Wednesday, December 4, 2019

Challenges to Regulatory Enforcement and Compliance †Free Samples

Question: Discuss about the Challenges to Regulatory Enforcement and Compliance. Answer: Introduction Security and protection of confidentiality of data is essential for every organization. Implementation of a proper and effective information system can help in data protection and securing the privacy of the data. An effective information system is capable of detecting and preventing any threats to creep into the system that may be a cause of data loss and data theft. The information system of Victorian government is not secure enough and is currently experiencing the threat of data loss. The framework of Victorian protective data security gives direction to the Victorian State government for data protection. The information system of VIC is exposed to a number of risks that can be classified as deliberate and accidental threats along with the internal and external risks. Internal risks and accidental threats can be removed easily by undertaking proper actions. External risks and deliberate threats are however difficult to eliminate. Proper standard of data security is to be maintain ed by ensuring the security governance, information security, personal security and ICT security (Healey, 2016). Different security management framework can help the VIC government in detecting and eliminating the threats from the system. The report discusses the different threats associated with the information system of VIC government and draws a line between the risk and uncertainty about VIC. The report concludes with the recommendation of approaches, VIC government could consider in mitigating the associated risks. The above figure gives an insight of the risks associated with the Victorian government. The database used for storing data is highly exposed to the risk and vulnerability associated with the system. The active monitoring of the system is a foremost essential but is not that effective in case of VIC. The database is not actively monitored as illustrated in the diagram and hence the risk multiplies in case of database. The manual access of the system is another area of high vulnerability and this should be properly monitored in order to eliminate the risks of deliberate threats (Cardona et al., 2012). Cloud server and storage of data in server enables increasing benefits to the system but this is another area of high risk exposure. This is because, the cloud storage is prone to high risk and threats in form of data theft using unfair means, such as malware infection and so on (Behl Behl, 2012). Therefore, ensuring the data security of cloud server is foremost essential for Victorian government. Risk Management and Identification of Risk Exposure: High, Medium and Low The identified risks are to be analyzed according to their negative effects in order to manage it. The risks identified in the previous sections are further segregated into the areas of high, medium and low risk exposure in order to prioritize them in a proper risk management procedure (Haimes, 2015). The area of high risk definitely includes the storage of data in cloud storage. Proper and up to date security is essential for safeguarding the data stored in cloud storage. Cloud server is very vulnerable to external attacks and with the concepts of data mining and big data being prominent in todays world, it becomes utmost important to secure the data stores in cloud storage. Nothing is secure over internet and therefore, it is a foremost essential to secure the data stored over cloud server. Therefore, the data storage in cloud server can be categorized as the area of high-risk exposure. The area of medium risk exposure includes the absence of active monitoring of the database and risks associated with the file server of VIC government. This is categorized as the area of medium risk exposure because proper security measures can help in eliminating the risks associated with these risk areas (Bommer, Crowley Pinho, 2015). The manual access of data is although vulnerable to threat from insider, can be categorized as the area of low risk exposure. This is because, internal risk or threat from an insider is easier to detect and eliminate. Therefore, this risk has the lowest priority and can be ac upon in a strategic manner (Lam, 2014). The major risks associated with the information system of Victorian government include deliberate and accidental threats as well. These two threats have high risk exposure because of the negative effects it may lay upon the government. Elimination of these two risks with highest priority is essential for VIC government. The deliberate and the accidental threats associated with VIC are elaborated in the following paragraphs. Deliberate threat can be termed as intentional threat as an organization is exposed to this threat as a result of the ill intention of the attacker. The deliberate sabotaging of the information system by acts of malware infection, viruses and Trojan horses into the system with an intention of data theft and data modification can be termed as deliberate threats. These threats are infused upon the system intentionally and are therefore difficult to manage (Alcorn, Good Pain, 2013). This type of threat is more complex than accidental threat and therefore adequate measures are needed to be taken in order to eliminate this risk from the system. Deliberate risks are one of the major causes of risks due to uncertainty. The risks or threats that are not intended to or deliberately infused can be termed as accidental threats. This risk creeps in mainly due to the activity of a threat insider. This threat is termed as accidental threats as it is generally a result of the mistake of the employees and untrained staffs. Lack of knowledge about the information system and its management is one of the major causes of this risk and the risk is widespread in VIC government as well. The primary reason being the presence of untrained employees into the system (Man et al., 2013). The risk has however, has a very low priority as it can be effectively managed by the intervention of the organization and responding appropriately in culminating