Answer To: MIS607_Assessment_2_Case Scenario XXXXXXXXXXPage 1 of 1 Case Scenario The Business & Communication...
Sayani answered on Jul 12 2021
Running Head: MIS607 CYBERSECURITY 1
MIS607 CYBERSECURITY 8
MIS607 CYBERSECURITY
THREAT MODEL REPORT
Table of Contents
Introduction 3
The Risk Factors related with Cybersecurity 3
Promoting Staff Awareness and Management of the Risk 4
Ethical Decision Making and Implementation of Serious Measures 5
Data Flow Diagram (DFDs) 6
Conclusion 7
References 8
Introduction
As per the case scenario, The Business and Communication Insurance dealt their business related confidential as well as authentic information with their client through emails in order to keep a proof. However, it has become a risk factor and threat for this institution as they are facing several cybersecurity attacks.
The CEO consulted the senior management and they acted promptly to investigate the risk factors and threats with the aid of forensic computer specialists. This paper will therefore highlight the various threats, how to manage those threats, promote awareness and initiate action to mitigate those problems.
The Risk Factors related with Cybersecurity
Cyberspace is a concept that explains about a widespread interconnected digital technology. This concept was first coined after the diffusion of the internet. It is a global domain under an information environment, which consists of multiple interdependent networks, including computer system, internet, telecommunications and many more.
Therefore, cybersecurity is the practice of protecting the system, the programs and the networks from several unethical digital attacks. These cyber-attacks are usually aimed to change or destroy the sensitive and confidential information, extort money from the users and ruin the reputation of the company or any other institution.
As stated by Utente (2018), a cookie policy is a declaration for the users on what cookies is active on their websites, what the purpose of the data are, for which they are tracking and where in the world this data is sent. This policy creates potential privacy risk as it can track the behaviour of the user. Data policy are the high-levelled principles, which forms guiding framework, in which data assets in the Commission can be managed.
All business firms undergo certain risk assessment, which affect the performance level of the organisation. The core values of these risk and the compliances demonstrate on defining the risk so that the organisation may proceed with standard and regulation. As stated by Florakis, Louca, Michaely and Weber (2020), the various threats related to cybersecurity are ransomware, hacking, data leakage, inside threat, third party vendor risk, phishing and improper way to secure the sensitive information, trust betrayal clients and many other. Ransom emails are normally sent through unreliable external networks that are outside the company’s security boundary.
In the regard to case scenario, ransomware and hacking are the main risk occurred in this profile. Ransomware is form of malicious software that attempt to scramble the data and then extort a ransom in order to release an unlock code. Most often, this ransomware is released through malicious emails. In this case, too, through several malware emails, the company’s sensitive information is hacked by the outsider. As argued by Newhouse, Keith, Scribner and Witte (2017), hacking is yet another procedure, which can ruin a company’s confidential information.
Gaining access and information from IT system from outside the organisation still provide a huge opportunity for the criminals to hack the company information and even the bank details or credit card database. The intellectual property is yet another source of value for them where they use the staffs to reveal the users name and passwords, social engineering and creates a threat for the company.
Promoting...