Analysis of Risks and Threats Affecting the Victorian Government

Verified

Added on  2020/02/24

|19
|4412
|42
Report
AI Summary
This report provides a comprehensive analysis of risks and threats impacting the Victorian Government, focusing on the Victorian Protective Data Security Framework (VPDSF). It explores the framework's components, including the Assurance Model, security guides, and standards, and discusses the importance of the CIA triangle (Confidentiality, Integrity, Availability). The report identifies and categorizes risks, such as information security breaches, ICT vulnerabilities, and non-compliance with standards, and analyzes them based on their severity (high, medium, low). It differentiates between deliberate and accidental threats, detailing specific examples and their potential impacts. The document also examines challenges faced by the public sector, uncertainties, and mitigation strategies, concluding with recommendations for strengthening security protocols and ensuring the protection of sensitive data and assets. The report emphasizes the need for robust security measures to safeguard the Victorian Government's operations against various threats.
Document Page
Running head: VICTORIAN GOVERNMENT
Victorian Government
Name of the student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1VICTORIAN GOVERNMENT
Executive summary
The following report discusses about the topics related with the risks and threats affecting the
Victorian Government. The standards that are to be followed are also discussed in this report.
The chosen organization is the Victorian Protective Data Security framework. The report further
discusses about the risks in the form of a diagram.
Document Page
2VICTORIAN GOVERNMENT
Table of Contents
Introduction:....................................................................................................................................3
Discussion:.......................................................................................................................................3
Risks and concerns:.....................................................................................................................4
Analysis of the diagram:..............................................................................................................6
Deliberate and accidental threats:................................................................................................8
Challenges:................................................................................................................................11
Risks and uncertainties:.............................................................................................................12
Risks and mitigation:.................................................................................................................14
Conclusion:....................................................................................................................................15
References:....................................................................................................................................16
Document Page
3VICTORIAN GOVERNMENT
Introduction:
The Government of Victoria (VIC) is termed as the democratic and administrative
authorities that are used to manage the risks and threats involved in Victoria, which is a state of
Australia. The constitution of the VIC government shows the year of formation of the framework
in the year 1851. Victoria is considered as the commonwealth resource of Australia since the
year 1901. Due to the presence of commonwealth, Victorian government got their rights of
legislature and judiciary supremacy included under the Australian constitution. To address the
risks and threats in the public sector organization of Victoria, the governing body known as the
Victorian Protective Data Security Framework (VPDSF) was formed. The organizational
framework comprising of the Victorian Protective Data Security Framework (VPDSF) includes
the Assurance Model, guides for security, supporting resources and the Victorian Protective Data
Security Standards (VPDSS). The resources used here are used to help the government involved
take effective decisions in ensuring the right allotment of access to the right people involved.
The following report discusses about the risks and threats that are currently present in the
Victorian government. The analysis of these risks in terms of high, low and medium is also
included in the report to be discussed. The challenges that can be faced in the public sector
organization are also included in the report. In addition, the uncertainties involved and the
mitigation of the risks are also included in the report.
Discussion:
The standards and protocols maintained in the Victorian Protective Data Security
Framework (VPDSF) are present to help the government make right decision when access to
certain information is given to a people. It ensures that the right of access to certain sensitive
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4VICTORIAN GOVERNMENT
information is not exploited in the name of unauthorized access (Toohey, 2016). The standards
and protocols that are being followed comply with the national and international laws of policies
and standards. The operations and processing of the public sector organizations and the public
agencies involved with the Victorian government are identified by the Victorian Protective Data
Security Framework (VPDSF). The Assurance model followed by the VPDSF is used to follow
and monitor the activities that are currently undertaken in the various involved organization and
agencies (Redley & Raggatt, 2017). Moreover, the economic benefits and the security in
operation are also maintained by the assurance model. The VPDSF also promotes the need for
cultural changes in an organization by strengthening and upgrading the security protocols in the
organization. This facilitates the organization involved in doing their operations while complying
with the various standards and policies.
Risks and concerns:
The presence of various risks and concerns as identified by the government of Victoria is
being discussed in this section. The respective fields of the risks and threats involved are to be
addressed to provide solutions to each of them. The steps for addressing the identified risks and
threats, various steps are to be followed. However, the threats and risks are different for two
different governing bodies ("VICTORIAN PROTECTIVE DATA SECURITY
FRAMEWORK", 2017). The Commissioner for privacy and protection of data (CPPD) needs to
establish the framework needed to monitor the operations of the organization of the public
sector. The presence of promotion of security standards and policies are to be emphasized by the
CPPD and the need for formal reporting of the security assessment profiles are also to be
emphasized.
