Wednesday, December 11, 2019

Information Security for Confidentiality- myassignmenthelp.com

Question: Discuss about theInformation Securityfor Privacy and Confidentiality. Answer: Introduction The information security had been developed for the analysis of the issues and errors in the operation of the organization (Mohurle Patil, 2017). The information security is a major factor for implying the effective processing of the system allegation. The implementation of the technology development would be very helpful for forming the effective system integration and development of the operations. The following report had been developed for implying the analysis of the scenario for forming the evaluation of the security breach, occurrence of data breach, and developing some possible mitigation strategies for the scenario. The integration of the development model would tend to form the effective analysis of the data breach and security errors. Issues in the Scenario of Data Breach at Medicare The scenario would exemplify the issue of data breach within the organization and it would result in occurrence of the data breach in Medicare. The Medicare data breach occurred when the operations of the data breach has been concerned with the confusing and disappointing system development (Theregister.co.uk, 2017). The Medicare data breach had occurred in forming the issues of the sharing of the data related to the medical health of the patients to others. The independent operations of the attack would tend to develop the exploitation of the critical and confidential information regarding the patients information. The scenario had seen the use of the technology for misusing the existing facilities and extract protected data from the system database of Medicare. The information processing would tend to cease the information processing in the organization. The implication of the security issues had resulted in forming the errors and issues of the implementation of the proper system i mplication. The private and confidential data of the Medicare were leaked by some who had access to the main database of the Medicare (Coombs, 2017). The scenario had shown the issue of unethical behaviour and unprofessional actions. Causes of Security Breach in Medicare The primary cause of the security breach was that the personal benefit of the person trying to gain from the sharing of the medical details of the patient of Medicare to outsiders (Baxendale et al., 2017). The person was trying to sell the details of the patients from the card number of the Medicare to anyone ready to pay enough. The seller used the logo of Australian Department of Human Services and the machine was named as Medicare machine. The autonomous operations of the assault would have a tendency to build up the abuse of the basic and secret data with respect to the patient's data. The data preparing would tend to stop the data handling in the association. The ramifications of the security issues had brought about framing the blunders and issues of the execution of the correct framework suggestion. Occurrence of Data Breach at Medicare As stated in Theregister.co.uk (2017), a person with the bone fide access to the information of the Medicare would tend to develop the effective processing of the operations. The person had endangered the privacy of the data of Medicare and made in available for other persons. The development of the issues had been resulted due to the implication of the unethical behaviour of the personal entity for the forming the personal benefit of the users. The data breach has been resulted due to the personal benefit of the users in harming the development of the operations. The person whose confidentiality of the Medicare data has been violated due to the infiltration of the data privacy had to face the unethical scenario of occurrence of the data breach. Possible Mitigation Strategies for Data Breach of Medicare The data breach had been resulted due to the advent of the unethical influence of the person for gaining personal benefit (Pascariu, Barbu Bacivarov, 2017). The mitigation of the issue can be implied for forming the effective development of the operations. The secured operations would be implemented by the involvement of the effective and improved system integration. The possible solution for the involvement of the ethnicity of the operations would be mitigated by the conveyance of the effective operational processing. The best solutions for the data breach are, Confidential User Limitation: The limitation of the data access to only one or two users would ensure that the data of the Medicare would be kept confidential. Moreover, the authentication of the access could be more secured if for the access of the file more than on user authentication is required. The implication of the more than one user authentication for access would limit the possibility of accessing the data for misuse. Follow Ethical Practices: The following of the ethical practices would be helpful for ensuring that the activities of the people accessing the data at Medicare are oblate and secured. The ethical practice would enable the users for monitoring the effective development of the operations for ensuring that system integration would be helpful for keeping the privacy of the data intact. Conclusion It can be concluded from the analysis of the scenario that the data breach is one of the major issues of the contemporary IT technology and the development of organization. The involvement of the operations would tend to improve those operational activities of the operation. The involvement of the system development would help in critical evaluation of the organization for system implication and improvement. The best solutions for the data breach are limitation of the data access to only one or two users and following of the ethical practices for ensuring that the activities of the people accessing the data at Medicare would be confidential and private. Part B: WannaCry Ransomware Cyber Attack Introduction WannaCry Ransomware is one of the most recent attacks of the IT world that had influenced the security and privacy of the data and information related to the computer operations (Mohurle Patil, 2017). The development of the operations would be helpful for considering the development of the operations. The WannaCry Ransomware was initiated by a group named Shadow Brokers that have a track record of themselves for harming the security of the information and forming the influence on the operations of the computer and network devices. The following report had covered the deployment of the effective and improved functionalities of system