Cybersecurity in Practice Report: Surveillance, Issues, and Solutions

Verified

Added on  2022/08/20

|11
|3522
|16
Report
AI Summary
This report delves into the multifaceted realm of cybersecurity, examining the issues and solutions surrounding surveillance practices in various settings. It addresses the legal and ethical implications of monitoring, including concerns about privacy, data security, and the protection of personal information. The report explores the role of surveillance systems in deterring crime and ensuring safety, while also highlighting potential vulnerabilities and risks, such as data breaches and cyber-attacks. It analyzes relevant laws and regulations, like the Workplace Surveillance Act and Privacy Act, and proposes solutions to mitigate these risks, including the implementation of robust security systems, adherence to ethical guidelines, and the use of cybersecurity frameworks. The report emphasizes the importance of balancing security needs with individual rights and underscores the significance of ongoing vigilance in the face of evolving cyber threats. It also discusses the role of government agencies and private organizations in securing data and protecting citizens' privacy, offering insights into the challenges and opportunities in the field of cybersecurity.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
1/28/2020
Running Head: CYBER SECURITY IN PRACTICE 0
Cyber Security in Practice
Report
Student name
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER SECURITY IN PRACTICE 1
Table of Contents
Introduction................................................................................................................................2
Issues in cybersecurity...............................................................................................................2
Permission to monitor............................................................................................................2
Sound recording.....................................................................................................................3
Prohibited areas......................................................................................................................3
Privacy and security of personal information........................................................................3
Destroy data and information.................................................................................................3
Solutions of those issues............................................................................................................4
Conclusion..................................................................................................................................6
References..................................................................................................................................7
Document Page
CYBER SECURITY IN PRACTICE 2
Introduction
Cybersecurity is necessary to secure all the rights of people, which are under surveillance in
many places, such as public areas, restaurants, transportations, malls, and many more. This
report will discuss about those issues, which are currently experiencing an unprecedented
level of mass surveillance, not only by our own government but private organizations. There
are different types of digital identities, which are sensitive and confidential, such as
biometric, facial, and more (Gates, 2011). In addition, security cameras are allowed for
business. This report will explain the role of surveillance and its impact on the security of the
public. This report will provide different aspects of surveillance and how it is used for
security. It will provide a proper reason behind the surveillance and its impact on citizens.
Issues in cybersecurity
There are many issues occurred in the surveillance processes because of technical and non-
technical reasons. In addition, many organizations have used surveillance systems to avoid
theft and different crimes. Moreover, those systems have collected a large amount of data and
information, which is not secure in many organizations. Besides, CCTV surveillance is an
issue for personal security as per human rights (Kruegle, 2011). It is an issue in front of
citizens that their data has collected in the name of security, which is not secure. It is their
right to protect their identity from various unethical resources. There is a different act in
Australia, which makes secure the privacy of citizens. It is necessary to use a surveillance
camera and other things, which is a good way to identify any crime or mishappening and
many others. Risk analysis is necessary to avoid a critical situation because of privacy and
security (Andrijcic & Horowitz, 2016).
In addition, the workplace surveillance Act 2005 and Surveillance Device Act 2007 are
providing legal permission to monitor their employees as well as record those videos for
solving any issue in their firm (Landau, 2013). Moreover, surveillance has included many
things, such as tracking surveillance, camera surveillance, and computer surveillance. Thus,
cybersecurity is necessary to secure all the information, which has recorded for security as
well (Arlitsch & Edelman, 2014). However, there are some places and conversations, which
cannot record and listen. According to law, there is a strict restriction on the recording of a
private conversation. Besides, some industries allow it because of their necessity. There are
many changes in the basic security and privacy of a person. Moreover, the government
Document Page
CYBER SECURITY IN PRACTICE 3
agencies and private organization must consider the following rules and regulations, which
areas:
Permission to monitor
It is a legal process to monitor and record people based on their consent. According to laws, it
has prohibited to record people for surveillance without their consent. It is necessary to show
all the visible to visitors and staff members. In addition, some private places cannot be
included in surveillance without the personal consent of that particular person. It is necessary
to provide security to the recorded information (Bendovschi, 2015).
Sound recording
According to laws, prohibit the sound recording of a private conversation without the consent
of people, which has included in the recording. It is the reason behind not saving the sound in
any place. In addition, cybersecurity can be implemented for securing many processes
(Bhagat, 2012).
