Information Security Risks: Academics For Academics Case Study
VerifiedAdded on  2020/04/07
|17
|4474
|196
Case Study
AI Summary
This case study examines Academics For Academics (A4A), a non-governmental organization with offices in Sydney and Singapore, focusing on its information security vulnerabilities. A4A supports universities in Southeast Asia and Australia, storing confidential data in an information system. The report identifies various security risks, including malicious code, denial-of-service attacks, information leakage, phishing, and identity theft, and discusses potential mitigation strategies. It covers the organization's structure, operational model, and the importance of protecting sensitive data. The study emphasizes the need for robust security measures to safeguard against data breaches and ensure the integrity of the organization's information assets. The report also highlights the potential impact of various threats on A4A's operations and provides insights into managing and minimizing these risks.

Running head: ACADEMICS FOR ACADEMICS CASE STUDY
Academics For Academics Case Study
Name of the Student
Name of the University
Author’s Note:
Academics For Academics Case Study
Name of the Student
Name of the University
Author’s Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
ACADEMICS FOR ACADEMICS CASE STUDY
Executive Summary
The main objective of this report is to understand the basic concept of the case study of
Academics For Academics or A4A. It is a non-governmental organization or commonly known
as NGO. This non-governmental organization has its head office in Sydney and its branch office
in Singapore. The projects and the activities of this organization are sponsored by the donations
that come from public. A4A has a team of total ten members. Out of these six members are
present in Sydney office, whereas, the rest four members are present in the Singapore office. The
main job of this organization is to help the private and the public colleges and universities in
Southeast Asia and Australia. The information is stored in an information system. The aim of
this report is to identify the security risks that are probable for the information system and to
manage those risks and threats.
ACADEMICS FOR ACADEMICS CASE STUDY
Executive Summary
The main objective of this report is to understand the basic concept of the case study of
Academics For Academics or A4A. It is a non-governmental organization or commonly known
as NGO. This non-governmental organization has its head office in Sydney and its branch office
in Singapore. The projects and the activities of this organization are sponsored by the donations
that come from public. A4A has a team of total ten members. Out of these six members are
present in Sydney office, whereas, the rest four members are present in the Singapore office. The
main job of this organization is to help the private and the public colleges and universities in
Southeast Asia and Australia. The information is stored in an information system. The aim of
this report is to identify the security risks that are probable for the information system and to
manage those risks and threats.

2
ACADEMICS FOR ACADEMICS CASE STUDY
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................4
Academics For Academics..........................................................................................................4
Information Security Risks..........................................................................................................5
Management of Security Risks....................................................................................................9
Assumptions..................................................................................................................................11
Conclusion.....................................................................................................................................12
References......................................................................................................................................14
ACADEMICS FOR ACADEMICS CASE STUDY
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................4
Academics For Academics..........................................................................................................4
Information Security Risks..........................................................................................................5
Management of Security Risks....................................................................................................9
Assumptions..................................................................................................................................11
Conclusion.....................................................................................................................................12
References......................................................................................................................................14
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
ACADEMICS FOR ACADEMICS CASE STUDY
Introduction
A recognized and popular Non-Governmental Organization or NGO namely Academics
For Academics or A4A has the head office in Sydney and its branch office in Singapore. The
funds of all the activities projects of this particular organization mainly come from public
donations (Fleischmann et al. 2014). They do not sponsor any money from themselves. This non-
governmental organization has a team of total ten staff members. The Sydney office has six staff
members amongst the ten and the rest four members are present in the office of Singapore. In
spite of working in two different locations, which are Sydney and Singapore, all the ten staff
members’ together work as a team to obtain the organizational goals and objectives. This
Academics For Academic was established for helping all the small private and public colleges
and universities in Southeast Asia and Australia (Awadh and Alyahya 2013). These universities,
who want to receive the services of A4A have to register themselves and become members of
A4A. This organization has to store their confidential information in the information system.
However, this information system can have many security risks and data breaches.
