COIT20263: Information Security Management Report on OZ Dispatch

Verified

Added on  2023/01/18

|7
|1165
|32
Report
AI Summary
This report provides an in-depth analysis of information security management within the context of OZ Dispatch, a home delivery service. The report begins by outlining legal issues arising from the mishandling of information by data analysts, including concerns around data ownership, licensing, and copyright infringement. It then explores ethical considerations for delivery staff, emphasizing the importance of ethical conduct in the domain of computing. The report proposes measures to address unethical handling of information, such as creating codes of conduct and reinforcing ethical behavior. Furthermore, it details the essential components of an InfoSec program for OZ Dispatch, including policy implementation, security management, and incident response planning. Finally, the report discusses the aspects of InfoSec standards that subcontractors must adhere to, ensuring customer data protection and legal compliance. The report concludes with a summary of findings and references.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INFORMATION SECURITY MANAGEMENT
Information Security Management
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION SECURITY MANAGEMENT
Table of Contents
Introduction......................................................................................................................................2
Discussion........................................................................................................................................2
Legal Issues with respect to mishandling of Information by Data Analyst of OZ Dispatch.......2
Ethics in InfoSec which is followed by delivery Staff of OZ dispatch.......................................3
Measures that should be taken for unethical handling of information........................................3
Components of InfoSec program of OZ dispatch........................................................................3
Aspects of InfoSec Standard that needs to be followed by sub-contractor of OZ dispatch........4
Conclusion.......................................................................................................................................4
References........................................................................................................................................6
Document Page
2INFORMATION SECURITY MANAGEMENT
Introduction
OZ dispatch, is a well-known home delivery plan of service that operates its business
from NSW (New South Wales), Australia. The main focus of this particular organisation is all
about design and development of networks in OZ dispatch. In the Parramatta office branch of OZ
dispatch, a range of higher authorities will be present like managing director, data analyst, sales
and marketing and lastly accountant. It is the duty of data analyst to deal with huge volume of
data of range of person like customer and information of products.
In the coming pages of the report, a list of legal issues has been discussed with respect to
any kind of mishandling of information by data analyst by OZ dispatch. An analysis has been
done with respect to ethics in InfoSec due to delivery staff of OZ dispatch.
Discussion
Legal Issues with respect to mishandling of Information by Data Analyst of
OZ Dispatch
The biggest ethical issues in OZ dispatch is due to data and information protection. OZ
dispatch aim to sell items by the help of web that mainly collects data of the customer like credit
card information or bank account details (Safa, Von Solms and Furnell 2016). There are large
number of issues encountered by Data Analyst of OZ dispatch like
Ownership of Data.
Open Data and Public Domain
Licensing database
Copyright Infringement
Breach of Security
Document Page
3INFORMATION SECURITY MANAGEMENT
Ethics in InfoSec which is followed by delivery Staff of OZ dispatch
Ethic can be stated as a branch of philosophy that requires defining and recommendation
of right components and any wrong conduct (Peltier 2016). Ethical concern in the domain of
computing is widely known. Information Security profession are looking for taking into account
of their own ethical consideration (Bansal, Hodorff and Marshall 2016). Community of
information security has come up with best practices which is needed for tackling any kind of
vulnerabilities. The main focus of weaponized vulnerabilities of attack is all about making
suggestion of increase in overall adaptation for end to end encryption (Soomro, Shah and Ahmed
2016). It is mainly needed by wide range of messaging application that requires to be successful.
Measures that should be taken for unethical handling of information
Unethical use of information can damage the whole working environment of OZ dispatch
(Flowerday and Tuyikeze 2016). For tackling the issue, a list of step should be taken like
Creation of code of conduct.
Leading by example.
Reinforce the consequences by taking account the ethical behaviour.
Appreciation of employees.
Creation of check and balance
Hiring for Values.
Components of InfoSec program of OZ dispatch
For achieving strategical and operation goal, a large number of keys components are
taking into consideration like
Emphasizing the information security program as a whole.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4INFORMATION SECURITY MANAGEMENT
Alignment of security program with mission and objectives of OZ dispatch.
Implementing meaningful and suitable security policies and procedure.
Development of a security management program.
Focusing on in-depth measures
Establishment of culture for the security.
Analysing the information security program which is developed by the help of
meaningful metrics (Safa et al. 2015).
Developing incident response plan.
Aspects of InfoSec Standard that needs to be followed by sub-contractor of
OZ dispatch
The sub-contractor at OZ dispatch need to focus on various aspects of InfoSec for variety
of reason like
Establishing a general approach which is needed for information security.
For detection and forestall of any kind of compromising with respect to information
security like misuse of data and computers.
This particular policy focus on protecting the overall reputation with respect to legal
responsibilities (Bansal, Hodorff and Marshall 2016).
Focusing on the rights of the customer.
Conclusion
From the above pages it can be concluded that this report is all about OZ dispatch, a
home delivery service plan that operates in NSW, Australia. In the report, a suitable information
security management plan has been discussed for OZ dispatch. In this organization, the data
analysts need to deal with huge volume of data of customer and product. Delivery Staff of OZ
Document Page
5INFORMATION SECURITY MANAGEMENT
dispatch mainly focus on collecting order item for the suppliers and will bring 20 collection and
distribution centres. As soon as the order of the customer is prepared, a delivery staff near to
CDC will be prompted by the system. It is the sole responsibility of delivery staff members to
look for item of customer from suppliers and bring them to various distribution centre in NWS.
Document Page
6INFORMATION SECURITY MANAGEMENT
References
Bansal, G., Hodorff, K. and Marshall, K., 2016. Moral beliefs and organizational information
security policy compliance: The role of gender. Proceedings of the Eleventh Midwest United
States Association for Information Systems, pp.1-6.
Flowerday, S.V. and Tuyikeze, T., 2016. Information security policy development and
implementation: The what, how and who. computers & security, 61, pp.169-183.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. Auerbach Publications.
Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A. and Herawan, T., 2015.
Information security conscious care behaviour formation in organizations. Computers &
Security, 53, pp.65-78.
Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model
in organizations. Computers & Security, 56, pp.70-82.
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, 36(2),
pp.215-225.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]