
Information security
Consider these specific scenarios and how to manage the associated risks.
INF051
Transacting online with the public
Online services offer the public a convenient, efficient way to access government and other services. However, as the demand for online services grows, so too does the scale and sophistication of cybercrime and malicious activities.
Outsourcing, offshoring and supply chains
Supply chains are becoming more complex. When you conduct your risk assessment, consider each part of your organisation’s supply chain.
Mobile and remote working
Mobile and remote working is now the norm, yet many people are unaware of the threats that they face. Taking work home, working in the field, working from hotels or conference venues, visiting client offices, and working while on public transport are just a few ways that people work remotely, using portable computers and mobile devices.
Cloud computing
Cloud computing offers organisations cost effective, agile information storage. Cloud computing is generally more secure and provides greater choice than in-house solutions.
Communication security
Communication security (COMSEC) safeguards reduce the threat of unauthorised people gaining access to your communications. COMSEC includes cryptography, transmission security, emission security, traffic-flow security, and physical security of COMSEC equipment.