Answer To: QUT SCIENCE AND ENGINEERING FACULTY IFN511 Security Management Semester 1 2019 Assessment Item 1:...
Kuldeep answered on Apr 28 2021
Espionage
Topic: Addressing industrial espionage
Student Name:
University Name:
Date:
Contents
Introduction 3
Discussion 3
Description of hypothetical organisation 3
Discussion of security issues 4
Conclusion 7
Recommendations 8
Information security controls: 8
References 12
Introduction
In a highly competitive or global business environment, independent intellectual property as well as financial information is considered to be the most expensive commodities in all countries, especially advanced commodities. Healthcare industry involvement in the espionage for function of illegal or secret access to sensitive economic, trade and economic policy data, sensitive/proprietary financial information; or key technologies included however not restricted to plans, data, tools, compounds , mechanisms, design, process, formula, program, code and business strategy, whether intangible or tangible, to gain a competitive business benefit. The proprietary data so stolen might have been store, memorialized or compiled physically, graphically, photographically, electronically, or in writing as well as might be protected reasonably by owner or not available to common public.
Discussion
Description of hypothetical organization
Canberra Hospital is the largest public hospital in our region. Canberra Hospital provides care to more than 500,000 people through a range of services, including acute hospitalization and day services, outpatient services, women's and children's services, pediatrics and pathology. Canberra Hospital is a public hospital located in Garran, Canberra, Australia's capital Territory. This is a three-level center with 672 beds and can accommodate approximately 550,000 people. It is the main teaching hospital of the Australian National University School of Medicine. It is also a teaching hospital for the University Of Canberra School Of Nursing ("Canberra Hospital | Health", 2019). In addition, the hospital has close links with the John Curtin School of Medical Research. The hospital is also the main regional centre for clinical animal husbandry education, working with the Sydney Theological Seminary and the New South Wales School of Clinical and Pastoral Education to provide courses through the Canberra and Regional Mental Care and Clinical Pastor Education Centres. Canberra Hospital currently has almost 300 employees ("Canberra Hospital | Health", 2019).
As the healthcare industry shifts from paper records to electronic records, the medical industry has relied heavily on information technology and the Internet. Healthcare information systems must provide high-quality services to patients through patient data and provide efficient knowledge sharing for healthcare professionals. With the widespread use of the Internet in hospitals, the medical industry has gained its share of cyber threats from other industries around the world. The challenge is to transfer knowledge to hospital staff while ensuring compliance with safety regulations.
Discussion of security issues
Theft or illegal receipt of the economic information and intellectual property, especially by foreign governments and competitors, threatens the growth and production of the goods generated by such information, as well as leads to losses in profits, company and foreign governments itself, which may lead to a weakening of a country’s Economic strength. Because of Canberra Hospital data-driven environment, hospital tends to face threats seriously, moreover in the process of seeking power, maintaining control, and hence there is a need to address industrial espionage both externally and internally support espionage and treat. It is free to participate in espionage, utilizing technology and information as an armament for economic and business warfare (Zemplinerova, 2013).
Industrial espionage processes can be separated into four categories: evaluation, collection, analysis and requirements. First, the needs must be establish. It's the goal of a person and it is almost certain to provide particular information about a particular job and work in a business and organization. In most cases, a third party asks for protection from liability on the investigation, organization or company. Many companies focus their espionage on specific activities or tasks only. The second stage allows collector to focus. The compilation of industrial espionage is a key component. This is an important aspect of making payments and the biggest risk involved. These individuals are required to assess the risks associated with obtaining information or data, as well as the value of the fees they have and the risks associated with them (Aisen & Veiga, 2011). You can use any of the following methods to get the information / data needed by the person who collects / receives information: Physical information, electronic attacks and attacking employees to obtain necessary information. If the prize is such a great (final), they will get any length required for information if necessary. If the request is an active copy of the product of the company, the collector needs to leave only one...