Business > CASE STUDY > Module_1_Writing_Assignment.docx Cyber security in Government Organizations Module 1 Wri (All)
Module_1_Writing_Assignment.docx Cyber security in Government Organizations Module 1 Writing Assignment Cybersecurity and privacy risks tend to overlap and require a special understanding of where ... these risks are coming from, in order to come up with an effective solution. Privacy breach risks is where it overlaps, and cybersecurity related privacy events occur. While cybersecurity risks are associated with cybersecurity incidents arising from loss of confidentiality, integrity, or availability (CIA). The privacy risks are associated with privacy events that occur from data processing. (O'Reilly, Rigopoulos, Feldman, Witte, 2020). Any government, business or organization that handles information or data about people, is a target for many different types of privacy threats. Some of these threats include the theft of personal data through identity theft (phishing), infection of computer systems by harmful programs in order to extort money (ransomware), and information leaks or remote control of devices (botnet). These attacks can have a major impact on any government, business or organization (NJCCIC, 2019). For example, they could have big economic losses and reputational damages, loss of competitiveness of the product or service from reputational damage, operation disruption, and/or legal ramifications caused by poor privacy management (Davis, 2020). Given the numerous types of threats NIST has come up with the Risk Management Framework (RMF) and the Privacy Framework. The Privacy Framework should includ. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]
Last updated: 3 years ago
Preview 1 out of 3 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jun 12, 2022
Number of pages
3
Written in
All
This document has been written for:
Uploaded
Jun 12, 2022
Downloads
0
Views
71
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·