Analyse information security vulnerabilities and threats

Assignment Help Other Subject
Reference no: EM132142310

The WannaCry RansomWare Attack in summary (About 100 words)

Q1. What sort of cyber security attack was WannaCry Ransomware Attack and when did it first emerge and occur

Q2. What was the impact of the WannaCry Ransomware Attack in dollar terms for organisations globally - give two specific examples of organisations that were impacted by the WannaCry Ransomware Attack

Q3. Explain how the WannaCry Ransomware Attack works as a process and technically - considering the perspectives of both the attacker and organisation that could be attacked (about 400 words)

Assignment 3: A Case Study: An Assessment of Security and Privacy of My Health Record system

This assignment assesses your understanding in relation to the following course objectives:

1. Analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks

2. describe the role of disaster recovery and business continuity plans in recovering information and operational systems when systems and hardware fail

3. describe why legal privacy and ethical issues play an important part in effectively managing information security

4. communicate effectively written and orally about the management of information security in organisations.

This assignment relates to the topics covered in modules 1 to 11. This assignment can be completed by teams of two students or as an individual assignment.

Details regarding the allocation of students to teams will be provided on the course study desk. Each student team will be expected to work collaboratively as a team in developing and discussing their approach to assignment 3 case study and the required Security and Privacy Assessment of My Health Record system report and presentation. Regular participation in Assignment 3 Discussion Forum each week from Monday 3rd September until the due date for Assignment 3 submission is expected. Each team member or if a student is completing this assignment as an individual will be required to keep a journal of their activities and progress related to completing this assignment. A journal will form part of the assessment for this assignment. In date order clearly list the following:

- date of research activity/discussion
- topics researched or discussed
- time duration of activity.
This journal for each team member or as an individual if you completing this assignment on your own needs to be included as an appendix to the Assignment 3 Report. Any reference to web pages and on line resources such as white papers, blogs, wikis etc. should be listed at the end of the journal.

Regular participation on the discussion forums dedicated for this assessment is highly recommended and can assist greatly with the completion of this assessment item. Also note that for this assignment 3 you are expected to do research outside of the course materials provided.

Case Study: A Security and Privacy Assessment of My Health Record: (National Electronic Health Record System)

As a senior Cyber Security Consultant at HackStop Pty Ltd, you have been commissioned to conduct a critical assessment of the security and privacy of My Health Record: Australian Electronic Health Record (EHR) system on the back of the recent compromise of the Singapore Health IT system. You are required to complete the following four tasks in a Security Assessment Report and Presentation for a Senior Management audience for Assignment 3.

Task 1 Provide a brief overview of the My Health Record system and explain what are the advantages of such a system for improving healthcare delivery for patients, state wide and nationally for administration of healthcare and for improving medical research (about 500 words)

Task 2 Describe how and what an individual can customise and manage in terms of the security and privacy of their My Health Record (about 500 words)

Task 3 Describe and justify security controls with specific examples that should be put in place to ensure the My Health Record system has an appropriate level of security and privacy using the following sub-sections (1) People (2) Process (3) Technology and (4) Legislation (about 1500 words)

Task 4 Given the recent data breach of the Singapore IT Health system (1) explain how this data breach might have occurred and (2) what can we learn from this recent security incident to improve the security of the Australian My Health Record system in terms of prevention, detection and recovery of a data breach in the My Health Record system (1000 words)

Security and Privacy Assessment Report structure
* Coverpage
* Executive Summary
* Table of Contents
* Tasks 1-4 as main headings with sub sections/tasks where relevant
* Journal of participation activities to complete this assessment
* References and Appendices
Security and Privacy Assessment Report MHR - Presentation Structure (Powerpoint)
Your presentation should be created as if it were an actual presentation for a real client and should contain the following at a minimum:
* 1 Slide for an Introduction outlining your team and the organisation you work for
* 1 Slide Overview of My Health Record System and Advantages for Improving healthcare delivery.
* 1 Slide Security and Privacy management of My Health Record by an individual.
* 4 Slides covering security controls to ensure appropriate security and privacy of My Health Records from perspective of People, Process, Technology and Legislation
* 2 Slides covering data breach of Singapore IT Healthcare system and lessons learnt that can be applied to My Health Record system in terms of prevention, detection and recovery from a data breach
* 1 Slide acknowledging key authoritative reference sources which underpin research conducted in preparing this Security and Privacy Assessment of MHR report.