The following report outlines a brief description on the case study of Academics For
Academics or A4A. This non-governmental organization has all the confidential data and
information stored and kept in their information security system. This information security
system helps them to manipulate, retrieve and store information easily and quickly (Vaccaro et
al. 2012). The report provides a discussion on the probable security risks and the ways to
mitigate or manage these risks. These risks can be extremely harmful for any organization and
their information security system. However, these risks can be controlled by certain measures.
ACADEMICS FOR ACADEMICS CASE STUDY
Introduction
A recognized and popular Non-Governmental Organization or NGO namely Academics
For Academics or A4A has the head office in Sydney and its branch office in Singapore. The
funds of all the activities projects of this particular organization mainly come from public
donations (Fleischmann et al. 2014). They do not sponsor any money from themselves. This non-
governmental organization has a team of total ten staff members. The Sydney office has six staff
members amongst the ten and the rest four members are present in the office of Singapore. In
spite of working in two different locations, which are Sydney and Singapore, all the ten staff
members’ together work as a team to obtain the organizational goals and objectives. This
Academics For Academic was established for helping all the small private and public colleges
and universities in Southeast Asia and Australia (Awadh and Alyahya 2013). These universities,
who want to receive the services of A4A have to register themselves and become members of
A4A. This organization has to store their confidential information in the information system.
However, this information system can have many security risks and data breaches.
The following report outlines a brief description on the case study of Academics For
Academics or A4A. This non-governmental organization has all the confidential data and
information stored and kept in their information security system. This information security
system helps them to manipulate, retrieve and store information easily and quickly (Vaccaro et
al. 2012). The report provides a discussion on the probable security risks and the ways to
mitigate or manage these risks. These risks can be extremely harmful for any organization and
their information security system. However, these risks can be controlled by certain measures.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
ACADEMICS FOR ACADEMICS CASE STUDY
The report also gives suitable assumptions on the management of data breaches. The description
of the above discussion is given in the following paragraphs.
Discussion
Academics For Academics
Academics For Academics or A4A is a popular and recognized non-governmental
organization or commonly known as NGO. This was established in the previous year. This non-
governmental organization has its head office in Sydney and its branch office in Singapore. The
projects and the activities of this organization are sponsored by the donations that come from
public. A4A has a team of total ten members (Andres et al. 2012). Out of these six members are
present in Sydney office, whereas, the rest four members are present in the Singapore office.
This organization was established for helping all the smaller public and private colleges and
universities that are present in Southeast Asia and Australia. The private colleges and
universities, who are interested in getting the services of A4A, have to register themselves and
thus become the member colleges and universities of A4A (Awadh and Alyahya 2013).
Moreover, the experienced professionals, who are interested in giving voluntary services for any
member college or university, they can also register themselves with Academics For Academics.
The voluntary services include supervision of any research project or development of curriculum
or simply teaching any subject to the students. The organization will hire these people and they
become the members of A4A (Kotlar and De Massis 2013). The organization will then give short
term and interim assignments for a given period of time. The members get several advantages or
benefits from the organization like meals, accommodation, travel and medical expenses. Since,
this is a globally recognized organization; all the members should get these benefits from it. The
ACADEMICS FOR ACADEMICS CASE STUDY
The report also gives suitable assumptions on the management of data breaches. The description
of the above discussion is given in the following paragraphs.
Discussion
Academics For Academics
Academics For Academics or A4A is a popular and recognized non-governmental
organization or commonly known as NGO. This was established in the previous year. This non-
governmental organization has its head office in Sydney and its branch office in Singapore. The
projects and the activities of this organization are sponsored by the donations that come from
public. A4A has a team of total ten members (Andres et al. 2012). Out of these six members are
present in Sydney office, whereas, the rest four members are present in the Singapore office.
This organization was established for helping all the smaller public and private colleges and
universities that are present in Southeast Asia and Australia. The private colleges and
universities, who are interested in getting the services of A4A, have to register themselves and
thus become the member colleges and universities of A4A (Awadh and Alyahya 2013).