Prohibited areas
There are some private areas in a business that are prohibited from monitoring, such as
change rooms, washrooms, and toilets. There are some specific laws of privacy at the
workplace for employees. It can also include personal offices and cubicles. Besides, cameras
must not intrude on any private place, which is adjacent to the business (Business, 2020).
Privacy and security of personal information
Any recording captured for security surveillance by security cameras must be kept secure
from different types of security threats, such as cybercrime, cyber-attacks, and more. It has
required physical and technical security systems to prevent data and information. Moreover,
online storage should be protected from best practices to protect that data (Landau, 2013).
Destroy data and information
It is a simple process to destroy information from local and cloud storage, which are no
longer required. It can be completed using a manual process. Surveillance is used for security
for a person or a firm (Landau, 2011). Moreover, it is necessary to reduce the storage from
local drive and online storage, which can be used for new recordings. There is some specific
reason behind the surveillance at the workplace, which areas:
increase employee productivity and job performance
discourage criminal activity
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER SECURITY IN PRACTICE 4
ensure the safety of your employees and customers
provide extra security
it is a basic need of a business to secure its assets from different types of issues and
challenges. In addition, there are some changes in the surveillance systems after data
breaches in many firms in which they have lost the personal information of their clients
including audio and videos. Moreover, the surveillance system makes fear in criminals for
criminal activities. In addition, safety is the first concern of surveillance systems in many
places. It has implemented for the security of employees as well as customers. Moreover,
surveillance systems are helpful in stopping cybercrimes from society (Loader & Thomas,
2013).
In addition, the Australian government has provided a code of ethics and code of conduct to
use Information Communication and Technology (ICT) for their personal and professional
works (ACSC, 2017). The government has provided mitigation strategies for every firm,
which has used ICT services on their premises for business purposes (ACSC, 2019).
Solutions of those issues
There are many solutions to those issues and challenges, which has discussed in the above
section of this report. Many laws have created to avoid critical conditions because of less
security and privacy of data and information. Many laws have developed because of legal
issues in various processes. It is a legal process to use a proper surveillance system to secure
business (Frith, 2017).
Section 227A of the criminal code has considered an office to video record people without
their consent at their workplace. It is necessary to prohibit some places from the camera, such
as the bedroom, change room, and bathroom. The Australian Government Civil and
Aviation Authority (CASA) has provided information to use a drone for commercial and
recreational purposes. In addition, cybersecurity is a good solution for all those issues.
Evidence are necessary to identify a person or group (Lyon, 2015).
The Invasion of Privacy Act 1971 (Qld) (Ipoh Act) has applied to prevent private
conversation in an audio record. Many technical issues can be resolved using these rules and
laws. Moreover, the government agencies have followed all the processes to use surveillance
of their areas (Nedim, 2017). The Privacy Act 1988 has provided security to employees and
other people from many issues and challenges. Hackers can hack the data centers and local
Document Page
CYBER SECURITY IN PRACTICE 5
drives of a system to know about the processes and working of a firm. Moreover, many
organizations have used laws for their protection in Australia (OAIC, 2020).
In addition, people can use their personal rights to avoid surveillance in their personal places.
It is a huge issue in front of the government to implanted surveillance systems for the
protection of public places. There are many advantages of surveillance, which makes it legal
as well. It makes performance and productivity better (Mattelart, 2010). Legislation exists for
tracking surveillance information for security purposes. However, there are many loopholes
in the security of government agencies' security systems as well as private firms because of
the high cost of security systems. Besides, physical and technical security requires updated
systems. Thus, private organizations have avoided those procedures. Moreover, cybersecurity
is a good option for many processes (McCahill, 2013).
Cyberbullying and many other offenses have occurred because of less security of those data.
In addition, people can avoid these issues from their personal life. Most of the things can be
changed because of the many critical conditions in the past (Zureik & Salter, 2013). There is
a huge fine for misconduct, such as maximum penalty five years, or fine of $11000 for a
person, or fine up to $55000 for a firm that knowingly installs, uses a camera without
consent. All things are necessary to avoid many critical issues. Most of the national level
organizations have used surveillance of their business processes to improve their
performance. It is the best way to identify various issues and opportunities in operations
(Sarre, 2016).
Moreover, Australian have avoided the facial recognition system at public places because of
many security issues in the system, which can lose their personal information on the Internet.
Public Internet is not a safe place to store personal information. Besides, people cannot avoid
many offenses, which can control using cameras and other devices (Stilgherrian, 2018).
