$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Information Security Assessment

tag 0 Download6 Pages / 1,429 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


Discuss about the Information Security Assessment.



Information security incident assessment

Being of a managerial post in the XYZ organization, it is my foremost duty to follow all the regulation formed by the organization and secure the company from arriving threats; which can harm the company’s profile in the market. One such incident which deflated the positive growth of the country and also impacted on my individual performance in the organization is the cyber-crime. In today’s world cyber-crime is efficiently growing most of the companies use the information technology in storing and retrieving the critical information of the information. Resulting to which many risks are connected with using the new innovative technology (Aggarwal, Arora, & Ghai 2014).

Especially in e-commerce trading business, the majority of the work is done on the websites and portal, due to which the cyber-crime risk increases. In my XYZ organization, the information of the customers, their order details, and transaction receipts are stored on the website only whereas the price sensitive information, related to the products and services which shall not be leaked to the customers are also stored on the portal online. Thus it is easily known that any change in the online security system can result in a huge loss for the organization along with defamation of the company as well (Rotich, et. al., 2014).

The incident which took place in the organization is that; the official website of the company was somehow hacked by some unethical hacker. Through this cyber-crime, the hacker succeeded in retrieving the information of the customers of the company and all other price sensitive information which were required by the company in managing the business activities. The hacker took all the personal information records of the visitors and customers of the company (like postal address, payment details, password, user Id etc.). The stored credentials on the website were also hacked and the hacker gain access to the data of the company. Also, the information about the products and services posted on the website were also tampered and theft, resulting in confusion for the customer to make transaction with the company. The major crime which the hacker made was that they changed the bank account details of the company with theirs. Resulting to which, all the transactions and its receipts were made to the account of the hacker not the company (Ablon, Libicki, & Golay 2014).

With this effect, the company suffered major loss of income, data of company and also the customers of the company also became dissatisfied due to this effect. Many customers were made fake call due to leakage of price sensitive information. On my part being a manager, it became very difficult to address the problems of the customers along with analyzing the person liable for the crime. The customer growth decreased resulting in loss for the company, along with which the employee turnover also increased; as the employee felt that they might get trapped in the attack. The company was attracted by many problems at the same time due to which the financial statement of the company got affected. Being a manager of the company I was held responsible for the devaluation of the financial statements of the company. Furthermore, the hacker behind the attack was also not identified. I was held accountable for the cyber-crime and deviations in the management system (Ali, et., 2016).

The XYZ Company was in a state of crisis where all the customers and employees were leaving the organization. Along with which the company was liable to several penalties. Besides this, the hacker behind the issue was still unknown. The company needed to compensate for the problems of its customers along with which it was also accountable to its stakeholders for the devaluation of financial statement and defamation of the image of the company (Williams, & Levi 2017).


Incident Strategy

To cope up with the situation of cyber-crime, the company along with employees took the following steps responsibly:

  • In order to assess the hacker liable behind the attack, the company asked the Australian Cybercrime Online Reporting Network (ACORN) to scrutinize the case and take corrective actions (An Australian Government initiative 2017).
  • As a responsible manager, I ensured the customers to redress their issues and compensate them for the glitches through which they had gone through. Along with which I initiated a cyber-training program for the employees in order to make them capable to address the issue and deal with the issue efficiently.
  • For managing the interest of stakeholders, the company initiated meetings to make them understand about the critical situation of the organization.
  • Also, the main purpose of the issue, that is technical appliances were properly taken care of. The employees of the company made sure to amend changes in the organizations so that there is no space for cyber-crime next time (Ali, et. al., 2016).
  • Also the price sensitive information and the customer traction details were now encrypted with a code so that privacy is maintained and no personal information of the customer is revealed without their information.
  • One of the major reason which was left forgotten during the whole issue is the outsourcing company which aids the company in continuing its activities. The most of the important information of the company were also transferred to the outsourcing company to manage the actions of the company from their end. But there was a possibility of cyber-crime from their end, so the company took the initiative to inspect the outsourcing company and its employees as well. Further, the process of passing on the information to the outsourcing company is now done my surveillance
  • Also notice was issued to all the customer and visitors of the company to change their id password and secure it with access code so that no personal information is leaked in public without their permission (McGregor 2014).
  • I appointed qualified software designers to manage the activities of the company and develop new and efficient database which shall secure the data of the company and is typical for the hackers to hack.
  • A preventive action plan was formed analyzing the crisis faced by the company along with concerning ethical and technical issues; which the company shall comply. This action plan would be followed by all. The plan would also scrutinize the activities of the employees as well.
  • A framework and procedure shall be defined on the website as well discussion the issue so that the employees shall also be aware of the cyber-crime activities. Further, the cyber ethics compliance certificate shall also be posted on the web page so that all the government regulations are also complied (Parliament of Australia 2017).


Concluding to the above report, the XYZ company face the cyber-crime due to which all the financial and price sensitive information of the company and its customers was theft and misused. Further the company took preventive actions to cope up with the situation and manage to keep the interest of stakeholders in the business only. Thus, the company initiates strict action plan under the surveillance of manager so that the company doesn’t face the cyber-crime crisis again. Also, all the legal and governance regulations complied in order to avoid penalties.



Ablon, L., Libicki, M.C. & Golay, A.A., 2014. Markets for cybercrime tools and stolen data: Hackers' bazaar. Rand Corporation.

