comprehend the current administration standards and rules. VPDSFis created with the objective of helping Victorian open part associations to distinguish data andRiskProtection of DataSecurity against theft of InformationBreach privacyNetwork SecurityIssuesUnauthorized AccessNo controlIncorrect configurationsRisk of losing Market and BusinessRisk ManagementPrinciple related toInformation SystemInformation ValuesConfidentialityIntegrityAvailabilityFigure1: Risk & Issues considered by Victoria Governmentconfirm proprietorship, assess the estimation of data, information security and assurance,actualize security measure and to build up a positive security culture. The VPDSF furnishesassociations with information security prerequisites to go along at any rate level crosswise overfour noteworthy defensive security spaces. These security needs consolidated with affirmation
activities which are produced to assist open part associations with overcoming data securitydangers. The four defensive security spaces are Information Security, Personnel, Information,and Communication Technology (ICT) security and Physical Security. The affirmation modelwill give the procedures to evaluation of data security as far as satisfying privacy, uprightness,and accessibility[ CITATION Com15 \l 1033 ]. The dangers and concerns considered by VictoriaGovernment areshown above (refer Figure 1).Question 2.Provide detailed explanation of the diagram and identify the areas of: high, medium, medium-low, and low risk exposure.Solution 2.Figure 1 gives the way to deal with VPDSF in building up their standards and methods for datasecurity. It must be noticed that the dangers and concerns are recorded which must be consideredfor their level of effect. The confirmation display gives the classification, honesty, andaccessibility which frame the reason for guaranteeing data esteem and their security standardsmust be created in like manner[ CITATION Aus17 \l 1033 ]. Therisk rating is done to comprehendthe level of effect. The rating gave is Low, Moderate, High and Critical in light of theseriousness of the effect. The risk rating network for the risk related to VPDSF is given in theframework underneath:Data Security is always at the high risk which can result to loss of information. Network Securityis having medium risk of exposure and can have consequences of service disruption. Breach ofprivacy is also having medium range of risk exposure and can cause the loss the data from theserver. Critical services have medium-low risk exposure with consequence of loss of data orother assets. Unauthorized access can have medium-low or medium level of risk exposure andcan cause loss of data. Insider Threat is exposed to low and medium-low risk and it can causedata loss. Deliberate threats have potentially high and medium level of risk exposure and it cancause loss of data and systems. Accidental threats are the area having medium and medium-lowrisk with consequence of loss in data and system. Inadequate access control can have medium
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document