Download SYD611S Special Assignment

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Program name: Bachelor of Business Management
Module: Sustainability and Development
Code: SYD611S
Name: Lineekelomwene Ndeulita Johannes
Student number: 220027137
Group: 4
Assignment: 1
Submission date: 17 May 2022
1|Page
Pitfalls and benefits associated with managing cyber security in the HEALTH SECTOR.
In the early days, “computer crime” was the term used to relate to the abuse of computer related
bias or data. During the same era, one of the first laws related to computer crime in the US was
accepted, therefore the use of computer systems without authorization from the primary user
was regarded as a crime, (Holt & Bossler, 2016). Current moment, as technology use patterns
changed and improved, crime experimenters referred to crimes committed using the internet
and or electronic bias, as cybercrimes. Therefore, the term cybercrime was espoused, and
criminological experimenters use it to relate to the technological type of felonies. Cybercrime is
also appertained to as the abuse of electronic bias or compromising network connections to steal
data from various users and or the misconduct or unethical use of electronic bias, whether it be
in the form of vilification, detest speech, misinformation, misrepresentation, or the act of
marketing and dealing illegal services or products electronically causing the individual to
purchase malicious software through the intentional purchase of a desired product or service to
mention a few. Therefore, in the moment’s world of rising political pressure, the need for cyber
security within organizations is pivotal, especially concerning cyberspace, as the need for data
protection is magnified by the position of improved technological advancement.
“Moment, computers, the Internet, and the wide range of mobile technologies have reshaped
ultramodern society”, (Holt & Bossler, 2016). “Therefore article twenty-one of the Namibian
constitution guarantees freedom of speech and expression, which therefore, includes freedom
of the press and alternative media”, (Nashilongo, 2021). Even though Namibia may not be a high
risk target for cyber attacks, the misunderstanding of composition 21 may lead to cyber crime
advancement, as cyber attackers may see the inconsistent cyber security loophole within the
Namibian industry, and use that as an opportunity to steal and demand monetary benefits
depending on the monetary value or level of confidentiality of the data being leaked. One can
be considered youths as digital natives since they were born and raised in a digital world, they
spend as much time if not more, interacting in the virtual world than in the physical one. Thus
technology changed youths’ actions, beliefs, and indeed traditions, including the way they view
the world. Youths can therefore be considered the main contributors to cyber related crimes, as
they're more educated and are apprehensive of the loopholes in technology, including the
benefits if cybercrime traces are covered properly. Likewise, handling cyber crime or being
apprehensive of its threats comes with the benefits of being cyber secure. Thus Namibian
organizations should create consistent awareness of the risks and benefits of managing cyber
security as in most cases cybercrime offenders get away unpunished since their tracks are usually
untraceable through the use of crypto-currencies.
2|Page
Feting the need for cyber security and seeing it as an integral part of organizational and national
security is salutary to the frugality and well-being of a nation or organization, especially in the
health sector. “One can observe married trials toward the creation of secure digital
surroundings, manifested by the development of cyber security strategies and the establishment
of national cyber security agencies around the world”, (CHRISTINA, MICHAIL, & ROBERTO, 2022).
Indeed, though there's advancement in cyber security strategies, cyber offenders will in utmost
cases always be one step ahead as they are advanced in terms of technicality and level of
education and usually use loopholes within digital network systems to get access to compromise
digital devices or networks. Therefore, the progress in cyber security exploration sweats should
evolve resembling the elaboration of technological advancement, as cyber security is a global
need as much as sustainability is a need. Humans have developed new ways of handling conflict
using cyberspace loophole strategies which can heavily damage the operations, and reputation,
of health organizations and other various organizations including the economy of the nation.
Therefore, the health sector or industry and other various industries’ investment in cyber security
will serve as prevention measures for engaging or being victims of cyber conflicts and or attacks.
There are colorful pitfalls associated with cybercrime within the health sector, from cybercrimes
similar to hacking, which is a term for unauthorized access of organizational computers and their
data, phishing, malicious software attacks, attacks against website vulnerabilities, malvertising,
MIMT attacks, as well as insider cyber pitfalls whereby an individual with authorization misuses
his/her power to commit cyber related felonies, whether for an individual or an association, they
independently bear the threat of experiencing cyber related attacks, although the public in
utmost cases considers hacking as a felonious offence that begets detriment to individualities or
organizations, the same hacking principles can be used to ensure digital or network security. Loss
of databases within the health sector can bear veritably pivotal damage to the character of an
organization and the government as well since past data helps them carry out their diurnal
operations, may it be personnel data or medical records, fiscal records from insured or noninsured cases. Even though cyber security is a need it comes with costs associated with the hiring
of skillful personnel and the purchase of advanced technology which are in most cases costly.
Most organizations use Microsoft windows operating software which is vulnerable to cyber
crime. An operation substantially targeting organizations in Singapore to steal sensitive
information was allegedly carried out by the Whitefly Espionage Group. The attacks exploited an
aged honor escalation vulnerability in Microsoft Windows. The excrescence lies in the Microsoft
Web Distributed Authoring and Versioning and affects Windows Vista to Windows 10. The
attackers used an unnamed open-source tool to exploit the excrescence, (Beek et al., 2019). With
the development of crypto-currencies, cyber attackers engage in cyber crime and use block
chained crypto addresses to transfer ransom from victims in crypto-currencies without solicitude
of being traced, making it easy to commit cyber crimes and go untraced. Committed conduct
3|Page
toward the establishment of a protected digital atmosphere and forestallment of cyber related
attacks within the health sector around the globe can be seen, as demonstrated by the expanding
styles of securing networks or computerized data, the mindfulness of cyber crimes, and the
founding of cyber security associations can be observed. Indeed, there's growth in the
mindfulness and education concerning cyber security, and associations are being established to
ensure minimum cyber crimes, regardless the health sector should under no circumstances say
they're safe from cyber related crimes.