Document Page
5VICTORIAN GOVERNMENT
For the process followed by the public sector organizations, the need for developing and
assessing the security profile and the security plan development is emphasized. The annual
attestation of CPPD is also emphasized by the process followed in the public sector organizations
(Peltier, 2013). The VPDSF has made successful analysis that notifies the presence of 18
requirements for emphasizing the protection of the information associated with the public sector
organization. This data analysis has made the presence of four specific domains to address,
which consists of information, physical security, ICT and personnel.
Fig: Risks and concerns identified
(Source: Made by the author)
The CIA triangle corresponds to the confidentiality, integrity and availability. The model is used
to provide guidelines addressing the policies for security of information in the organization
involved (Sadgrove, 2016). Confidentiality in the model refers to the limit of access to the
Document Page
6VICTORIAN GOVERNMENT
resource present. Integrity is the presence of accuracy and trust in the information present.
Availability is the presence of guaranteed access to the information.
Fig: CIA triangle
(Source: Made by the author)
Analysis of the diagram:
The diagram of risks and threats presented in the diagram of the above topic clearly
depicts the awareness of such concerns. The different aspects depicted in the diagram are the
physical security, personnel, information and ICT. These are the main aspects that are addressed
by the standards and policies followed by the VPDSF. The risks and concerns are depicted as:
High-risk areas Medium-risk areas Medium-Low risk areas Low-risk areas
Security in information ICT Policies and
responsibilities of the
organization
Public sector
organizations
National and
international securities
Compliance with
standards
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7VICTORIAN GOVERNMENT
The analysis of the diagram is made in respect to the areas depicted in the table. These
include the high-risk areas, medium-risk areas, medium low and low-risk areas. The high-risk
aspects are present in the Information securities and securities in national or international
standards. However, the problems that are present in the information securities includes the
disclosure of information in organizations involved, unauthorized access and data destruction,
which can affect the operation on a large scale (Sadgrove, 2016). The security related to the
computer and its associated aspects are included in the information security. The assurance of
information is termed as the assurance of trust in the information regarding the CIA model
discussed above. In addition, the security of national and international standards is used to refer
to the protection of assets, which is directly related to the protection of national and international
standards. This portion is also of high importance, as the measures to analyze the importance in
compliance to their standards should be followed.
The ICT security is included in the areas of medium risk and concerns. The ICT security
is used to define the security provided in the information shared via communications. This aspect
of ICT is same as that of the information security but the direct emphasis is given to the security
on communications (Almeida, Hankins & Williams, 2016). The telecommunication aspect gives
the people the advantage to communicate with each other without the requirement of any
problems.
The medium low risk areas include the policies and responsibilities of the various public
sector organization involved with the VIC government. The need for compliance with the
government standards is also a place of medium low risk. The policies and responsibilities of the
various public sector organizations are to be addressed so that the threats and risks in their
Document Page
8VICTORIAN GOVERNMENT
assessment are minimized. In addition, the need for compliance to the standards and protocols
are to be maintained as the risks and threats involved in the assessment of the standards are to be
followed. This is the reason of placement of the risks in the medium low zone.
The low risk aspects include the public sector organization. These organizations are
intended to serve the public and protection of their assets is required (Almeida, Hankins &
Williams, 2016). These places are prone to risk by the outsiders as the present of certain
individual may try to get information that jeopardizes the activity of the affected individual. This
is the reason of implementation of enhanced security protocols to help address them.
Deliberate and accidental threats:
The provided document reference the need for applying enhanced security protocols in
the public sector organization for protecting the assets present. The risks for security are to be
identified and analyzed to follow the risk management standards. The public sector organization
needs the acquisition of data from the public to facilitate effective operation. The users of this
organization provide the information as the need to access is acquired from it. This in turn
requires the organization involved with the public services to assure the effectiveness of their
work and the security in their information content (Cole, Giné & Vickery, 2017). Although, the
presence of public information like the user credentials including the name, address and other
aspects, the company or organization involved must provide assurance in not exploiting the
acquired resource as this may lead to problems in trust and ethics if hampered with. This is the
basic threat that is a place for concern among all organizations dealing with pubic services.