the threat. The two threats identified in the information system of VIC government includes deliberate and the accidental threats. On basis of the ill effect it may lay upon the system, these two risk are ranked as rank one and rank two. The deliberate risk is ranked in number one position as it includes the deliberate sabotaging of the information security by means of unfair practices such as hacking, malware infection, and phishing and so on. This risk is severe and therefore should be act upon as soon as possible. Since the priority of this risk is high, it allotted the number one rank, which suggests that this risk is needed to be eliminated from the system in no time. The accidental risk has a lower priority and therefore, is allotted the rank two. This is because, the ill effect of this risk is low. The main cause of this risk or threats includes lack of knowledge or negligence of the employees. Example of accidental threats includes erroneous data entry or not keeping the information system up to date. The severity of this risk is medium to low and hence can be act upon in due time. This risk can be identified or mitigated easily and therefore it is allocated the rank two. Security and Risk Management challenges faced by VIC government Risk is a result of uncertainty about a particular issue. There are different risks associated with the information system of Victorian government and therefore proper risk management strategy is essential for identifying and eliminating the risks from the system. two risk management methodologies are discussed in the following paragraphs, which are internal security risk management and external security risk management (Jouini, Rabai Aissa, 2014). Internal security risk management is one of the easiest risk management and mitigation approach that VIC government can make use of. The method of internal security risk management deals with the identification and elimination of risk by the organization. Generally, the higher level authorities with a proper discussion with the employees suggest an approach to mitigate or eliminate the risk after identifying it. This method of risk management is effective for less severe risks and is a cost effective solution for the organization as well. This is an effective method of the risk mitigation as well. This is because the employees and higher level authorities are engaged in this risk mitigation approach, who have a proper knowledge about the working of the organization and its every minute details (Poolsappasit, Dewri Ray, 2012). Therefore, this solution is time effective as well. However, the act of dishonest employees may result in yielding an improper result in risk mitigation and ca n result in failure of the entire process. This is another effective strategy of risk management and risk mitigation. In this approach, help of experienced security consultants are fetched in order to identify the problems associated with the system and its root cause. Different effective risk management tools and techniques are used by these external consultants in mitigation and elimination of the risk associated with the system. This generally provides a guaranteed risk mitigation solution for the organization and therefore can be effectively used by the Victorian government in identification and elimination of severe risks. This however involves a huge sum of capital investments. Furthermore, a proper communication channel and means of communication is needed to be established between the external consultant and the Victorian government in order to fetch effective solutions to the problem (Rakow, Heard Newell, 2015). Therefore, this an effective risk mitigation approach that Victorian government can consider. The chosen Strategy of Risk Mitigation Both the internal and external risk mitigation strategy will be helpful for the Victorian government in elimination of the risks associated with the system. The internal risk mitigation approach can help in eliminating the internal risks associated with the system. This is because the employees of the system generally have a detailed knowledge about the problems associated with the system and therefore can help in mitigating them. The major security risks, which include the deliberate threats and threat from an outsider, would however need the involvement of a security expert in identifying the root cause of the problems and in suggestion of the solutions in mitigating them. Therefore, Victorian government needs to run both internal and external risk management strategies and approaches in eliminating the associated risks in the system. There is a thin line between the concept of risk and uncertainty, which is needed to be identified in order to strategically act upon them. The detailed description of the risk and uncertainty associated with the VIC government are elaborated in the following paragraphs (Guerron-Quintana, 2012). Risk is a situation that involves a probable danger. It can be defined as the probability of the damage an organization might face due to the involvement of certain threats and vulnerabilities. An organization is generally exposed to a risk due to the act or involvement of certain internal as well as external threats and vulnerabilities (Silbey, 2013). The major risk associated with VIC is related to the information system of the government. It is not strong enough to eliminate the data theft and security attacks that might be a cause of different threats and vulnerabilities. The Victorian government is severely exposed to both internal and external attacks. Risks can however be managed with the involvement of proper risk mitigation approaches. Risk can be managed by proper strategic means (Rasmussen, 2013). Uncertainty is more severe than risk as it cannot be determined or managed. The unmanageable risks or outcomes can be termed as uncertainty. This is more severe than risk as the its effect is not certain. The uncertainties linked with the VIC government are the lack of proper and effective decision-making (Covello et al., 2013). The insufficient knowledge of the employees regarding the information system of the VIC government gives rise to the uncertainty associated with