“Numerous organizations rely on cryptographic keys and digital instruments to know what to
trust and what to not trust any time data is being transferred between users within organizations
or between users from different organizations, so securing their businesses”, (Moallem, 2019).
Even, though digital keys and instruments are being used as security, they are being stolen, and
individualities or associations target to gain access to them intending to misrepresent and steal
sensitive information from specific organizations mostly large, scaled types with valuable fortune
worth data. Given the fact that keys and instruments are extensively used as means of creating
an online identity, they're constantly under attack, therefore putting organizations and health
related organizations at great threat. The New York University of Abu Dhabi thus created a chip
considered un-hackable and is regarded as the first in the world, with the aim of combating cyber
crimes, while experimenters at the Design for Excellence lab developed a ‘logic-locked’ security
chip to cover bias from the swell in cyber attacks, secured by a secret key, that only permits
authorized users to use the device and it is therefore also resistant to reverse engineering”,
(CHRISTINA, MICHAIL, & ROBERTO, 2022, p. 10). The cyber security geography presents unique
challenges and improvements for combating cyber attacks. Thus the determination for creating
a safe digitalized atmosphere is frequently sensitive due to the same position of advancements
in cyber crimes.
With the change in methods of involvement in business related conflicts, cyber security is vital in
the present cyber crime arena. “The importance of cyber security research has thus been
recognized by many national governments”, (CHRISTINA, MICHAIL, & ROBERTO, 2022). Vision
2030 hereby recognizes cyber security as a strategic pillar outlined to promote a sustainable,
diversified, high value added developing economy including the development of a resilient
infrastructure capable of supporting the anticipated economic growth. Relating to the secure
realization of such a vision, New York University of Abu Dhabi’s Center for Cyber Security, pushes
frontiers concerning academic and industrial cyber security research, with a focus on hardware
security, wireless security, critical infrastructure security, trust, and privacy. An increase in cyber
crimes has caused the expansion of academia on cyber security related topics around the globe.
Thus, academic or cyber security research institutions in Namibia should also engage and
promote awareness through such research studies to help ensure cyber safety or security within
organizations not only within the country, as most if not all organizations depend on advanced
4|Page
technological machinery and connected computerized systems for day to day operations as used
everywhere around the globe which are at risk of data loss due to cybercrime.
The connectivity expansion across the globe offered by the Internet led organizations to digitalize
their financial and non-financial data, may it be confidential or non-confidential, including
substantial accessible databases. Business and non-business organizations including the health
services sector moved from traditional ways of business operations to online means of marketing
and offering their products and services directly to the comfort of computer users, by offering
the appropriate means of ethical business operations curtesy of the advancement and
technological evolution. Being cyber secured enable confidence within organizations, thus they
continue their daily operation without the worry of data loss by being victims of cyber related
criminal offences. Cyber security within the health industry will increase or improve the
confidence of consumers, as they won’t have to worry about their data including medical records
and personal information being leaked or being used as leverage to demand monetary benefits
from the offenders.
With the advancement in cyber security, one cannot predict to say the cyber-attack trend will
completely lose momentum but should have the thought of it gaining more momentum, as will
be of great use for being cyber secured within the health sector, thus the need for highly skilled
personnel in the IT or cyber security departments in every organization in order to be ahead of
offenders in terms of knowledge, skills, and technology, may it be through the use advance
technology in the cyberspace sector should be mandatory. In conclusion, cyber attacks should
be regarded as an ongoing developing crime so should cyber security. Therefore, educating
personnel within the organization about ways to ensure security within the cyberspace and how
to ensure authorization keys are always safe may it be by changing them on a regular basis or by
using un-hackable logic keys for their digital devices, the health sector should therefore always
be up to date with technological advancement, especially with the latest methods of combating
cyber attacks to protect their data including intellectual property.
5|Page
References
Beek, C., Dunton, T., Fokker, J., Grobman, S., Hux, T., Polzer, T., Lopez, M. R., Roccia, T.,
Saavedra-Morales, J., Samani, R., & Sherstobitof, R. (2019). McAfee Labs Threats Report:
December 2018. McAfee Labs Threats Report, 1, 1–41. https://doi.org/10.1016/s13613723(19)30004-1
CHRISTINA, P., MICHAIL, M., & ROBERTO, D. P. (2022). Cyber security research in the Arab region: a
blooming ecosystem with global ambitions. Communications of the ACM, 1-7.
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in Progress : Theory and Prevention of
Technology-enabled Offenses. Routledge.
https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1124309&site=edslive
Moallem, A. (2019). Human-Computer Interaction and Cybersecurity Handbook. Boca Raton:
CRC Press.
Nashilongo Gervasius. (2021). Namibia digital rights and inclusion. In Namibia Digital Rights and
Inclusion Report. https://paradigmhq.org/wp-content/uploads/2021/05/lr-NamibiaDigital-Rights-Inclusion-2020-Report.pdf
6|Page