Deliberate threats are those types of threats that are done with the sole intent of getting
unauthorized information or access to a system. With respect to an organization, the deliberate
threats are those that involve trespassing in the system to get access, sabotage of system,
Document Page
9VICTORIAN GOVERNMENT
extortion and software attack. These types of attacks are those one, which involves the misuse of
security standards followed by the organization to get the required information or access in an
unethical way. This is a major concern that is present in all the organizations and the need for
enhanced and strong security protocols for addressing such concerns are required to be present or
else the operation of the organization can be hampered leading to extreme loss of business
(Nurse et al., 2014). However, the sabotage in system and the software attacks are the most
important place of concern in the system as they can affect the system in an extreme way and the
security standards must address them to ensure the operations of the organization involved. The
information security and the ICT are the main places where these deliberate threats can take
place. The reason for effective security standards are the threats to these aspects. Another place
where the deliberate threats are possible is the compliance of the service providers. The service
providers may not comply with the government standards due to the presence of discrepancies
and the provision of unsuccessful products to the public sector organization will take place. This
can lead to risks to the public sector sensitivity. However, the first level of importance are to be
given to the information security and ICT security as the problems faced in these sectors can lead
to major effects in the system (Pritchard & PMP, 2014). An example for an attack that was
supposed to be deliberate is the civilian attack in Catalonia. The main suspect is a van, which
was made to go through the crowded places that led to major injuries of the affected individuals.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10VICTORIAN GOVERNMENT
Fig: Threats
(Source: Created by the author)
The attacks that are supposed to be accidental are those attacks that do not follow a
pattern and control of these attacks is not possible. However, the impacts of these attacks can be
lessened. These attacks are not intentional. The natural disasters, human errors in working or
technical issues are the accidental threats. These threats cannot be controlled but if present, the
operation can be impacted in some extreme cases. However, the technical errors and human
errors can be significantly reduced (Luiijf, 2012). As these problems, involve the threats
occurring due to human problems, the presence of such errors can be minimized. The technical
errors occur due to the negligence of employees or the public individuals and the faulty
management of the devices like lack of internet access. The presence of such threats can be
reduced by efficient and regular training and presence of personnel to help address the issues.
However, the natural disasters cannot be controlled or reduced at all. Nevertheless, the impact it
creates can be reduced. The need for backup of the acquired data both internally and externally is
required. Internal backup means saving up the recent work in the device to roll back the changes
once affected. External backup means the presence of cloud to store the backed up information.
After the passage of the disaster, the changes that were saved can be rolled back and the
operation can continue without any grievances. The organizational polices as well as the
standards of national and international level are a place where the accidental problems are
eminent. The policies may not always comply with the set standards due to many accidental
reasons. One such example of an accidental threat is the ransomware attack on an oil company in
Russia. The company is a very well known one operating in Russia (Davies, 2014). Due to such
attacks in the system, the company faced grave threats and the need to secure the system was
Document Page
11VICTORIAN GOVERNMENT
implemented by halting the operations in information technology department. The ransomware
attacks made by the hackers did not target the organization, which makes this a possibility for an
accidental attack.
Challenges:
During the conduction of risks and threats internal assessment, the public sector
organization need to determine the already set standards and policies present in the policies but
during the external assessment of the risks or threats involved, the assessment reports conducted
by the public sector organization are to be submitted to the Commissioner for privacy and Data
Protection (CPDP). During the internal assessment, the organization to be involved is to carry
out the required assessment (Jouini, Rabai & Aissa, 2014). The accountability and responsibility
for assessment are given to the public sector organization. The CPDP is responsible to help the
organizations involved to carry out the assessments. In addition, during the conduction of
external assessment, the accountability and responsibility for the execution of the assessment is
present with the CPDP itself. The public sector organizations are then consulted for carrying out
the assessment effectively. The assessment is then reported to the organizations involved.
The CPDP is considered responsible for establishing the framework necessary to
maintain and monitor the activities of the information and data in the public sector organization.
The promotion of security related parameters are also done by the CPDP itself. The maintenance
and audits of assessment are made to see the impact of compliance to the set standards. The
recommendation to the system and the formal reporting in terms of the security of the system is
also maintained by the CPDP (Heazle et al., 2013). Moreover, the research for upgrading the
policies and security protocols are also conducted by the CPDP itself.
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]