Moreover, the experienced professionals, who are interested in giving voluntary services for any
member college or university, they can also register themselves with Academics For Academics.
The voluntary services include supervision of any research project or development of curriculum
or simply teaching any subject to the students. The organization will hire these people and they
become the members of A4A (Kotlar and De Massis 2013). The organization will then give short
term and interim assignments for a given period of time. The members get several advantages or
benefits from the organization like meals, accommodation, travel and medical expenses. Since,
this is a globally recognized organization; all the members should get these benefits from it. The

5
ACADEMICS FOR ACADEMICS CASE STUDY
moment the members are recruited, they will do their jobs at the particular institution. However,
there is one major condition for this job (Fleischmann et al. 2014). All the confidential
information, excluding the examinations, marked assignments and the personal emails will the
property of the member institutions and Academics For Academics. All the confidential
information will be stored and managed by the organization’s security information system
irrespective of the location the member is working (Sessa and London 2015). It is verified and
guaranteed that all the information is secured in their system.
Information Security Risks
The information security system of Academics For Academics or A4A stores all the
confidential data and information regarding their projects and activities (Ackermann et al.,
2012). The information security is the practice of detecting and protecting all the unauthorized
access, modification, alteration, utilization, inspection, disclosure, recording and destruction of
all the information. This information should be secured so that any information security risks or
data breaches do not attack the system (He 2012). The Academics For Academics can have
several information security risks. The probable security risks of information system are as
follows:
i) Malicious Code or Software: This is one of the most dangerous and common security
threat or risk for an information system (Creese et al. 2012). This type of threat is nothing but a
code or software that is injected in a system by an intruder or hacker for infecting the system.
The code or software is malicious in nature and it can easily replicate itself once present in the
system. This code or software is commonly known as virus. The main problem of this software
or code is that it completely formats the entire system and all the confidential data and
ACADEMICS FOR ACADEMICS CASE STUDY
moment the members are recruited, they will do their jobs at the particular institution. However,
there is one major condition for this job (Fleischmann et al. 2014). All the confidential
information, excluding the examinations, marked assignments and the personal emails will the
property of the member institutions and Academics For Academics. All the confidential
information will be stored and managed by the organization’s security information system
irrespective of the location the member is working (Sessa and London 2015). It is verified and
guaranteed that all the information is secured in their system.
Information Security Risks
The information security system of Academics For Academics or A4A stores all the
confidential data and information regarding their projects and activities (Ackermann et al.,
2012). The information security is the practice of detecting and protecting all the unauthorized
access, modification, alteration, utilization, inspection, disclosure, recording and destruction of
all the information. This information should be secured so that any information security risks or
data breaches do not attack the system (He 2012). The Academics For Academics can have
several information security risks. The probable security risks of information system are as
follows:
i) Malicious Code or Software: This is one of the most dangerous and common security
threat or risk for an information system (Creese et al. 2012). This type of threat is nothing but a
code or software that is injected in a system by an intruder or hacker for infecting the system.
The code or software is malicious in nature and it can easily replicate itself once present in the
system. This code or software is commonly known as virus. The main problem of this software
or code is that it completely formats the entire system and all the confidential data and
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
ACADEMICS FOR ACADEMICS CASE STUDY
information is absolutely lost (Zissis and Lekkas 2012). This sometimes turns out to be risky as
if the data and information is lost, the organization can be in serious trouble.
ii) Denial of Service Attacks: The DoS or Denial of Service attack is the second most
important and significant risk or threat for any information system (Creese et al. 2012). This
particular type of security threat occurs when the hacker or the intruder intrudes or hacks into a
system and denies the entire service. The main problem of this type of attack is that the owner of
the system has absolutely no idea about the intrusion and the hacker does his job with ease. The
hacker obtains the full access of the affected system and the moment the user tries to enter into
the system, the service is denied (Chou 2013). The other disadvantage of this type of attack is
that the entire server or system is slowed down. These attacks are also done over a multiple
number of computers, known as the distributed denial of service or DDoS attacks.
