Scope of the Review
Data Security alludes to the assurance of private information that is entirely confined for outsider get to. Due to the extensive use of cloud computing and other virtual storage applications, the IT organizations are facing a number of cyber security challenges. These archives incorporate delicate duplicates of creative thoughts or applications, new marketable strategies, business comes about, use trackers, money related reports and others (Peltier, 2013). These are kept in the virtual stockpiling because of simple entry and operation. Nonetheless, utilization of virtual stockpiling media has numerous security dangers. Virtual capacity is to a great degree powerless against digital assaults and rupture of security (Yang et al., 2013). Outsiders and exploitative programmers dependably focus on the virtual stockpiling media. The vast majority of these assaults are through malwares or contaminated sends.
In this assignment, a literature review has been conducted based on the cyber security challenges faced by Australian IT companies over the course of their business operations.
The scope of the literature review includes the following.
- Analysis of the cyber security challenges in Australia is within the scope of the literature review
- Analysis of the sources of these cyber security challenges is within the scope of the literature review
- Identification of the solutions for the cyber security challenges is within the scope of the literature review
The objectives of this literature review are as follows.
- To analyze the main essence of information security
- To identify cyber security challenges faced by the Australian IT organizations
- To identify the sources of the cyber security challenges
- To develop suitable solutions for the cyber security challenges
According to Siponen et al. (2014), Data Security is characterized as the assurance or security framework particularly intended for insurance of data put away or worked utilizing a PC framework. Utilizing a PC framework for operations and capacity makes the works of the client less demanding as they operations should be possible effectively and precisely inside a brief timeframe. Nevertheless, because of web associations, the archives and data are powerless against security dangers and digital assaults. Ifinedo (2012) said that exploitative programmers, outsider staff or even defiled programming patches or documents can make genuine harm the PC arrangement of the client. According to Von Solms and Van Niekerk (2013), The particular disapproved of programmers chiefly focus on the frameworks of business associations and other comparable areas for getting to basic and classified data and utilize them for payment or spilling purposes. Utilization of data security is important to keep these dangers and perils. On account of Australian business organizations, there are a few vulnerabilities and dangers in their capacity arrangement of business methodologies and essential records. Subsequently, the organization needs to utilize an improved data security framework keeping in mind the end goal to keep any undesirable exercises or unapproved access of their business procedures (Vacca 2012).
Taylor et al. (2014) said that there are a great deal of issues overall in regards to the data security and insurance of basic reports. There are numerous exploitative programmers and outsider work force that break into the business associations’ frameworks and concentrate private data and basic archives. Possibly they request recover consequently of the records or they release the documents to adversary associations or open, in this manner uncovering the business systems and secret information of the focused on association. Australian IT companies have chosen to put away all the data and information in their official cloud server without uncovering a solitary snippet of data in regards to the item. Notwithstanding, the customary customers and devotees of the organization are anxious to know some point by point data about the item. There is a plausibility that exploitative programmers will attempt to break data about the item. Moreover, some outsider individual may attempt to hole data and advertising systems of the organization. The conceivable related issues are as per the following:
Objectives of the Review
Inside System Malwares – These malwares originate from inside the systems of the organizations due to unethical use of external storage devices and others. Inner framework malwares are made from tainted records or virtual products and they may totally close down the contaminated framework (Cezar et al. 2013). In the event that the frameworks of the organization close down due to malwares, the organization would lose enormous measure of data and basic records.
Outside Malwares – According to Hu et al. (2012), this type of malware is the most common type of cyber security challenge faced by IT organizations. These malwares for the most part go into framework from outside sources. For example, a few messages go to the framework with data about some preposterous offer and a site connect. The minute the client taps on the connection, the malignant infection associated with the connection goes into the framework taints it. Capable infections like Trojan horse can totally obliterate a framework alongside every other framework associated with a similar system. Now and again, there are infections that are made by some obscure personalities (Kolkowska and Dhillon 2013). They utilize the infections for hacking into different frameworks for the sole reason for pulverization. Once more, there are spywares that are utilized to screen the exercises done inside a framework.
Bundle Sniffers – Laszka et al. (2015) said that these are programming instruments that are for the most part utilized by associations to screen the interior exercises in their own particular frameworks and recognize malware exercises. In any case, there are some outsider associations that abuse these instruments for checking framework exercises of different associations. This is a sort of rupture of security that undermines to release private data of the business associations.
Unapproved Access – This is finished by programmers or outsider work force so as to get to data of an association without the learning of the organization specialist. This should likewise be possible by the inside workers of the organization (Ahmad et al. 2014). This episode happens when an ordinary representative gets to data of the organization that is confined and not considered worker get to. According to Lowry et al. (2015), spywares are widely used by some internal workers of the business organizations to access some confidential files that are otherwise not meant for regular access. There have been many situations where these unapproved gets to went unnoticed that at last created loss of numerous basic records of the organization. Nevertheless, because of utilization of framework cautions, many instances of unapproved get to have been gotten before any loss of archives or data.