Additionally, citizens can use basic processes, which can be used to prevent personal assets,
which is necessary because physical security is costly and unnecessary. However, some
important assets have required physical security as well. In addition, this data can be spread
in public because of the lack of security systems, such as firewalls and IDS/IPS systems.
Information security is a basic need for business (Von Solms & Van Niekerk, 2013).
In addition, processes can be managed using proper surveillance of operations. In addition,
basic processes can be changed using those recordings. Moreover, computer systems can be
used for securing that information. In addition, basic security systems should be protected
Document Page
CYBER SECURITY IN PRACTICE 6
using a proper security system as well as cybersecurity. there are many issues in a firm
because of data breaches and cyber-attacks. Thus, it is necessary to develop security systems
and security policies in a firm, which has used security systems (Monahan, 2010).
Moreover, people can be used proper guidelines for installing surveillance systems on their
premises. Moreover, basic security is necessary to avoid these issues. Private firms have
avoided such types of security systems because of multiple reasons. In addition, the
international framework can be used for finding vulnerabilities of a firm, which includes
surveillance systems as well, such as ISO 27001, COBIT, PRINCE2, and many more. All
those frameworks have provided risk assessment as well as asset management. There is some
basic need for a company to protect its operations and assets. Therefore, government security
agencies have developed many security rules and regulations (Nedim, 2017).
Moreover, government security agencies should take consent from citizens about the
surveillance of various places, such as parks, malls, roads, and many places. In addition,
technical processes must be secured from various things, which are the reason behind the data
breach. Attackers have used different types of malicious programs to hack a system of a firm.
However, they make a copy of that data and sometimes access denied of that data, which is a
critical situation in front of a firm (Nedim, 2017).
Furthermore, security systems must secure from various types of policies and laws as well as
technical processes. Moreover, many processes can be implemented for security systems.
There are some systems, which are developed for the security of surveillance systems.
Therefore, citizens can believe in those processes as well as provide permission for it (Sarre,
2016). In addition, there are many benefits of surveillance, which makes it legal in business
and personal property protection. Many organizations have used such types of services to
avoid fraud and crimes on their premises. It is easy to find any action in the premises by any
criminal. Moreover, the public place has required CCTV surveillance for avoiding crimes in
open places. It provides help to the identification of criminals. Many times, surveillance
systems are helpful in the investigation (Stilgherrian, 2018).
Moreover, private firms must consider laws and rules for surveillance systems. It has created
for benefits, not for information misuse. However, it is a legal process to monitor and record
activities of employees, as it can be used as evidence for any misconduct in the workplace. In
addition, employees can see all the recordings based on legal procedures anytime. Moreover,
citizens have used proper consent about their privacy. They are feeling safe if proper security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY IN PRACTICE 7
systems have used for all those records. Thus, it is necessary for surveillance systems to
include rules and regulations of local authorities (Landau, 2011).
Cyber protection refers to the frame of technology, procedures, and practices designed to
guard networks, gadgets, programs, and facts from attack, harm, or unauthorized get entry to.
Cybersecurity will also be known as records generation protection. Cyber protection is
important due to the fact authorities, navy, company, financial, and medical agencies gather,
method, and save remarkable quantities of information on computers and other gadgets. A
huge part of that information may be touchy records, whether or not that be intellectual
property, financial information, personal data, or other kinds of statistics for which
unauthorized get admission to or publicity may want to have negative effects (McCahill,
2013).
Moreover, agencies transmit touchy statistics throughout networks and to other devices inside
the course of doing corporations, and cybersecurity describes the field dedicated to shielding
that information and the systems used to the system or save it. because the quantity and
sophistication of cyber assaults grow, agencies and companies, specifically the ones which
are tasked with safeguarding statistics regarding countrywide safety, fitness, or financial
statistics, want to take steps to shield their touchy business and personnel statistics. As early
as March 2013, the state’s pinnacle intelligence officials advised that cyber-attacks and
virtual spying are the top threat to countrywide safety, eclipsing even terrorism (Gates, 2011).
Conclusion
In conclusion, privacy is the right of the citizen at various places not only a person as well as
some other places as well. This report has provided information about any laws, which are
useful in the privacy of many offenses. In addition, surveillance is necessary to manage many
things in the workplace as well as other places. According to government agencies,
surveillance was used to identify many criminal offenses because of many monitoring and
recording of various activities. The privacy act of 1988 has covered many offenses, which has
broken the privacy of citizens. Moreover, basic processes can be changes because of the
many issues and challenges in the security and privacy of information. In addition, global
policies should be implemented for all the surveillance systems including different types.
