The foremost determination of the paper is to focus on the cybersecurity issue of the Atlassian Corporation Plc which is based in Sydney, Australia having around 2738 employees all around Australia (Atlassian. 2018). The paper will be focussing on the importance and the limitations of the risk assessment for the cyber security issues in the organization. How the threats can impact the assets of the organization will be stated in the later unit of the paper (Gov.uk. 2018). The ranking of the threats based on their level of impact on the information assets of Atlassian will be discussed in final unit of the paper.
It is defined as the method by which the probable risks and hazard associated with an organization can be identified.
The different types of cyber security issues such as data breaches and cyber security threats such as the ransomeware can be prevent with the help of effective cyber security risk assessment which is done occasionally in any organization which deals with both structured and unstructured data.
The results of the risk assessment helps in identifying the steps which can be implemented in the organization such as the security awareness training among the employees of the organization, updating the patches of the operating systems of the systems used by the stakeholders of the organization, data asset inventory and continuous vulnerability assessment and traffic monitoring (Jokar, Arianpoo and Leung, 2016).
Considered as a single entity Information Asset is a unit full of knowledge. The information asset register is the most critical aspect of the information asset.
Identification of critical information assets can be understood by the following questions:
1 signifies lowest rank and 5 signifies highest rank for the following tables
Information asset |
Ranking of the assets |
Category of the asset |
Role of the asset |
Impact on revenue |
Impact on profitability |
Impact on public image |
Trademarks and Copyrights |
2 |
Intangible asset |
Authorization of the products |
5 |
5 |
3 |
Brand value |
1 |
Intangible asset |
Maintaining strong market relations. |
5 |
4 |
5 |
Servers and IS |
3 |
Tangible asset |
Efficient delivery of the products and services |
3 |
2 |
3 |
Infrastructure |
4 |
Tangible asset |
Efficient utilization of the human resources |
3 |
4 |
4 |
Table 1: WFA
(Source: Created by the author)
Threats |
Asset impacted |
Threat Agent |
Method of delivery |
Working Mechanism |
Source |
Infringement |
Trademarks and Copyrights |
Violators |
Sales of products |
Use of products and service provided by the company. |
“Keeping competitors away from your IP is not only your right but also your responsibility (Ipaustralia.gov.au2018).” |
Lack of interest |
Brand value |
Clients |
Products |
Finds alternative services. |
“Brand equity is the value that your brand brings to your company. You can measure it in a number of ways, such as the price premium you can charge over a no-name product, or long-term customer loyalty” |
Ransomeware |
Servers and IS |
Cyber Criminals |
Private network |
Data encapsulation |
“ransomware is a rising threat to businesses in Australia and abroad” |
Malware |
Servers and IS |
Cyber Criminals |
Private network |
Data Alteration |
“Malware is the most predominant cybercrime threat in Australia, according to (ACSC)” |
IS breakdown |
Infrastructure |
Internal Stakeholders |
Manual |
Human Resources |
“IS can affect production as well as loss of income and customer goodwill” |
Table 2: Details of the top 5 threats
Security concepts |
Security threat |
Incident |
Trend |
Threats |
Alteration of data |
Facebook Data Breach |
July 2017 |
Hazards |
Data alternation |
eBay Hazard |
May 2014 |
Attacks |
Alternation of personal information |
Target Stores |
December 2013 |
Incidents |
Threat to information |
Uber Incident |
November 2016 |
Table 3: Details of security concepts
(Source: Created by the author)
Figure 1: Details of security concepts
(Source: Created by the author)
Asset |
Infringement |
Lack of interest |
Loss of trust |
Ransomeware |
Malware |
Impact |
High |
Low |
Medium |
High |
High |
Level of threat |
2 |
3 |
4 |
5 |
4 |
Effect on the organizational business community |
4 |
2 |
2 |
5 |
5 |
Table 4: Level of impact on Atlassian Corporation Plc
(Source: Created by the author)
Considering the mentioned threats, it can be stated that the ransomeware threat will be having the highest impact on this asset as it is the only medium of communication and business purpose for all the internal as well as the external stakeholders of this ICT organization (Knowles et al., 2015). The mission and vision of the organization can be fully impacted by this threat.
Weakness of the Asset |
Confidentiality |
Integrity |
Association |
Server Issue |
3 |
5 |
2 |
Broken links |
4 |
2 |
1 |
Poor design |
3 |
4 |
4 |
Table 5: Weakness of the asset considering CIA
(Source: Created by the author)
Infringement have a least impact on official website where as lack of interest also have no significant impact. Loss of trust have a medium impact on the website where as the Ransomeware and Malware have the most significant impact on the selected asset of this organization (Komninos, Philippou and Pitsillides, 2014). Threats coming from the IS breakdown also have some impact on the selected website.
Conclusion
From the above paper, it can be concluded that the there are lots of security threats associated with the assets of the organization. The existing risk assessment methods of the selected organization along with its limitations is highlighted in the paper. All the threats on the growth of the corporation can be concluded from the paper. The paper also helps in concluding the level of impact of the threats associated with the chosen organization. The threats are ranked according to their level of impact on certain departments of the accounting organization such as profitability. The impact of the threats can also be concluded from the paper. The critical information assets of the organization has been discussed in the paper along with the threat to the information assets of the organization.
Reference
Atlassian. (2018). Atlassian | Software Development and Collaboration Tools. [online] Available at: https://www.atlassian.com/ [Accessed 6 Dec. 2018].
Baig, Z.A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K. and Syed, N., 2017. Future challenges for smart cities: Cyber-security and digital forensics. Digital Investigation, 22, pp.3-13.
Drias, Z., Serhrouchni, A. and Vogel, O., 2015, August. Analysis of cyber security for industrial control systems. In Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on (pp. 1-8). IEEE.
GOV.UK. (2018). Cyber Security Breaches Survey 2018. [online] Available at: https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2018 [Accessed 6 Dec. 2018].
Ipaustralia.gov.au. (2018). IP Infringement | IP Australia. [online] Available at: https://www.ipaustralia.gov.au/ip-infringement [Accessed 9 Dec. 2018].
Jokar, P., Arianpoo, N. and Leung, V.C., 2016. A survey on security issues in smart grids. Security and Communication Networks, 9(3), pp.262-273.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 9, pp.52-80.
Komninos, N., Philippou, E. and Pitsillides, A., 2014. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials, 16(4), pp.1933-1954.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download