iii) Information Leakage: The information is the most important and confidential part of
any organization. It should not be lost or intercepted at any cost. However, there is always a risk
or threat of leakage of information in an information system. This can occur in two ways (Rakes,
Deane and Rees 2012). The first way is that there is a technical problem in the system and the
information is leaked and the other way is through any employee. The technical problem of any
system can be mitigated by taking certain measures. The employee can leak the information
either unintentionally or intentionally that is for having wrong intentions.
iv) Receiving Unsolicited Emails: This is another significant and dangerous threat or
risk, where the victim gets or receives a hoax or fake email from fake email ids that claims to
belong to an authorized institution (Peltier 2013). The moment this hoax email is opened, the
information system is hacked and corrupted and nothing can be done about it.
ACADEMICS FOR ACADEMICS CASE STUDY
information is absolutely lost (Zissis and Lekkas 2012). This sometimes turns out to be risky as
if the data and information is lost, the organization can be in serious trouble.
ii) Denial of Service Attacks: The DoS or Denial of Service attack is the second most
important and significant risk or threat for any information system (Creese et al. 2012). This
particular type of security threat occurs when the hacker or the intruder intrudes or hacks into a
system and denies the entire service. The main problem of this type of attack is that the owner of
the system has absolutely no idea about the intrusion and the hacker does his job with ease. The
hacker obtains the full access of the affected system and the moment the user tries to enter into
the system, the service is denied (Chou 2013). The other disadvantage of this type of attack is
that the entire server or system is slowed down. These attacks are also done over a multiple
number of computers, known as the distributed denial of service or DDoS attacks.
iii) Information Leakage: The information is the most important and confidential part of
any organization. It should not be lost or intercepted at any cost. However, there is always a risk
or threat of leakage of information in an information system. This can occur in two ways (Rakes,
Deane and Rees 2012). The first way is that there is a technical problem in the system and the
information is leaked and the other way is through any employee. The technical problem of any
system can be mitigated by taking certain measures. The employee can leak the information
either unintentionally or intentionally that is for having wrong intentions.
iv) Receiving Unsolicited Emails: This is another significant and dangerous threat or
risk, where the victim gets or receives a hoax or fake email from fake email ids that claims to
belong to an authorized institution (Peltier 2013). The moment this hoax email is opened, the
information system is hacked and corrupted and nothing can be done about it.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
ACADEMICS FOR ACADEMICS CASE STUDY
v) Identity Theft: In this type of security risk, the identity of the user is stolen. The
hacker or the intruder gets into a system to get all the confidential data (Berghel 2012). The most
surprising feature of this threat is that the hacker acts as the user and the person sitting opposite
to the system, has no idea about this.
vi) Unauthorized Installation of Software: Software in a system plays the most
important role for the functions of the system. Any type of unauthorized software plays the
opposite role. (Sawik 2013) The victim invites the hackers as soon as he installs or updates
unauthorized software. This type of software is extremely harmful for the information system.
v) Unintentional Damage: Not all security risks are caused with wrong intentions or
intentionally. Some are even caused unintentionally. Often the employees or the staff members
of an organization do any type of damage to the information system of the organization either for
lack of training or for carelessness (Oriyano 2016). This type of damage can be caused either by
losing any confidential information or by damaging any of the information technology assets.
vi) Destruction of Records: This is another important and significant security risk for any
information system. The records cannot be destructed or destroyed at any cost for any
information system (Biham and Shamir 2012). This type of risk is caused by intentional or
unintentional motive of an employee.
vii) Modification in Data: Information or data modification or alteration is another major
and significant threat for any organization. The modified information often does not reveal the
originality of the message and the receiver is unable to get the right message (Kamara,
Papamanthou and Roeder 2012). The information system has a high chance of modification or
alteration of information.
