EDUC 448 - Victorian Protective Data Security Framework

Added on - Mar 2020

EDUC 448 - Victorian Protective Data Security Framework (VPDSF) is the scheme that has been launched by the Victorian Government to manage the data security risks and attacks that are associated with victoria's public sector and industries.

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 4 of 11 pages
VIC GovernmentSecurity Risks and Concerns
VIC GovernmentTable of ContentsIntroduction.................................................................................................................................................3Explanation of the Diagram.........................................................................................................................3High-Risk Exposure................................................................................................................................3Medium Risk Exposure...........................................................................................................................3Medium-Low Risk Exposure...................................................................................................................3Low Risk Exposure.................................................................................................................................4Deliberate and Accidental Threats...............................................................................................................4Challenges for Execution of the Security/Risk Management Execution......................................................5Difference between Risks and Uncertainty..................................................................................................6Approaches for Risk Control and Mitigation...............................................................................................7Administrative Approach........................................................................................................................7Technical Approach.................................................................................................................................8Physical Security Approach.....................................................................................................................8Recommendations & Conclusion................................................................................................................8References.................................................................................................................................................102
VIC GovernmentIntroductionVictorian Protective Data Security Framework (VPDSF) is the scheme that has been launched bythe Victorian Government to manage the data security risks and attacks that are associated withVictoria’s public sector and industries. There are three sections and classifications that areincluded in VPDSF viz. security standards, assurance model and the supporting security guidesand resources. The framework provides the mechanism to deal to with the probable and possiblesecurity risks and attacks. It is necessary for the Victorian Government to have a clear account ofthe data security risks that may occur to develop the mechanisms and measures to control andprevent them.High-Risk ExposureThere are a number of security risks and attacks that may take place in the data that is associatedwith the Victoria’s public sector. Some of the high-exposure risks include the insider threatsalong with the availability risks. There is a lot of privilege and access that is provided to the staffmembers, data owners and the public sector associates. These entities may take undue advantageof the privileges that have been provided to them to cause severe damage. In case of the VICGovernment, there are multiple agencies, organizations, units and members that are involved.There is also a huge presence of systems and applications that are used. This can result in the useof a vulnerable access point to flood the network with unnecessary traffic to cause availabilityattacks (Cpdp, 2016).Medium Risk ExposureThere may also be integrity attacks and data breaches/leakage that may take place in the VICGovernment public sector setup. This is because of the reason that there is a huge amount ofpublic and personal data that is exchanged which may be breached by the malevolent entities byaltering the contents that are present.Medium-Low Risk ExposureThere are a number of legal and regulatory obligations that may come up as a result of theviolation of the data security associated with an agency, organization, user or a member. Theseobligations will result in certain cases and there probability is somewhat low. These risks are,therefore place in the category of medium-low risk exposure.3
VIC GovernmentLow Risk ExposureThere may be data security risks that may emerge due to the operational errors or technicalfailures. However, the users and members will be provided with the trainings to use the securityapplications and automated systems. Therefore, the probability of the occurrence of these eventsis low. Also, the technical failures may seldom lead to a situation of a breakdown as there arealternatives that are present to resolve the technical fault or failure (Moreau, 2001).Deliberate and Accidental ThreatsThere are various data and information security risks and attacks that have been developed andcan occur in association with VIC Government and its operations. A comparative analysis ofthese threats along with the examples has been illustrated below.Deliberate ThreatsAccidental ThreatsThese are the security threats and attacks thatinvolve a malicious interest and motive tocause damage to the party or the system that isThese are the threats that are unintentional innature and are caused by mistake of theoperator or the users.4

In brief, these Big Data tools will analyze the specific patterns and trends followed by the attackers to give rise to the security risks and threats and will therefore lead to the development of the methods and policies to put a check on the same.

Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access