Chapter 11: Information Governance, Privacy, And Security

Chapter 11 Information Governance And Privacy And Security Functions

Chapter 11 Information Governance And Privacy And Security Functions

Chapter 11 - Information Governance and Privacy and Security Functions Chapter 11 – According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.

Q1: From this research revelation in our chapter 11, briefly state, name and discuss the countries and organizations identified as the targeted victims and why they are targeted. What are your suggestions for improved privacy and security readiness? 1-2 Pages in APA format.

Paper For Above instruction

In 2011, the proliferation of cyberattacks highlighted significant vulnerabilities in global information security, with numerous high-profile organizations becoming victims. The targeted victims identified by Intel/McAfee included a diverse range of organizations, notably the United Nations, various government agencies, multinational corporations, and other large institutions across multiple countries. The United Nations was targeted due to its international influence and sensitive diplomatic information, making it an attractive target for cyber espionage and political hacking. Several governments, such as those of the United States, China, and Russia, were also targeted, often because of geopolitical interests, national security concerns, and intelligence gathering objectives.

Multinational corporations, especially those in critical sectors like finance, healthcare, and technology, were also targeted due to the valuable data they possessed. For example, private data, intellectual property, trade secrets, and financial information make these organizations appealing for cybercriminals and state-sponsored actors seeking economic advantage, strategic military intelligence, or to disrupt economic stability. The motivation behind these targeted attacks is multifaceted; they aim to steal intellectual property, advance geopolitical agendas, or destabilize particular sectors or countries.

The reasons these organizations are targeted are rooted in their strategic importance, the sensitivity of their data, and their influence within global systems. Governments and organizations with valuable intellectual property or sensitive diplomatic communications offer lucrative opportunities for cybercriminals seeking financial gain or strategic advantage. Furthermore, these high-profile targets often lack sufficient defenses against sophisticated cyber threats, making them vulnerable.

To enhance privacy and security readiness, organizations should adopt comprehensive cybersecurity strategies that include the implementation of layered security controls such as encryption, intrusion detection systems, and multi-factor authentication. Regular security assessments and vulnerability testing are essential to identify and mitigate potential weaknesses proactively. Additionally, organizations must prioritize employee training to increase awareness of security best practices, reduce the risk of social engineering attacks, and promote a security-conscious culture.

Developing incident response plans that are routinely tested ensures organizations can react swiftly and effectively to security breaches. Investment in advanced threat intelligence tools enables real-time detection of emerging cyber threats and targeted campaigns. Furthermore, international cooperation and information sharing between organizations and governments are crucial to combating global cyber threats effectively.

Lastly, adherence to international standards and best practices—such as the NIST Cybersecurity Framework—can provide structured guidance for developing resilient security architectures capable of withstanding evolving cyber threats. Overall, a proactive, layered security approach combined with continuous education and international collaboration is imperative to improving privacy and security readiness against targeted cyberattacks.

References

  • Lehto, M., & Lehto, X. (2014). Cybersecurity: Protecting modern organizations. Journal of Business & Technology, 34(2), 45-52.
  • National Institute of Standards and Technology. (2018). Framework for Improving Critical Infrastructure Cybersecurity. NIST.
  • Symantec. (2012). Internet Security Threat Report. Symantec Corporation.
  • Percoco, D. R., & Peisert, S. (2018). Strategic cybersecurity management. IEEE Security & Privacy, 16(2), 41-48.
  • Verizon. (2020). Data Breach Investigations Report. Verizon Communications.
  • McAfee. (2012). The Hidden Cost of Cyber Crime. Intel Security.
  • Choi, S., & Lee, K. (2017). Cyberattack patterns and prevention strategies for global organizations. International Journal of Information Security, 16(4), 321-335.
  • Nakashima, E. (2011). Global cyberattacks target UN, nations, companies. The Washington Post.
  • Cisco Systems. (2019). Annual Cybersecurity Report. Cisco.
  • He, W., & Wu, S. (2016). Cyber attack analysis and risk mitigation. Journal of Cybersecurity, 2(1), 98-105.