IT Security Report: SIT763 Assessment 3 - Case Investigations

Verified

Added on  2023/04/25

|6
|1177
|375
Report
AI Summary
This report provides an in-depth analysis of IT security issues within corporate organizations, focusing on the German steel mill cyber attack and the broader implications of internet-based applications. It explores the importance of corporate security management, emphasizing the need for organizations to develop robust security policies and controls to mitigate risks such as business loss, data breaches, legal issues, and reputational damage. The report examines various cyber threats, including email phishing, network scanning, keyloggers, and internal threats, and discusses potential countermeasures. It highlights the significance of cybersecurity in safeguarding data and systems, offering strategies for securing control systems and protecting confidential information. The report concludes by stressing the importance of implementing effective methods to validate management practices and achieve desired objectives in the face of evolving cyber threats and the need for companies to prioritize cybersecurity measures to maintain a strong reputation and protect valuable data assets.
Document Page
IT Write Up 1
IT Write Up
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT Write Up 2
Introduction
The explosion of the internet-based applications has amended the process in the organizations to
conduct their business. There are many corporate organizations that are more interested in
searching new technical proposals at low functioning cost, with the aim of offering superior and
pioneering services and therefore attaining competitive advantage (Peltier, 2016). However,
corporate companies are relying on gaining advantages from technology in order to attain
competitive advantages. This report entails German steel mill cyber attack which was targeted in
late 2014 when hackers got complete control over the production software and reasoned
noteworthy material change to the site. It has been found that this is the second attack to be
accounted after an attack focusing a uranium enrichment centrifuge in Iran in 2010 (Peltier,
2016).
Corporate Security Management investigates the various structures of the security organizations
in various industries. There are many organizations in the world that deal with number of
information security risks. Floods, earthquakes, terrorist attacks, fires, and another disaster can
obliterate information processing critical documents and facilities. The company’s reputation,
customer confidence and profitability can be influenced due to loss of organizational
information. It is necessary for the company to keep the focus on developing efforts to make sure
the ability of the business continuity, along with evaluating and analyzing their efficiency
(Pereira and Santos, 2014). Generally, organizations and develop with recognition and collection
of the protection controls as per their business needs and linked security requirements. The
security policy of the company should be concise and clear that demonstrates the information
security policy along with the set of controls.
Document Page
IT Write Up 3
This paper will provide the depth information regarding security management issues in the
context of corporate organizations. The cyber threat is the major issue of all corporate
organizations and it is necessary for all companies to have looked on such issue. Cybersecurity is
regarding securing data and systems in the global environment (Siponen and Willison, 2009).
Cybersecurity has turned out to be a global issue which should be taken into consideration by
corporate companies. The discussion will be made on various risks such as business loss, loss of
data, legal issues, huge investment and reputation. This report will depict various cyber threats
such as email phishing attack, network scanning, keyloggers and internal threats. The extent of
vital information that exists on various data source has developed exponentially from the early
days of a single computer (Deruma, 2014). It is an opportunity for companies of all kinds to have
their data compromise develops as the various devices that store confidential data amplifies. The
business owners should be conscious regarding cloud technology best exercises and regulations
surrounding responsive data. After the discussion of cyber threats within the corporate
organizations, the discussion will be made under this paper in the context of providing possible
countermeasures. The risks can be minimized by applying various strategies by focusing on
cyber security. The findings in the context of how to secure control systems will be elaborated by
taking consideration of email phishing, network scanning, key loggers, and internet threads.
Conclusion
It has been concluded that corporate organizations should determine the primary objectives in the
context of implementing effective methods to validate their management and develop their task
to attain desired objectives. It has been found that there are various risks within the business
Document Page
IT Write Up 4
regarding cyber security that can hamper the position and image of the company in the view of
the outsiders. An entire development of the company relies on the developed followed policies of
the company because it maintains the decorum within the entity which encourages employees to
work in a more efficient manner. This report has analyzed various risks in the context of
corporate organizations such as loss of data, business loss, legal issues, reputation and
investment. With respect to loss of data, it has been found that the data can be transferred from
one place to another for the purpose of hampering the condition of the company with the help of
the ICS connected system. It has been analyzed that the data of an individual in the company
keeps significant value and loss of personal detail of any employee can lead into a negative way
to the company as the trust of the employees over the company can be vanished which can be the
reason high attrition rates.
It is necessary for the company to keep concentrate on the cybersecurity system as it helps in
securing confidential data to lose. The reputation of the company takes a lot of time to build and
it is vital for them to keep it updated which can be done with taking consideration of security
systems such as system and network management, monitoring and auditing, vulnerability
management, authentication and authorization, encryption and security architecture and design.
The discussion about the cyber threats is made under the report in the context of an email
phishing attack, networking scanning, keyloggers and internal threats. The companies should
keep the focus on not sharing personal and confidential information to anyone. Along with that
the company should concentrate on using antivirus, malicious code detection tools try to find out
malware and remove from the network. The company can rebuild the system in the context of an
infected system with some virus, but there should be assurance that the company should install
the latest anti-virus software. The execution of the security controls helps companies elaborate
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT Write Up 5
their commitment to secure information assets and to make sure confidentiality to customer
information. This paper has covered factors that contribute in reducing the risks and searching
the ways of securing control systems within the organization to develop productivity of the
employees as well as organizations.
Document Page
IT Write Up 6
References
Deruma, S., 2014. Problems and solutions of information security management in Latvia. In SHS
Web of Conferences, 10(7) EDP Sciences.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. Auerbach Publications.
Pereira, T. and Santos, H., 2014, July. Challenges in Information Security Protection. In 13th
European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus
Piraeus, Greece. Pp.160.
Siponen, M. and Willison, R., 2009. Information security management standards: Problems and
solutions. Information & Management, 46(5), pp.267-270.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]