Note: This assignment is focused upon seeing if as a student in this course you have built up an awareness of how security and privacy should be set up and operated in a specific environment. By being able to describe how you would review and assess the security and privacy of the My Health Record system through assessment of people, process, technology and legislation through the lens of good policies, standards, procedures and controls in place, including prevention, detection and recovery from a data breach, markers will be able to assess your level of knowledge learned from the course content and from your own additional research in relation to this case study.

Attachment:- Assignment Specifications.rar

Verified Expert

The paper is presented for 4000 words. It is a report based on My Health Records for Australian citizenship and the the paper discusses the advantages, overview of MHR. There are four tasks in the paper. ALl the task are prepared in the order of requirement sheet. The paper is presented in APA format. References and in-text citation provided. Font: Times NEw Roman, 12 pt, 2 point spacing. References: APA format.Cover page, Table of content, running head, page number, references provided

Reference no: EM132142310

Questions Cloud

How to calculate the sample space : Consider the experiment of drawing two cards from a deck in which all picture cards have been removed and adding their values (with ace = 1)
Simpler forms of inferential statistics : Confidence intervals (CI) are one of the simpler forms of inferential statistics. What does the CI represent?
What does the ci represent : Confidence intervals (CI) are one of the simpler forms of inferential statistics. What does the CI represent?
Outcome for the population : In a hypothesis test, we use a sample to gain insight on what is likely the outcome for the population. In your example
Analyse information security vulnerabilities and threats : CIS5205 Management of Information Security - The University of Southern Queensland - Analyse information security vulnerabilities and threats and determine
What is the probability that one is a mathematician : A comitttee of 3 persons is selected at random from a group of 5 mathematicians and 8 physicists. What is the probability that one is a mathematician
Company claim using the p-value : At a=0.02, what type of test is this and can you support the company's claim using the p-value?
What is the probability that the first ball is red : What is the probability that the first ball is red and the second ball is also red? Express the probability in fraction format.
Find the standard deviation of the discount x : For the past several weeks the restaurant has also been distributing coupons worth $5 off any dinner for two. The coupon can be used in addition to the discount

Reviews

urv2142310

11/21/2018 1:18:27 AM

I have gone through the work you did and sent me. I am more than satisfied after checking the quality. Thanks for the timely intervention. I appreciate your help. It was a great job. Thank you so much for everything. thanks once again.

len2142310

10/16/2018 4:20:15 AM

Time usage: Presentation length was within the prescribed time frame of 20 minutes, 10-15 presentation slides with appropriate usage of time for various elements of it. 5 Excellent Use of time and coverage of key aspects of security audit work plan report. 4 Very good Use of time and coverage of key aspects of security audit work plan report. 3 Good Use of time and coverage of key aspects of security audit work plan report. 2.5 Average Use of time and coverage of key aspects of security audit work plan report. 2 Poor Use of time and coverage of key aspects of security audit work plan report. 1 Very poor Use of time and coverage of key aspects of security audit work plan report. 0 Not Attempted No attempt. 0

len2142310

10/16/2018 4:20:07 AM

Security & Privacy Assessment Report MHR Presentation conducted in a professional manner, conveyed required components of security audit report and each group member contributed to the report presentation. 15 Excellent Standard of presentation content, style clarity and group contributions if relevant. 12 Very good Standard of presentation content, style clarity and group contributions if relevant. 10 Good Standard of presentation content, style clarity and group contributions if relevant. 8 Average Standard of presentation content, style clarity and group contributions if relevant. 6 Poor Standard of presentation content, style clarity and group contributions if relevant. 3 Very poor Standard of presentation content, style clarity and group contributions if relevant. 0 Not Attempted No attempt made. 0

