In this report, the case study of Deltex will be discussed. The organization, that is, Deltex serves in the food technology and manufacturing business. They produce various kinds of machinery which are used in restaurants which helps in reducing the cooking time (Ellis and Mohan 2019). Due to the huge success of their new technology, their product is being used in various other restaurants that situated in the overseas. However, after analysis it has been found that, the cyber security aspects of the organization are quiet low. It has been found that, the organization is using the cyber security technologies in order to protect the organization from various cyber security threats and attacks. However, the top management level, does not have a clear concept as to why millions of dollars is being spent behind the cyber security model and framework of the organization.
The report will first discuss about the importance of cyber security governance and how it helps the organization, Deltex, to improve their cyber security models (von Solms and von Solms 2018). Furthermore, the report will also discuss about the various security management model, which can be used in order to protect the sensitive information that are stored in the server of the organization. Adding to that, the report will also discuss the impact of various organizational cultural elements on the security objective of the organization, that is, Deltex. Along with that, the report will also help in understanding the benefit of develop security policies for the organization, that is, Deltex (Pernice 2018). Lastly, the report will provide suggestive approaches for policy compliance for the organization.
Within the current era, most of the organizations around the world are conveying or utilizing data framework and information technology in arrange to supply the significant administrations and operations to their conclusion – clients. Along with that, the information systems which are being used within the organization requires the sensitive data and information from the end – users in order to function properly (Calcara and Marchetti 2021). These information and data are considered to be organizational resources. Due to this reason, there has too been a sudden surge of cyber security dangers and assaults towards different organization around the world. This is the reason, cyber security governance is required within the organization, that is, Deltex. With the help of cyber security governance, the organization would be able to implement various kinds of information security policies, which will help in protecting the assets of the organization.
With the help of information security policies, the organization would be able to implement various cyber security components within the information system of the organization. It contains the rules and regulations which the prevents the employees from clicking on malicious links which are present within the emails (Maleh et al. 2021). Cyber criminals use a method, which is known as, phishing attack. In this kind of attack, the cyber criminals post a malicious link into the email. The email is then sent to all the employees of the organization. After that, the once the employees click on the link, they are redirected to a website, which asks them to enter the sensitive information in order to get a lucrative offer. When the employees submit the credential details, it directly gets sent to the hackers and intruders. Using the credentials of the employee, the cyber criminals then logs in into the network of the organization and then collect all the information and data that are stored in storage space of the organization. With the help of cyber security governance, a phishing filter can be installed on the email server of the organization (Eugen and Petru? 2018). This will help in blocking all the phishing emails that are being sent to the organization.
The security management model contains various components which are deployed within the organization in order to enhance the cyber security framework and regulations that are being adhered within the organization (Ponnusamy, Selvam and Rafique 2020). This further helps the organization in protecting the sensitive information which are being stored within the storage space of the organization. With the help of the security management model, the organization, that is, Deltex, would be able to provide appropriate level of security to all the information. Along with that, the organization would also be able to enhance their defence mechanisms against the various kinds of cyber security threats and attacks that are launched against an organization (Schinagl and Shahim 2020). It has been found that, often due to the cyber security attacks launched towards an organization, incurs huge financial loss. Thus, with the help of appropriate security management model, the organization, that is, Deltex, would be able to reduce the financial loss, which are caused due to cyber security threats and attacks.
The components of the models which are required in context of Deltex are –
Currently, the organization, that is, Deltex, is focussing on the sale of their product and services to their end – users. Along with that, it has also been found that, the upper management level is questioning about the budget which has been granted for the cyber security upliftment of the organization (Al-Sartawi 2020). The upper management level has asked, why million dollars is being spent on the cyber security component of the organization, when the cyber security department does not provide any kind of return of sale. However, the changes had to be made into the organization, as with the evolution of information technology, the clients are demanding cyber security components for the products (Chotimah 2019). One of the clients have also asked for block chain technology, for the security product, as it will help the client to protect their business trade secrets from getting leaked due to a cyber security incident. In order to change the culture, various information security policies and regulations need to be implemented within the organization itself. This information policy will also be explained to all the employees and individuals who are currently present within the organization (Webb and Hume 2018). They would need to adhere to the information security policies. Training and sessions will be provided to the employees and individuals, which will help them in understanding the importance of cyber security rules and guidelines.
One of the benefits of developing a security policy is that, the confidentiality, integrity and availability of the data and information can be maintained. Through security policies, the data and information can be sent to the correct receiver. Along with that, the integrity of the data can also be maintained (Orji 2018). This means that, the content of data and information would not be changed when it is being sent through the organizational network. Adding to that, the security policies also help in making the data and information available when it is required by the end – user. Security policies also helps the organization from minimising the impact of the risks which are present within the business process of the organization (Huang et al. 2022). Lastly, with the help of the security policies, the organization, that is, Deltex, would be able to maintain the regulatory compliance, stated by the cyber security governing body.
Below are the policy statements –
The suggestive approaches which are require for policy compliance and comprehension are –
Conclusion
In order to conclude, in this report, the importance of cyber security governance has been discussed. It has been found that, the organization is spending a good money on the cyber security framework of the organization, however, the employees and individuals are not adhering to all the rules and regulation. Furthermore, the report has also discussed about the benefits of appropriate security management model. Along with that, the report has also discussed about the various components which are important for Deltex. Furthermore, the report has also explained the impact of organizational cultural elements on the security policies of the information security. Adding to that, the report has also explained about the various benefits which are involved with developing a security policy. Lastly, the report provides various suggestions which are required for the employees to adhere to the information security policies and guidelines.
References
Al-Sartawi, A.M.M., 2020. Information technology governance and cybersecurity at the board level. International Journal of Critical Infrastructures, 16(2), pp.150-161.
Calcara, A. and Marchetti, R., 2021. State-industry relations and cybersecurity governance in Europe. Review of International Political Economy, pp.1-26.
Calderaro, A. and Craig, A.J., 2020. Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building. Third World Quarterly, 41(6), pp.917-938.
Chotimah, H.C., 2019. Tata Kelola Keamanan Siber dan Diplomasi Siber Indonesia di Bawah Kelembagaan Badan Siber dan Sandi Negara [Cyber Security Governance and Indonesian Cyber Diplomacy by National Cyber and Encryption Agency]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri dan Hubungan Internasional, 10(2), pp.113-128.
Ellis, R. and Mohan, V. eds., 2019. Rewired: cybersecurity governance. John Wiley & Sons.
Eugen, P. and Petru?, D., 2018. Exploring the new era of cybersecurity governance. Ovidius University Annals, Economic Sciences Series, 18(1), pp.358-363.
Huang, K., Madnick, S., Zhang, F. and Siegel, M., 2022. Varieties of public–private co-governance on cybersecurity within the digital trade: implications from Huawei’s 5G. Journal of Chinese Governance, 7(1), pp.81-110.
Kim, D.K. and Kim, S.Y., 2021. Reframing South Korea’s National Cybersecurity Governance System in Critical Information Infrastructure. Korean journal of defense analysis, 33(4), pp.689-713.
Maleh, Y., Sahid, A., Alazab, M. and Belaissaoui, M., 2021. IT Governance and Information Security: Guides, Standards, and Frameworks. CRC Press.
Orji, U.J., 2018. The African Union Convention on Cybersecurity: A Regional Response Towards Cyber Stability?. Masaryk University Journal of Law and Technology, 12(2), pp.91-129.
Pernice, I., 2018. Global cybersecurity governance: A constitutionalist analysis. Global Constitutionalism, 7(1), pp.112-141
Ponnusamy, V., Selvam, L.M.P. and Rafique, K., 2020. Cybersecurity governance on social engineering awareness. In Employing Recent Technologies for Improved Digital Governance (pp. 210-236). IGI Global.
Renaud, K., Von Solms, B. and Von Solms, R., 2019. How does intellectual capital align with cyber security?. Journal of Intellectual Capital.
Schinagl, S. and Shahim, A., 2020. What do we know about information security governance?“From the basement to the boardroom”: towards digital security governance. Information & Computer Security.
von Solms, B. and von Solms, R., 2018. Cybersecurity and information security–what goes where?. Information & Computer Security.
Webb, J. and Hume, D., 2018, March. Campus IoT collaboration and governance using the NIST cybersecurity framework. In Living in the Internet of Things: Cybersecurity of the IoT-2018 (pp. 1-7). IET.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download