Private organizations have avoided high-level security of that information because of the high
cost and other things. Finally, the Australian government has provided rules and regulations
Document Page
CYBER SECURITY IN PRACTICE 8
for the surveillance of workplaces and other places. It is compulsory to follow laws in the
surveillance otherwise heavy penalty will apply to a firm or a person.
References
ACSC, 2017. Australian Cyber Security Centre. [Online]
Available at: https://www.acsc.gov.au/publications/ACSC_Threat_Report_2017.pdf
[Accessed 12 December 2018].
ACSC, 2019. Strategies to Mitigate Cyber Security Incidents. [Online]
Available at: https://acsc.gov.au/infosec/mitigationstrategies.htm
[Accessed 3 September 2019].
Andrijcic, E. & Horowitz, B., 2016. A MacroEconomic Framework for Evaluation of Cyber
Security Risks Related to Protection of Intellectual Property. Risk analysis, 26(4), pp. 907-
923.
Arlitsch, K. & Edelman, A., 2014. Staying safe: Cyber security for people and organizations.
Journal of Library Administration, 54(1), pp. 46-56.
Bendovschi, A., 2015. Cyber-attacks–trends, patterns and security countermeasures.
Procedia Economics and Finance, Volume 28, pp. 24-31.
Bhagat, . B. C., 2012. Cloud computing governance, cyber security, risk, and compliance
business rules system and method. U. S., Patent No. 13/016,999.
Business, 2020. Installing video surveillance. [Online]
Available at: https://www.business.gov.au/People/Customers/Installing-video-surveillance
[Accessed 29 January 2020].
Frith, D., 2017. Surveillance: what's legal, what's not. [Online]
Available at: https://www.newcastleherald.com.au/story/4448269/surveillance-whats-legal-
whats-not/
[Accessed 29 Janaury 2020].
Gates, K. A., 2011. Our biometric future: Facial recognition technology and the culture of
surveillance (Vol. 2). 1st ed. s.l.: NYU Press.
Kruegle, H., 2011. CCTV Surveillance: Video practices and technology. 1st ed. s.l.:Elsevier.
Document Page
CYBER SECURITY IN PRACTICE 9
Landau, S., 2011. Surveillance or security?: The risks posed by new wiretapping
technologies. 1st ed. s.l.:Mit Press.
Landau, S., 2013. Making sense from Snowden: What's significant in the NSA surveillance
revelations. IEEE Security & Privacy, 11(4), pp. 54-63.
Loader, B. D. & Thomas, D., 2013. Cybercrime: Security and surveillance in the information
age. 1st ed. London: Routledge.
Lyon, D., 2015. Surveillance after snowden. 1st ed. London: John Wiley & Sons.
Mattelart, A., 2010. The globalization of surveillance. s.l.:Polity.
McCahill, M., 2013. The surveillance web. 1st ed. s.l.:Willan.
Monahan, T., 2010. Surveillance in the Time of Insecurity. s.l.:Rutgers University Press.
Nedim, U., 2017. Surveillance Cameras in the Neighbourhood. [Online]
Available at: https://www.sydneycriminallawyers.com.au/blog/surveillance-cameras-in-the-
neighbourhood/
[Accessed 26 January 2020].
OAIC, 2020. Surveillance and monitoring. [Online]
Available at: https://www.oaic.gov.au/privacy/your-privacy-rights/surveillance-and-
monitoring/
[Accessed 29 January 2020].
Sarre, R., 2016. CCTV: who can watch whom under the law?. [Online]
Available at: http://theconversation.com/cctv-who-can-watch-whom-under-the-law-63046
[Accessed 29 Janaury 2020].
Stilgherrian, 2018. CISOs given cyber leadership role in Australia's new Information
Security Manual. [Online]
Available at: https://www.zdnet.com/article/cisos-given-cyber-leadership-role-in-australias-
new-information-security-manual/
[Accessed 22 January 2020].
Von Solms, R. & Van Niekerk, J., 2013. From information security to cyber security.
computers & security, Volume 38, pp. 97-102.
Zureik, . E. & Salter, M., 2013. Global surveillance and policing. 1st ed. London: Routledge.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CYBER SECURITY IN PRACTICE 10
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]