ACADEMICS FOR ACADEMICS CASE STUDY
v) Identity Theft: In this type of security risk, the identity of the user is stolen. The
hacker or the intruder gets into a system to get all the confidential data (Berghel 2012). The most
surprising feature of this threat is that the hacker acts as the user and the person sitting opposite
to the system, has no idea about this.
vi) Unauthorized Installation of Software: Software in a system plays the most
important role for the functions of the system. Any type of unauthorized software plays the
opposite role. (Sawik 2013) The victim invites the hackers as soon as he installs or updates
unauthorized software. This type of software is extremely harmful for the information system.
v) Unintentional Damage: Not all security risks are caused with wrong intentions or
intentionally. Some are even caused unintentionally. Often the employees or the staff members
of an organization do any type of damage to the information system of the organization either for
lack of training or for carelessness (Oriyano 2016). This type of damage can be caused either by
losing any confidential information or by damaging any of the information technology assets.
vi) Destruction of Records: This is another important and significant security risk for any
information system. The records cannot be destructed or destroyed at any cost for any
information system (Biham and Shamir 2012). This type of risk is caused by intentional or
unintentional motive of an employee.
vii) Modification in Data: Information or data modification or alteration is another major
and significant threat for any organization. The modified information often does not reveal the
originality of the message and the receiver is unable to get the right message (Kamara,
Papamanthou and Roeder 2012). The information system has a high chance of modification or
alteration of information.

8
ACADEMICS FOR ACADEMICS CASE STUDY
viii) Eavesdropping: This is again a dangerous security threat. Eavesdropping in general
terms means hearing or sneaking into a system. The hacker or the intruder sneaks into the system
of the victim and gets all the necessary and confidential information (Dong, Liao and Li 2012).
However, in most of the cases, the hacker only checks the information and does not modify or
alter the information.
ix) Interception of Information: In this type of security threat, the hacker intercepts or
changes the entire content of the information present in the system and the receiver gets the
intercepted or modified version of information (Romanosky, Hoffman and Acquisti 2014). This
often turns out to be extremely dangerous as the information loses its confidentiality and
integrity.
x) Network Traffic Manipulation: Another most significant security threat for any
information system. The intruder manipulates the network traffic and the network becomes slow.
During this time, the hacker gets the chance to steal all the confidential information.
xi) Man in the Middle: In this of security risk, the hacker stays in between the victim and
the network and collects all the confidential information. He can even change or intercept the
entire information by this risk.
xii) Phishing: This is another significant security threat for any information system. The
hacker or the intruder collects all the information of the system. This is mostly done by receiving
fake and hoax emails. The moment the email is clicked to open, all the details are stolen and
money is theft. Phishing has become extremely common for any type of information system in
modern world.
ACADEMICS FOR ACADEMICS CASE STUDY
viii) Eavesdropping: This is again a dangerous security threat. Eavesdropping in general
terms means hearing or sneaking into a system. The hacker or the intruder sneaks into the system
of the victim and gets all the necessary and confidential information (Dong, Liao and Li 2012).
However, in most of the cases, the hacker only checks the information and does not modify or
alter the information.
ix) Interception of Information: In this type of security threat, the hacker intercepts or
changes the entire content of the information present in the system and the receiver gets the
intercepted or modified version of information (Romanosky, Hoffman and Acquisti 2014). This
often turns out to be extremely dangerous as the information loses its confidentiality and
integrity.
x) Network Traffic Manipulation: Another most significant security threat for any
information system. The intruder manipulates the network traffic and the network becomes slow.
During this time, the hacker gets the chance to steal all the confidential information.
xi) Man in the Middle: In this of security risk, the hacker stays in between the victim and
the network and collects all the confidential information. He can even change or intercept the
entire information by this risk.
xii) Phishing: This is another significant security threat for any information system. The
hacker or the intruder collects all the information of the system. This is mostly done by receiving
fake and hoax emails. The moment the email is clicked to open, all the details are stolen and
money is theft. Phishing has become extremely common for any type of information system in
modern world.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
ACADEMICS FOR ACADEMICS CASE STUDY
The above-mentioned security risks and data breaches are common and applicable for the
information system of Academics For Academics or A4A. These security threats can lead the
non-governmental organization to a very serious position. These are needed to be mitigated and
reduced on immediate basis. The description of how to reduce the security risks is given in the
following paragraphs.