Data Security Risks associated with Virtual Storage Technology
Loss of Device – According to Baskerville et al. (2014), loss of device can also lead to significant implications regarding cyber security challenges. Whenever an employee of an organization loses a personal device like the laptop, some unethical personnel can use the information stored in the laptop for breaching the employee’s company’s server and steal confidential information from it. Hence, without suitable recovery measures, any employee of IT companies should be aware and protect his personal work device in order to stop the cyber security threats.
No Knowledge of Network Security among the Company Employees – It is found from the works of Posey et al. (2014) that sometimes, the representatives of the organization do not have adequate learning in regards to network security applications or what to do if there should arise an occurrence of a rupture of security assault. Because of this, the appropriate moves are not made in time, helping the assailants get to basic data effectively.
These are the primary security dangers that is confronted by Australian business organizations. Since these organizations’ operations are all in the virtual interface and got to through the web, they are more powerless against the assaults. What’s more, they give business chances to some chose customers just and henceforth, the opponent customers may focus on Australian IT companies’s frameworks to close down to stop business chances to their customers. Subsequently, a considerable measure of moral and dishonest issues are associated with the matter that must be managed independently keeping in mind the end goal to reduce every one of the dangers so that the organization can proceed with its operations effortlessly and adequately.
There are a few solutions for solving the above discussed issues. These are as per the following:
Secure Closed Network System with Restricted Access – According Tamjidyamcholo et al. (2013), the existing IT setups in Australian IT organizations need a complete overhaul. This is needed in order to remove all the poorly upgraded IT devices and install the latest available technical upgrades (Chen and Zhao 2012). Moreover, in order to protect the upgraded technical setups, a closed and secure network server is necessary. The access to this server will have to be strictly restricted so that no unauthorized access is ever allowed (Lee et al. 2013). Spywares are widely used by some internal workers of the business organizations to access some confidential files that are otherwise not meant for regular access. There have been many situations where these unapproved gets to went unnoticed that at last created loss of numerous basic records of the organization. Nevertheless, because of utilization of framework cautions, many instances of unapproved get to have been gotten before any loss of archives or data. By strictly restricting the access to the close network server, these types of threats can be significantly eliminated from the IT infrastructures of the Australian business organizations.
Security Threats Faced by Australian IT Companies
Isolate Networks for Separate Levels of Data – This is another answer for counteracting unapproved access of confidential reports. According to Posey et al. (2014), this will be possible to use isolated sub-networks within the same network server. The sub-networks should not be connected to each other and should be categorized according to different levels of data (based on their importance). The sub-networks can be divided based on scales of 1, 2 and 3 and different levels of employees of the organization can access these sub-networks based on their power and position in the organizational hierarchy. Every one of these systems will be associated with one normal system server that will not permit movement to access with a different system then onto the next (Baskerville et al., 2014). This can be a viable procedure to avert unapproved get to. By following this process, the system admin will be able to monitor over all the sub-networks and identify any issues or unethical activities inside the company’s server.
IP Verification and Locator System – Chen and Zhao (2012) said that IP address locator system can also be used to identify or counter cyber security challenges. IP verification softwares can be used to store all the IP addresses of all the computers used inside the organization. In case of cyber security threats, these softwares can detect the origin IP address and match it with the stored IP addresses inside the database. If it does not match, it will deduce that the origin of the threat is external and suitable countermeasures can be taken accordingly.
Solid Encryptions and Restrictions – According to the works of Posey et al. (2014), use of strong encryptions and access restrictions is necessary in order to counter cyber security challenges. It is evident that the external malwares for the most part go into framework from outside sources using unauthorized access into the server. Due to absence of strong encryptions, these are almost easy for the malwares and attackers. The minute an employee taps on the unauthorized website link, the malignant infection associated with the connection goes into the framework taints it. Capable infections like Trojan horse can totally obliterate a framework alongside every other framework associated with a similar system (Vacca 2012). Hence, strong encryptions and access restriction are extremely necessary for the Australian IT organizations.
Segregated Cloud Server – This should be possible by detaching the distributed storage server utilized by the organization totally from whatever other system. The disengaged cloud framework will then be gotten to from just the organization’s frameworks (Peltier 2013). Notwithstanding, inner security dangers can’t be kept away from by this procedure.
Solutions to the Cyber Security Challenges faced by Australian IT Companies
Change in Employee Guidelines Policy – The main source of internal cyber attacks is the BYOD (Bring Your Own Device) policy practices by a large number of Australian IT organizations. According to this policy, during urgent cases, the employees are allowed bring their own computing devices at work and use them for performing their duties. However, these devices may contain malwares and once, the employee connects this device to the server, the malware infects the whole server. Hence, employee guidelines policy must be revised and BYOD policy must be restricted to as much as possible.
