CASE STUDY security Policy, Leadership, and Training A retired Japanese Coast Gu
ID: 3725239 • Letter: C
Question
CASE STUDY security Policy, Leadership, and Training A retired Japanese Coast Guard boat (Takachiho) was sold to a pro-North Korean organization without having assurances that navigational data was deleted. The decommissioned patrol boat could have had as many as 6,000 locations recorded over 250 days of use. Newer naval boats may have systems that can store a lifetime of detailed information. The same may be true of cell phones, ground vehi- cles, photo copiers, and so on. Security policies must change with advances in technology PricewaterhouseCoopers (PwC) 2013 The vessel was presumably sold to be Global State of Information Security Survey turned into scrap. Weapons and radio equip- collected more than 9,300 responses from ment were removed, but no procedures were "9,300 CEOs, CFOs, CISOs, CIOs, CSOs, vice in place to ensure that navigational data were presidents, and directors of T and information securely deleted. In fact, there are no secure security from 128 countries." The following data deletion procedures in place for naval are a few of the key findings from their annual 27 Is prior to disposal. It is unknown if navi- report gational data were recovered from vessels dis- posed of through past sales 26 A Game of Confidence: The loss of Japanese military data to Organizations Assess Their Security . Practices North Korea may be a serious security breach This is especially troubling during times of heightened tensions between the two countries Secure disposal policies will likely be applied o all craft, systems, and technology in the Good self-assessments continue this year, with a substantial number of respondents saying their organizations exhibit the attributes of information security leaders. 1. name of national security This case points out the importance of periodically reviewing security policies and procedures. Past Japanese navy boats may have en unable to store any navigational data 2. Confidence runs deep. Most respondents believe their organizations have instilled effective information security behaviors into organizational culture.Explanation / Answer
solution :-
1. The navigational data on the Japanese cost guard vessel not securely deleted, the reason behind is that there is no defined or procedure to delete the navigational data stored on vessel. All other equipments are unmounted but the procedure for the deletion of navigational data was not there.
Therefore, this is the reason that the navigational data not deleted from the Japanese vessel.
2. The security disposal policies can play an important role in the data security. If the proper security policies and the procedure of data disposal are defined then it is assured that there is no sensitive data in the vessel and there is no risk of unwanted data leak.
3.The Japanese officials of navy and representatives of government can decide the policy points and take help to from experts to develop the policies. By this process the Japanese coast guard can develop and write the effective data disposal policies.
4. To effectively implementation of information security systems there should be environment and culture of confidence inside the organisation. The organisation members should have confidence to achieve high data security systems.
5. The organisations sometimes has budget related issues to implement the data security systems. And todaythe organisations using the common security measures very less. The organisations sometimes neglecting there security policies and does not follow them. These are some lack of capabilities of the organisations to manage security.
6. The effective leadership can lead to an effective security system in the organisation. If the leader is best then he can design effective policies and make all the team to follow them. Also he can develop a confidence in the team. Therefore the good leadership can play an important role in implementing the security policies.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.