Tuesday, May 5, 2020

ACS and the ICT Profession Report

Question: Write a report about the ACS and the ICT Profession. Answer: Data protection system in the communication strategy of the organization: This event is about the information and communication technology of the Australian Cyber Events 2015 (Pelton et al. 2015). This report is based on communication processes involved in everyday life such as file sharing process, email, chatting, voice message and video calls. It has been observed that the website of Kmart and David Jones was hacked and details of the customers were disclosed. Moreover, the unknown hackers hacked the profile of Aussie Farmers and posted the details of 5000 users online (Andress and Winterfeld 2013). It has been found that customers data has been stolen from the cloud storage of Aussie Travel but the organization had not informed the customers. As stated by Pelton et al. (2015), the Australian organizations has failed to maintain their responsibility to protect the data of their customers. It is understood that the organization has faced the privacy issues regarding data breach notification in the information commissioners (Andress and Winterfeld 2013). The reputation of the organization faced much damage to the media reporting of the incident. The Australian Federal Government has implemented the Critical Infrastructure Resilience Strategy in 2010. This strategy supports the security to the economic and social aspect to the organizations. The core communication system of the organization has been protected by the Australian Cyber Security Centre (ACSC) in 2013 (Andress and Winterfeld 2013). The Prime Minister and Cabinet has implemented a six months review and implemented the security system for short term stocks in the global market resulting in significant changes in the market dynamics. The government has implemented four different teams to provide Cyber Security. It has been observed that the NATO Cooperative Cyber Defense Centre has provided training on Cyber security System. The Tallinn Law (Rule 37 and Rule 38) has been implemented to protect the civilian and military information. Reference list: Andress, J. and Winterfeld, S., 2013.Cyber warfare: techniques, tactics and tools for security practitioners. Elsevier. Pelton, J.N., Singh, I. and Sitnikova, E., 2015. Cyber Threats, Extreme Solar Events and EMPs.Inside Homeland Security.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.