Management of Security Risks
The information system of Academics For Academics has the tendency and chance of
having several risks, which can be extremely harmful for the organizational information (Ghosh,
Gajar and Rai 2013). However, there are ways and guidelines or mitigating or reducing these
risks or threats. The mitigation or reduction plans of the security risks are as follows:
i) Antivirus: The most basic and simple way of mitigating the malicious code and
software is the installation of antivirus in any system. This type of software helps to detect and
prevent the virus attacks and malicious codes or software from entering into the system.
ii) Firewalls: The second most significant way of preventing any security risk is the
installation of firewalls. As the name suggests this type of security acts as a wall for any system
and thus detects and prevents any type of information security risk. Firewalls can be
implemented in any information system for the security purpose with utmost ease. The user will
only have to install the firewall software in his system.
iii) Encryption: The third most simple and basic way of protecting confidential
information is by the procedure of encryption. It is the process of encrypting or encoding
confidential information or message into an encrypted version known as the cipher text. This is
done in such a way that only the authorized sender and receiver are able to access the
ACADEMICS FOR ACADEMICS CASE STUDY
The above-mentioned security risks and data breaches are common and applicable for the
information system of Academics For Academics or A4A. These security threats can lead the
non-governmental organization to a very serious position. These are needed to be mitigated and
reduced on immediate basis. The description of how to reduce the security risks is given in the
following paragraphs.
Management of Security Risks
The information system of Academics For Academics has the tendency and chance of
having several risks, which can be extremely harmful for the organizational information (Ghosh,
Gajar and Rai 2013). However, there are ways and guidelines or mitigating or reducing these
risks or threats. The mitigation or reduction plans of the security risks are as follows:
i) Antivirus: The most basic and simple way of mitigating the malicious code and
software is the installation of antivirus in any system. This type of software helps to detect and
prevent the virus attacks and malicious codes or software from entering into the system.
ii) Firewalls: The second most significant way of preventing any security risk is the
installation of firewalls. As the name suggests this type of security acts as a wall for any system
and thus detects and prevents any type of information security risk. Firewalls can be
implemented in any information system for the security purpose with utmost ease. The user will
only have to install the firewall software in his system.
iii) Encryption: The third most simple and basic way of protecting confidential
information is by the procedure of encryption. It is the process of encrypting or encoding
confidential information or message into an encrypted version known as the cipher text. This is
done in such a way that only the authorized sender and receiver are able to access the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
ACADEMICS FOR ACADEMICS CASE STUDY
information. This process is highly recommended for any organization for the reduction for their
interception in messages. The encryption algorithm has two basic algorithms within it. They are
the symmetric key algorithm and the asymmetric key algorithm. The symmetric key algorithm
has only one key for encoding and decoding a message. It means the sender and the receiver of
the message uses the same key for encryption and decryption of messages. The main advantage
of this particular type of algorithm is that it is extremely simple to implement and use. The
second algorithm is the asymmetric key algorithm. This is somewhat different from the
symmetric key algorithm. Here, the keys for encoding and decoding of messages are different
and this particular feature makes this algorithm little complicated than symmetric.
iv) Digital Authentication: This is another very popular and secured way of securing any
type of information (Ghosh, Gajar and Rai 2013). Digital authentication is the process of
sanctioning or authenticating an individual or person digitally. The main examples of digital
authentication are the fingerprint recognition, face recognition, digital signatures and voice
recognition. The implementation of this security policy is done by implementing biometric entry
to any organization or information system (Hashizume et al. 2013). Only the authorized and
authenticated employees or individuals are allowed to enter or access the system.
v) Passwords: This is the most basic way of securing any information in an information
system. The identity thefts are reduced or mitigated by this procedure (Berghel 2012). Presence
of passwords protects the entire system and no hackers or intruders are able to enter into the
system easily. Moreover, passwords secure the system in such a way that the physical access to
the system is controlled (Layton and Watters 2014). Biometric passwords are the best solutions
for any security related problems as it only allows the authorized and authenticated employees or
individuals to access the information.