integration of the effective development facilities for influencing the involvement of the operations. The report would evaluate the WannaCry Ransomware attack and the struggle of NHS or National Health Society for controlling the negative impact on the operations of the IT and computer related devices. The attack would be analysed for providing some preventive measures for the WannaCry Ransomware as it would help in preventing any future agitation in the organization. Issues in the Scenario of WannaCry Ransomware Attack The scenario had shown the advent of the cyber and IT technology bullying in the organization due to the use of the effective processing and development (Collier, 2017). The malware attack of WannaCry Ransomware had resulted in forming the issue of the processing of the information. The malware attack had infected the online operations of the computer for processing the user request and queries. The group had causes the issues of cyber threat last year too by stealing a considerable amount of cache of cyber weapons. The National Security Agency had to face the issue of deploying the effective flow of operations. The implication of the WannaCry Ransomware attack was done for harming the flow of the operations of the computer devices. The deployment of the effective flow of operations would tend to form the issues in forming the effective flow of system operations (Pascariu, Barbu Bacivarov, 2017). The basic development of the operations would be resulted to form the inconvenient oper ations of the organization. The malware attack would be resulted in forming the inconvenient delay of operations. The National Security Agency needed to confront the issue of sending the compelling stream of operations. The ramifications of the WannaCry Ransomware assault was improved the situation hurting the stream of the operations of the PC gadgets (Mattei, 2017). The sending of the powerful stream of operations would tend to frame the issues in shaping the successful stream of framework operations. The essential advancement of the operations would be come about to shape the badly designed operations of the association. The malware assault would be brought about shaping the badly arranged postponement of operations. Affected Users from the WannaCry Ransomware Attack The affected users for the WannaCry Ransomware attack have included the whole of internet network processing (O'Gorman McDonald, 2012). The implementation of the effective processing would help in integrating the effective development of the operations. The affected users for the project are the improvement of the operations. The employment of the system development would help in forming the effective flow of operations. However, the WannaCry Ransomware attack had formed the threat for attacking the software by malicious infection that result in forming the issues in operations of the organization. Action of the WannaCry Ransomware Cyber Attack The cyber attack of WannaCry Ransomware attack included the deployment of the effective flow of operations that result in forming the issues in system development and supplementary operations. The attack of WannaCry Ransomware acts by corrupting the files and then demanding a sum of $300 valued cryptography Bitcoin and it would result in forming anxiety among the users (Martin, Kinross Hankin, 2017). The attackers have even added a stipulation that after a certain time the threat amount would be increased. The malware email was translated in 28 different languages and spread in the main Internet network. The attack had even locked the users out of their computer devices. Preventive Measures for the WannaCry Ransomware attack The probability of WannaCry Ransomware attack can be reduced by implementing the best solution by the implementation of the effective and smart security functions (O Dowd, 2017). The preventive measures include the use of effective processing and operations. The preventive measures of the WannaCry Ransomware attack are, Implementation of Updated Firewall Security: The implementation of the windows firewall and updating it with improved processes would tend to form the effective flow of operations. The updated firewall would help in controlling most of the activities of malware and virus access in the system. IDS/IPS implementation: The implementation of IDS/IPS would help in detecting any unknown and mischievous activities within the network. The network configuration would be eased by the deployment of the control strategies in the organization. The implementation factors are helpful for forming the control of operations. Conclusion It can be concluded from the report that the WannaCry Ransomware attack had been resulted due to the major flaw of operations of IT security. The implication of the security functions would tend to implement the effective flow of operations. The The preventive measures of the WannaCry Ransomware attack are Implementation of Updated Firewall Security and IDS/IPS implementation. The development of the operations would help in integrating the operations of the system and the development of the effective flow of operations in the system. References Mohurle, S., Patil, M.(2017). A brief study of Wannacry Threat: Ransomware Attack 2017.International Journal,8(5). Collier, R. (2017). NHS ransomware attack spreads worldwide. Pascariu, C., Barbu, I. D., Bacivarov, I. C.(2017) Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. Mattei, T. A. (2017). Privacy, Confidentiality, and Security of Health Care Information: Lessons from the Recent WannaCry Cyberattack.World Neurosurgery,104, 972-974. O'Gorman, G., McDonald, G. (2012).Ransomware: A growing menace. Symantec Corporation. Martin, G., Kinross, J., Hankin, C. (2017). Effective cybersecurity is fundamental to patient safety. ODowd, A. (2017). NHS patient data security is to be tightened after cyberattack. Theregister.co.uk. (2017).Medicare data leaks, but who was breached?. [online] Available at: https://www.theregister.co.uk/2017/07/04/medicare_data_leaks_but_who_was_breached/ Baxendale, R., Riordan, P., Baxendale, R. and Riordan, P. (2017).Cops called over Medicare breach. [online] Theaustralian.com.au. Available at: https://www.theaustralian.com.au/national-affairs/investigation-launched-into-medicare-data-breach/news-story/77f7b7f54253f973654284552601fa3a [Accessed 3 Sep. 2017]. Coombs, B. (2017).New Anthem data breach by contractor affects more than 18,000 enrollees. [online] CNBC. Available at: https://www.cnbc.com/2017/07/31/new-anthem-data-breach-by-contractor-affects-more-than-18000-enrollees.html [Accessed 3 Sep. 2017].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.