Aggarwal, P., Arora, P. & Ghai, R., 2014. Review on cyber crime and security. International Journal of Research in Engineering and Applied Sciences, 2(1), pp.48-51.

Ali, N.I., Samsuri, S., Sadry, M., Brohi, I.A. & Shah, A., 2016, November. Online Shopping Satisfaction in Malaysia: A Framework for Security, Trust and Cybercrime. In Information and Communication Technology for The Muslim World (ICT4M), 2016 6th International Conference on (pp. 194-198). IEEE.

An Australian Government initiative, 2017, ACORN, viewed on august 4, 2017 from

McGregor, J., 2014, The Top 5 Most Brutal Cyber Attacks Of 2014 So Far, viewed on august 4, 2017 from

Morris, C., 2016, Digital warfare heats up, viewed on august 4, 2017 from

Parliament of Australia, 2017, House of Representative Committees, viewed on august 4, 2017 from

Rotich, E.K., Metto, S.K., Siele, L. & Muketha, G.M., 2014. A Survey on Cybercrime Perpetration and Prevention: A Review and Model for Cybercrime Prevention. European Journal of Science and Engineering, 2(1), pp.13-28.

Williams, M.L. & Levi, M., 2017. Cybercrime prevention. Handbook of Crime Prevention and Community Safety, p.454.


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Information Security Assessment. Retrieved from

"Information Security Assessment." My Assignment Help, 2019,

My Assignment Help (2019) Information Security Assessment [Online]. Available from:
[Accessed 26 May 2020].

My Assignment Help. 'Information Security Assessment' (My Assignment Help, 2019) <> accessed 26 May 2020.

My Assignment Help. Information Security Assessment [Internet]. My Assignment Help. 2019 [cited 26 May 2020]. Available from: is one of the noted service providers that deliver essay help. We provide tailored essay assistance to make sure that student gets online essay help exactly in the way they want it to be written. We at have built teams of consultants, who readily attend every query related to help me writing my essay. We provide essay writing help in forms of tips and steps in order o assist students with tough essay assignments.

Latest Management Samples

MPE781 Economics For Managers 3

Download : 0 | Pages : 14

Answer: 1. The long queues represent the high demand for the given restaurant’s foods and service. The people value the restaurant high and are willing to stand in the waiting lines. The people have high opportunity cost associated with the time spent in the line. On the other hand, the restaurant with empty chairs may have high prices which make their food and services unaffordable to a large number of customers. The owner can increas...

Read More arrow

BUS703 Managing Research 3

Download : 0 | Pages : 4

Answer: Background to the problem: Failures in managing research are mainly associated with the lack of preparation in readiness for a project. This leads to businesses failing to prepare for problems leading to the projects encountering serious management hurdles (Cleden, 2017). To overcome these problems every business must address the following research issues so as to address research problems. Define business and research o...

Read More arrow

BMAC5203 Entrepreneurship For Rectifying Distinct Business Issues

Download : 0 | Pages : 15

Answer: Introduction  In the modern era, there are several organizations that are functioning in the global economy each one of the companies have been performing according to their aims and objectives. The operations of a company is dependent on the style of the entrepreneur and the ability and the mind-set of the entrepreneur determines the process that would be undertaken with the help of which the company can gain competitive edge an...

Read More arrow

SG3034 Introduction To Business And Enterprise

Download : 0 | Pages : 6
  • Course Code: SG3034
  • University: University Of East London
  • Country: United Kingdom

Answer: Introduction The Yeo Valley is one of the most widely known organic dairy firms in the UK. This company works for bringing fresh and new products for all the milk lovers. At the same time, they believe that taking care of nature is also one of the most important activities that they have to carry on. This firm has been set up by the Mead family. They have been living and working in Somerset for a long time period. They had started their...

Read More arrow

BUSN20017 Effective Buisness Communication For Tools And Analysis

Download : 0 | Pages : 18
  • Course Code: BUSN20017
  • University: Central Queensland University
  • Country: Australia

Answer: Introduction: Communication is an important aspect of business management. Every professionals need to develop proper communication skills to enjoy success at workplace mentally and financially. The assignment will first help me identify my issues in communication. Depending on it, a literature review will be conducted which will be followed by an action plan.    Tools and analysis: The first tool that I have used is the ...

Read More arrow

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

529 Order Completed

95% Response Time

Ivan Blank

PhD in Functional Human Biology

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

230 Order Completed

97% Response Time

Liya Han

Master Of Science in Geotechnical Engineering (MSc Geotec)

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2115 Order Completed

97% Response Time

Kimberley Chen

MPA in Accounting

Singapore, Singapore

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

Great job and Great experts! The follow up and process was fantastic. Also, communication with the expert was easy.


User Id: 426409 - 25 May 2020


student rating student rating student rating student rating student rating

The solution was done in time thank you do much for your efforts but please taking care for grammar is needed there was so many mistakes in grammar thank you


User Id: 371975 - 25 May 2020


student rating student rating student rating student rating student rating

good to do assignment was what I expected and thanks for that one I will use him again


User Id: 241498 - 25 May 2020


student rating student rating student rating student rating student rating

Great work in completing my assignment on time, was very helpful and great with communicating with the require details. will definitely use them again!


User Id: 285304 - 25 May 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?