MIS607_Assessment_2_Case Scenario XXXXXXXXXXPage 1 of 1 Case Scenario The Business & Communication Insurance (B&C Insurance) began business as a private health insurer, established by Gary RT.L &...

1 answer below »
MIS607 Cybersecurity


MIS607_Assessment_2_Case Scenario Page 1 of 1 Case Scenario The Business & Communication Insurance (B&C Insurance) began business as a private health insurer, established by Gary RT.L & family in 1965 through the Health Insurance Commission. This company was set up to compete with private "for-profit" funds. The company’s headquarters is located in New York and has offices in various other countries including Spain, Australia and Hong Kong. The CEO of the B&C Insurance recently received a ransom email from an unknown company claiming that they have access to the company strategic plans and personal details of 200,000 clients. A sample of personal details of 200 clients was included in the email as a ‘proof’. Ransom emails are normally sent through unreliable external networks that are outside the company’s security boundary. The CEO consulted the senior management and they acted promptly to investigate and contain the threat with the aid of forensic computer specialists. The first step was to validate the threat. The management team found a discussion on a hacker site in the dark net that had personal information of 200,000 clients of B&C Insurance for sale. This also included the details of the 200 clients, provided in the ransom email as ‘proof’. The investigation also confirmed that the details of the 200 customers are genuine. The senior management considered the need to identify threats and give practical guidance on how to manage the risks of identity fraud to be of utmost importance. Therefore, a team of consultants was appointed to prepare a series of reports to identify various threats and to develop cybersecurity crisis management plans in order to respond to potential threats/ risks of sophisticated hackers penetrating into the internal systems of the company and accessing client information. As the cybersecurity specialist in the team, you have been asked to write a report to identify the threat types and key factors involved. In doing so, you are required to identify the most ‘at-risk’ components, create awareness among the staff of such high-risk components and how to manage them. In addition, this report is to help key stakeholders, including the executive managers, to make decisions on what course of actions must be undertaken to mitigate potential threats. https://en.wikipedia.org/wiki/Health_Insurance_Commission
Answered 6 days AfterJul 05, 2021

Answer To: MIS607_Assessment_2_Case Scenario XXXXXXXXXXPage 1 of 1 Case Scenario The Business & Communication...

Sayani answered on Jul 12 2021
127 Votes
Running Head: MIS607 CYBERSECURITY                            1
MIS607 CYBERSECURITY                                     8
MIS607 CYBERSECURITY
THREAT MODEL REPORT
Table of Contents
Introduction    3
The Risk Factors related with Cybersecurity    3
Promoting Staff Awareness and Management of the Risk    4
Ethical Decision Making and Implementation of Serious Measures    5
Data Flow Diagram (DFDs)    6
Conclusion    7
References    8
I
ntroduction
As per the case scenario, The Business and Communication Insurance dealt their business related confidential as well as authentic information with their client through emails in order to keep a proof. However, it has become a risk factor and threat for this institution as they are facing several cybersecurity attacks.
The CEO consulted the senior management and they acted promptly to investigate the risk factors and threats with the aid of forensic computer specialists. This paper will therefore highlight the various threats, how to manage those threats, promote awareness and initiate action to mitigate those problems.
The Risk Factors related with Cybersecurity
Cyberspace is a concept that explains about a widespread interconnected digital technology. This concept was first coined after the diffusion of the internet. It is a global domain under an information environment, which consists of multiple interdependent networks, including computer system, internet, telecommunications and many more.
Therefore, cybersecurity is the practice of protecting the system, the programs and the networks from several unethical digital attacks. These cyber-attacks are usually aimed to change or destroy the sensitive and confidential information, extort money from the users and ruin the reputation of the company or any other institution.
As stated by Utente (2018), a cookie policy is a declaration for the users on what cookies is active on their websites, what the purpose of the data are, for which they are tracking and where in the world this data is sent. This policy creates potential privacy risk as it can track the behaviour of the user. Data policy are the high-levelled principles, which forms guiding framework, in which data assets in the Commission can be managed.
All business firms undergo certain risk assessment, which affect the performance level of the organisation. The core values of these risk and the compliances demonstrate on defining the risk so that the organisation may proceed with standard and regulation. As stated by Florakis, Louca, Michaely and Weber (2020), the various threats related to cybersecurity are ransomware, hacking, data leakage, inside threat, third party vendor risk, phishing and improper way to secure the sensitive information, trust betrayal clients and many other. Ransom emails are normally sent through unreliable external networks that are outside the company’s security boundary.
In the regard to case scenario, ransomware and hacking are the main risk occurred in this profile. Ransomware is form of malicious software that attempt to scramble the data and then extort a ransom in order to release an unlock code. Most often, this ransomware is released through malicious emails. In this case, too, through several malware emails, the company’s sensitive information is hacked by the outsider. As argued by Newhouse, Keith, Scribner and Witte (2017), hacking is yet another procedure, which can ruin a company’s confidential information.
Gaining access and information from IT system from outside the organisation still provide a huge opportunity for the criminals to hack the company information and even the bank details or credit card database. The intellectual property is yet another source of value for them where they use the staffs to reveal the users name and passwords, social engineering and creates a threat for the company.
Promoting...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here