the VIC. Uncertainty cannot be controlled or mitigated an therefore it is more dangerous than risk (Toma, Chiri ?arpe, 2012). Risk Control and Mitigation Approaches Proper risk mitigation approaches are necessary to eliminate the different risks associated with the system. Proper risk mitigation strategies can help in eliminating all the internal and external risks associated with the Victorian government. Quantitative risk mitigation approach can help in estimating the probable causes and effect of the risks, which may ultimately help in risk mitigation (Creswell, 2013). Furthermore, dealing with the risk strategically is more important to estimate the probable damage it may lay upon the information system. The probability and the impact of the risk should be evaluated of basis of the identified risks before the application of risk mitigation strategies (Maxwell, 2012). The different risk mitigation approaches are elaborated below- 1) Risk Avoidance: This is an effective and an expensive risk mitigation approach. This avoids any type of risk in creeping into the system and therefore requires active monitoring of the system 2) Risk limitation is another strategy that can be undertaken by the Victorian government in eliminating the possibility of new risk creeping into the system. This is the most common strategy employed by different organization as an effective means of risk mitigation (McNeil, Frey Embrechts, 2015). Proper intrusion detection system and the use of firewalls in the information system can help in Risk limitation. 3) Risk transfer is another risk mitigation approach that can be undertaken by the VIC government. It deals with the transfer of risk to a third party who is willing to take the charge of the risk. This needs a lot of capital investment and is an expensive risk mitigation approaches. The above discussed risk mitigation approaches can be undertaken by the Victorian government in order to eliminate all the possible risks associated with the information system of the government. Conclusion Therefore, from the above discussion, it can be concluded that the information system of the Victorian government is exposed to a number of security risks and concerns that should be considered by the organization with a highest priority. The report identifies the different risks associated with the information system of the Victorian government and classifies them on basis of high, medium and low risk areas. The report further distinguishes between the risk and uncertainty according to the severity of their effect in the organization. Risk is less severe than uncertainty as it can be easily controlled and mitigated. The different threats associated with the system are further classified as threat from insider and outsider. Deliberate threat or threat from outsider is more severe as it is difficult to detect and eliminate. The report further discusses the different strategies that VIC can undertake in controlling the risk. The report concludes with the different recommended risk miti gation strategies and approaches that Victorian government can consider. References Alcorn, A.M., Good, J. and Pain, H., (2013, July). Deliberate system-side errors as a potential pedagogic strategy for exploratory virtual learning environments. InInternational Conference on Artificial Intelligence in Education(pp. 483-492). Springer Berlin Heidelberg Ali, E., Denis, A. F., Kujur, F. E., Chaudhary, M. (2014). Risk Management Strategies for Accidental Risk Occurrence on Construction SitesA Case Study of Allahabad.Journal of Academia and Industrial Research (JAIR),3(2), 89. Behl, A., Behl, K. (2012, October). An analysis of cloud computing security issues. In Information and Communication Technologies (WICT), 2012 World Congress on (pp. 109-114). IEEE. Bommer, J. J., Crowley, H., Pinho, R. (2015). A risk-mitigation approach to the management of induced seismicity.Journal of Seismology,19(2), 623-646. Cardona, O. D., van Aalst, M. K., Birkmann, J., Fordham, M., McGregor, G., Mechler, R. (2012). Determinants of risk: exposure and vulnerability. Covello, V. T., Lave, L. B., Moghissi, A. A., Uppuluri, V. R. R. (Eds.). (2013).Uncertainty in risk assessment, risk management, and decision making(Vol. 4). Springer Science Business Media. Creswell, J. W. (2013). Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. Guerron-Quintana, P. (2012). Risk and uncertainty.Business Review, (Q1), 9-18. Haimes, Y. Y. (2015). Risk modeling, assessment, and management. John Wiley Sons. Healey, A. N. (2016). The insider threat to nuclear safety and security.Security Journal,29(1), 23-38. Jouini, M., Rabai, L. B. A., Aissa, A. B. (2014). Classification of security threats in information systems.Procedia Computer Science,32, 489-496. Lam, J. (2014).Enterprise risk management: from incentives to controls. John Wiley Sons. Mans, R. S., van der Aalst, W. M., Vanwersch, R. J., Moleman, A. J. (2013). Process mining in healthcare: Data challenges when answering frequently posed questions. InProcess Support and Knowledge Representation in Health Care(pp. 140-153). Springer Berlin Heidelberg. Maxwell, J. A. (2012). Qualitative research design: An interactive approach (Vol. 41). Sage publications. McNeil, A. J., Frey, R., Embrechts, P. (2015).Quantitative risk management: Concepts, techniques and tools. Princeton university press. Poolsappasit, N., Dewri, R., Ray, I. (2012). Dynamic security risk management using bayesian attack graphs. IEEE Transactions on Dependable and Secure Computing, 9(1), 61-74. Rakow, T., Heard, C. L., Newell, B. R. (2015). Meeting Three Challenges in Risk Communication Phenomena, Numbers, and Emotions.Policy Insights from the Behavioral and Brain Sciences,2(1), 147-156. Rasmussen, S. (2013). Risk and uncertainty. InProduction Economics(pp. 163-180). Springer Berlin Heidelberg. Silbey, S. S. (2013). Organizational Challenges to Regulatory Enforcement and Compliance A New Common Sense about Regulation.The Annals of the American Academy of Political and Social Science,649(1), 6-20. Toma, S. V., Chiri, M., ?arpe, D. (2012). Risk and uncertainty.Procedia Economics and Finance,3, 975-980.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.