Information Governance Report: Privacy, Security, and Cyber Attacks

Verified

Added on  2022/10/09

|4
|446
|20
Report
AI Summary
This report provides an overview of information governance, privacy, and security functions, focusing on the growing threat of cyberattacks. It identifies various types of cyberattacks, including malware, phishing, and denial-of-service attacks, and discusses the increasing sophistication of cybercriminals. The report highlights the vulnerabilities of various entities, such as governments, banks, and private individuals, to these attacks and emphasizes the need for updated tools, employee training, and educational campaigns to combat them. It explores privacy laws like the Federal Wiretapping Act and the Computer Fraud and Abuse Act. The report also delves into the challenges of securing confidential e-documents, perimeter security limitations, and the roles of IAM, DLP, and IRM technologies. It underscores the importance of addressing insider threats and implementing robust security measures to protect data both within and outside the organization. The report provides a comprehensive analysis of the cyber security landscape, offering valuable insights into threats, victims, perpetrators, and potential solutions.
Document Page
Running head: INFORMATION GOVERNANCE
INFORMATION GOVERNANCE
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION GOVERNANCE
Both technology and increased internet access can easily bring a huge amount of positive
things. As a result of technological development in the domain of cyber-criminals can help in
robbing the banks. Cyber-attacks can be divided into two categories that are target to keep the
system offline and secondly to access the system data (Chhaya et al., 2017). There are mainly
seven kind of cyber-attacks like malware, phishing, denial of services, cryptojacking, SQL
injection, zero-day exploits. At present, system and access to internet can take of place of gun on
the web platform. Various kind of activities like phishing, spamming, web privacy can easily
take place in just one cubical way. There is a list of behind the growth of cyber-criminals in the
last few years. The current law enforcement agencies lack updated tools and technologies for
tackling cyber-attack (Al-Mohannadi et al., 2016). The victims lack some of the basics skills and
awareness of information technology until and unless it is late. Complete expertise for cyber-
attacks, training to employees, educational campaign needs to be there in both public and private
organization. The victims of this cyber-attack are government, school, banks, defence bodies,
private individual and defence contractor.
The target victim countries of cyber-attacks are
Belgium
Dominican republic
Hong Kong
Samoa
China
Tajikistan
Australia
Afghanistan
Document Page
2INFORMATION GOVERNANCE
South Africa.
The target organization for cyber-attacks are
Adobe reader
Sony
Target corporation
Alteryx
Equifax
Adult friend finder
Marriot hotels
Yahoo.
There are various privacy law which can be applied for preventing any kind of data
breach
Federal wire trapping Act
Electronic communication privacy Act of 1986.
Stored communication and Transaction Act
Computer Fraud and Abuse act
Freedom of information Act.
Document Page
3INFORMATION GOVERNANCE
References
Al-Mohannadi, H., Mirza, Q., Namanya, A., Awan, I., Cullen, A., & Disso, J. (2016, August).
Cyber-attack modeling analysis techniques: An overview. In 2016 IEEE 4th
International Conference on Future Internet of Things and Cloud Workshops
(FiCloudW) (pp. 69-76). IEEE.
Chhaya, L., Sharma, P., Bhagwatikar, G., & Kumar, A. (2017). Wireless sensor network based
smart grid communications: cyber-attacks, intrusion detection system and topology
control. Electronics, 6(1), 5.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]