len2142310

10/16/2018 4:19:58 AM

Security & Privacy Assessment Report: structure, writing style, key references, appendices (technical standards, best practice standards, methodologies etc) 10 Excellent Report structure, writing style grammar referencing and presentation. 9 Very good Report structure, writing style grammar referencing and presentation. 7 Good Report structure, writing style grammar referencing and presentation. 5 Average Report structure, writing style grammar referencing and presentation. 4 Poor Report structure, writing style grammar referencing and presentation. 2 Very poor Report structure, writing style grammar referencing and presentation. 0 Not Attempted No attempt made or irrelevant. 0 Journal of each team members or individual’s activities: which contributed to completion of Security and Privacy Assessment - MHR Report (250 words) 0

len2142310

10/16/2018 4:19:53 AM

Task 4: (1) explain how this data breach might occurred (2) what can be learnt from this security incident to improve security of MHR system in terms of prevention, detection and recovery (about 1000 words) 15 Excellent How data breach might occurred, what can be learnt from security incident to improve security of MHR system – prevention, detection and recovery 12 Very good How data breach might occurred, what can be learnt from security incident to improve security of MHR system – prevention, detection and recovery 10 Good How data breach might occurred, what can be learnt from security incident to improve security of MHR system – prevention, detection and recovery 8 Average How data breach might occurred, what can be learnt from security incident to improve security of MHR system – prevention, detection and recovery 6 Poor How data breach might occurred, what can be learnt from security incident to improve security of MHR system – prevention, detection and recovery

len2142310

10/16/2018 4:19:36 AM

Task 3: Describe, justify security controls with examples should be put in place to ensure My Health Record - appropriate level of security & privacy for (1) People (2) Process (3) Technology (4) Legislation (about 1500 words) 020 Excellent Coverage of security controls for MHR – people, process, technology and legislation 16 Very good Coverage of security controls for MHR – people, process, technology and legislation 14 Good Coverage of security controls for MHR – people, process, technology and legislation 10 Average Coverage of security controls for MHR – people, process, technology and legislation 8 Poor Coverage of security controls for MHR – people, process, technology and legislation 4 Very poor Coverage of security controls for MHR – people, process, technology and legislation 0 Not Attempted No attempt made or irrelevant.

len2142310

10/16/2018 4:19:26 AM

Task 2: Describe how and what individual can customise and manage in terms of the security and privacy of their My Health Record (about 500 words) 10 Excellent Description of how individual can customise security and privacy of their MHR 9 Very good Description of how individual can customise security and privacy of their MHR 7 Good Description of how individual can customise security and privacy of their MHR 5 Average Description of how individual can customise security and privacy of their MHR 4 Poor Description of how individual can customise security and privacy of their MHR 2 Very poor Description of how individual can customise security and privacy of their MHR 0 Not Attempted No attempt made or irrelevant. 0

len2142310

10/16/2018 4:19:19 AM

Task 1 – Advantages of MHR – Improved healthcare delivery – patient, administrative and medical research (approx. 500 words) 10 Excellent Discussion of advantages of MHR improve healthcare delivery (patient, administrate, medical research) 8 Very good Discussion of advantages of MHR improve healthcare delivery (patient, administrate, medical research) 7 Good Discussion of advantages of MHR improve healthcare delivery (patient, administrate, medical research) 5 Average Discussion of advantages of MHR improve healthcare delivery (patient, administrate, medical research) 4 Poor Discussion of advantages of MHR improve healthcare delivery (patient, administrate, medical research) 2 Very poor Discussion of advantages of MHR improve healthcare delivery (patient, administrate, medical research) 0 Not Attempted No attempt made or irrelevant. 0

len2142310

10/16/2018 4:19:12 AM

Marking criteria Assignment 3 Security and Privacy Assessment Report and Presentation – My Health Record system Student name Student no Report content Mark Comment Executive summary: half-page brief outlining purpose; scope; four task and outcomes of Security & Privacy Assessment of MHR (250 words approx.). 5 Excellent Summary of four tasks and key findings. 4 Very good Summary of four tasks and key findings. 3 Good Summary of four tasks and key findings. 1 Very poor Summary of four tasks and key findings. 0 Not Attempted No attempt made or irrelevant. 0

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd