Journal of Information Systems and Technology Management Journal of Information Systems and Technology Management – Jistem USP Vol. 14, No. 3, Sep/Dec., 2017 pp. 385–400 ISSN online: XXXXXXXXXX DOI:...

1 answer below »

View more »
Answered Same DaySep 11, 2021MGT5ERMLa Trobe University

Answer To: Journal of Information Systems and Technology Management Journal of Information Systems and...

Parul answered on Sep 14 2021
169 Votes
Journal Article Review
Journal Article Review
Individual Assignment
Synopsis
As we live in a world where life without Computers and Internet is unthinkable and breathe in the networks of interconnection, privacy to information, security of the devices and shielding from any malware attack is considered to be of paramount importance. There is a substantial advancement in the complexity of the products involved like physical hardware’s, software, combination of hardware and softw
are that is called firmware and several systems that is involved in public and private sectors. With the proliferation of interconnected and the expansion of internet of things, security has become a major concern since it has the capacity to harm millions of people (Aitel, D., 2013). With the rational of Cybersecurity that safeguards the information that is shared over the internet. The protection of data and information against any unauthorized disclosure, sharing of information, any kind of modifications. Cybersecurity is essential since it protects the data from its misuse and any kind of theft and safeguard from any viruses. Prevention of exposure of any system, program, software and critical infrastructure or their ability to resist unwanted interference forms the central part of Cybersecurity. Essentially, it ensures security of information, disaster recovery of any technology disaster and screen privacy with a mission to protect assets and working operations. A more defined and holistic approach to cybersecurity can be addressed by taking into the consideration two critical construct – Risk Governance and Management.
Organization Background
Provisioning of Energy, deemed as a fundamental service as well as a critical element for upgradation of standard and quality of life for the population, embracing the social involvement and contributing to the sustainable development. Since there is constant increase in demand of energy and consumption of energy is also increasing at an exponential rate, as it is quite vivid for the energy provisioning sector all across the world. (Gellings, 2009). Most of the technologies been utilized by the energy sector is largely made and developed in the era of 1940’s and 50’s and there has been no evolution precisely in the Technology, that leads to saturation of the system. Hence, there are significant steps taken in order to make advancement in the energy sector that can help in mitigating the risk of outage of power. Therefore, implementation of smart grids aims at making the present electric grids more robust, secure, efficient and reliable in the future. The smart grid constitutes of advance level of digital electronics, information and technology control to enhance reliability, safety, efficiency along with being effective to the grid. Anatomy of smart grids are such that security is called as critical infrastructure which in traditional physical and working operational layers advances simple security which were present before in the security grid (Sorebo, G., Echols, M., 2012). For the purpose of this study we have taken into the consideration a system of grid for transmission and distribution with the application of sensing remotely, ensuring the communication is bidirectional and controls that is distributed in the provisioning of energy. The system of controls in the electric grids collaborates information and technologies which assists to screen the complete energy supply chain that is from production, transmission, segregation for distribution and consumption. Furthermore, identification and one-to-one mapping of the interactions amongst different stakeholders can be essential in comprehending the roles and responsibilities of all the stakeholders (Cebula, J. J., & Young, L. R., 2010). There are three components to elaborate the dynamics of connections with respect to organization and environment – the network of inter-organizational networks, any interactions with other stakeholders like employees, liquid capital, working capital, knowledge collaboration etc.
Cyber Environment for Energy Organization consists of collection of information and communication of Technology infrastructure (ICT) which further encompasses Internet, Telecommunication, System and networks of controls, sensors that are embedded, processors and controllers. Hence, two major components – Communication Layer that supports Data on the systems of control and the actual processes that are managed physically
Figure 1. The cyber environment in the Organizational Context
· Virus - It is a set of instruction that once loaded on your system would corrupt all the data and harm the hardware and software
· Hacker - A person who gains unwanted access to the computer by gaining the administrative controls and invades the data without permission
· Malware - It is a software that...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30