Conclusion:
In this report, the cyber security challenges of Australian business organizations have been discussed in detail. In any case, the standard customers and supporters of the organization are willing to know more about the cyber security issues in the Australian IT companies. There is a probability that untrustworthy programmers will attempt to break data about the item. Moreover, some outsider individual may attempt to break data and advertising procedures of the organization. Henceforth, the organization looks for master guidance and answers for these issues and other conceivable issues that may make their business close down totally. As a component of the activity arrange, a few arrangements have been given. These progressions incorporate use of system confinements and partition of the workplace system to various systems as indicated by various posts or levels of representatives. Additionally, utilization of a product that will empower the system administrator of Australian IT companies to screen which IP locations are being utilized for operations in the workplace systems and emphatically scrambled passwords are recommended. At last, utilization of a disengaged cloud server for capacity of basic records and business systems and changes in hierarchical arrangements viewing representative rules are proposed also.
For Australian business organizations, the fundamental issues have been recognized and a few security arrangements and activities can be prescribed for the insurance of secret data and business procedures. These are as per the following:
- Apply reasonable changes in the system; change the current system to a shut system framework so that exclusive the authorities inside the association can get to it with the utilization of the workplace PCs as it were.
- Apply appropriate changes to the get to strategy in the system. The system get to must be changed entirely to confined that will just permit business related movement.
- Employ malware identification alerts in the PC frameworks that will be valuable in identifying a sudden malware assault.
- Use more than one system inside the organization for various levels of documents. Every one of these frameworks will be associated with one focal framework server that will not allow movement to travel between various networks. This can be a convincing technique to keep away from unapproved get to. What’s more, this will enable the framework executive to find any kind of unapproved movement endeavoring to travel between various networks.
- Use a product that will empower the system administrator of Australian IT companies to screen which IP locations are being utilized for operations in the workplace systems. In the event that one IP address does not coordinate any of the workplace computer’s, a potential rupture of security assault can be distinguished and in addition found and afterward Australian IT companies specialist can make essential strides.
- Apply an emphatically scrambled secret key on the capacity server of the most basic and classified records. The code ought to likewise contain an expansive number of characters. This will avoid undesirable and unapproved access of the classified records.
- Use a segregated cloud server for capacity of basic records and business techniques.
- Change hierarchical arrangements with respect to worker rules. Apply more limitations and new guidelines of framework utilize if conceivable.
References:
Ahmad, A., Maynard, S. B., and Park, S. 2014. Information security strategies: towards an organizational multi-strategy perspective. Journal of Intelligent Manufacturing, 25(2), 357-370.
Baskerville, R., Spagnoletti, P., and Kim, J. 2014. Incident-centered information security: Managing a strategic balance between prevention and response. Information and management, 51(1), 138-151.
Cezar, A., Cavusoglu, H., and Raghunathan, S. 2013. Outsourcing information security: Contracting issues and security implications.Management Science, 60(3), 638-657.
Chen, D., and Zhao, H. 2012, March. Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE.
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., and Baskerville, R. 2013. Future directions for behavioral information security research. computers and security, 32, 90-101.
Hu, Q., Dinev, T., Hart, P., and Cooke, D. 2012. Managing employee compliance with information security policies: the critical role of top management and organizational culture*. Decision Sciences, 43(4), 615-660.
Ifinedo, P. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 83-95.
Kolkowska, E., and Dhillon, G. 2013. Organizational power and information security rule compliance. Computers and Security, 33, 3-11.
Laszka, A., Felegyhazi, M., and Buttyan, L. 2015. A survey of interdependent information security games. ACM Computing Surveys (CSUR), 47(2), 23.
Lee, C. H., Geng, X., and Raghunathan, S. 2013. Contracting information security in the presence of double moral hazard. Information Systems Research, 24(2), 295-311.
Lowry, P. B., Posey, C., Bennett, R. B. J., and Roberts, T. L. 2015. Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust.Information Systems Journal, 25(3), 193-273.
Peltier, T. R. 2013. Information security fundamentals. CRC Press.
Posey, C., Roberts, T. L., Lowry, P. B., and Hightower, R. T. 2014. Bridging the divide: a qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders. Information and management, 51(5), 551-567.
Siponen, M., and Vance, A. 2014. Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations.European Journal of Information Systems, 23(3), 289-305.
Siponen, M., Mahmood, M. A., and Pahnila, S. 2014. Employees’ adherence to information security policies: An exploratory field study. Information and management, 51(2), 217-224.
Tamjidyamcholo, A., Baba, M. S. B., Tamjid, H., and Gholipour, R. 2013. Information security–Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language. Computers and Education, 68, 223-232.
Taylor, R. W., Fritsch, E. J., and Liederbach, J. 2014. Digital crime and digital terrorism. Prentice Hall Press.
Vacca, J. R. 2012. Computer and information security handbook. Newnes.
Von Solms, R., and Van Niekerk, J. 2013. From information security to cyber security. computers and security, 38, 97-102.
Yang, Y. P. O., Shieh, H. M., and Tzeng, G. H. 2013. A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Information Sciences, 232, 482-500.