ACADEMICS FOR ACADEMICS CASE STUDY
information. This process is highly recommended for any organization for the reduction for their
interception in messages. The encryption algorithm has two basic algorithms within it. They are
the symmetric key algorithm and the asymmetric key algorithm. The symmetric key algorithm
has only one key for encoding and decoding a message. It means the sender and the receiver of
the message uses the same key for encryption and decryption of messages. The main advantage
of this particular type of algorithm is that it is extremely simple to implement and use. The
second algorithm is the asymmetric key algorithm. This is somewhat different from the
symmetric key algorithm. Here, the keys for encoding and decoding of messages are different
and this particular feature makes this algorithm little complicated than symmetric.
iv) Digital Authentication: This is another very popular and secured way of securing any
type of information (Ghosh, Gajar and Rai 2013). Digital authentication is the process of
sanctioning or authenticating an individual or person digitally. The main examples of digital
authentication are the fingerprint recognition, face recognition, digital signatures and voice
recognition. The implementation of this security policy is done by implementing biometric entry
to any organization or information system (Hashizume et al. 2013). Only the authorized and
authenticated employees or individuals are allowed to enter or access the system.
v) Passwords: This is the most basic way of securing any information in an information
system. The identity thefts are reduced or mitigated by this procedure (Berghel 2012). Presence
of passwords protects the entire system and no hackers or intruders are able to enter into the
system easily. Moreover, passwords secure the system in such a way that the physical access to
the system is controlled (Layton and Watters 2014). Biometric passwords are the best solutions
for any security related problems as it only allows the authorized and authenticated employees or
individuals to access the information.

11
ACADEMICS FOR ACADEMICS CASE STUDY
The above-mentioned five ways can help Academics For Academics or A4A for
managing their probable security risks and threats in the information system (Black 2013). The
organization might not be able to stop the risks, however, by following these options, they will
be able to mitigate or reduce the security risks or threats to some extent.
Assumptions
Assumptions on any case study or scenario is made by the overall discussion and
justifications. The assumptions for the management of security risks and threats in Academics
For Academics or A4A are as follows:
i) Academics For Academics is a non-governmental institution that helps the small
private and public colleges and universities in Southeast Asia and Australia.
ii) The private colleges and universities who want to receive the services of A4A have to
register themselves with A4A.
iii) The professionals who want to provide voluntary services in the field of teaching and
research can register themselves with Academics For Academics, which will be a great option
for all professionals.
iv) Academics For Academics or A4A is hiring various professionals of various fields
and is allowing cultural diversity in the organization.
v) When the professionals will become the members of the organization, they would be
getting benefits like travel and medical expenses, meals and accommodation charges.
ACADEMICS FOR ACADEMICS CASE STUDY
The above-mentioned five ways can help Academics For Academics or A4A for
managing their probable security risks and threats in the information system (Black 2013). The
organization might not be able to stop the risks, however, by following these options, they will
be able to mitigate or reduce the security risks or threats to some extent.
Assumptions
Assumptions on any case study or scenario is made by the overall discussion and
justifications. The assumptions for the management of security risks and threats in Academics
For Academics or A4A are as follows:
i) Academics For Academics is a non-governmental institution that helps the small
private and public colleges and universities in Southeast Asia and Australia.
ii) The private colleges and universities who want to receive the services of A4A have to
register themselves with A4A.
iii) The professionals who want to provide voluntary services in the field of teaching and
research can register themselves with Academics For Academics, which will be a great option
for all professionals.
iv) Academics For Academics or A4A is hiring various professionals of various fields
and is allowing cultural diversity in the organization.
v) When the professionals will become the members of the organization, they would be
getting benefits like travel and medical expenses, meals and accommodation charges.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 17

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.