Reference no: EM133701882
Computer Network Security
Tasks and Research Project
Assignment Specifications
Background:
Your team (the same team that was established in AT1) has been invited into a meeting by the management of ABC Widget to illustrate the vulnerabilities of their security infrastructure.
ABC Widgets has concerns with respect to large number of transactions associated with key periods of the year (such as, Easter, EoFY - End of Financial Year, Christmas and etc). There are also concerns about their IT infrastructure safety and adequate Cyber Hygiene.
Your group is now required to produce a risk assessment report and present it to ABC Widgets Management (Your Trainer/assessor)
TASK - Risk Assessment Report
Create a Risk Assessment report for ABC Widgets, which should include the sections below. Build your report using the notes you took in your Cyber Hygiene report plus the following:
Your assessment methodology must adhere to ABC Widget's policies which are guided by ISO 27001 &/or NIST Frameworks. You will need to indicate this in your report.
A risk assessment on the security system and categorise risks.
A risk assessment on the human operations and categorise risks by matching risk plans to risk categories
The required resources needed to minimise each risk category
Physical assessment of ABC Widgets Premises (i.e. site visit)
Your report must document how your implementation would protect against some of the most common methods of cyber security attacks.
Your report must document how the tools used would protect the organisations data.
Your report must outline maintenance procedures.
Report Structure
Title page
Abstract or Executive summary
Table of Contents
1. Introduction
1.1. Purpose
1.2. Scope of this risk assessment
2. Risk Assessment Approach
2.1. Participants
2.2. Techniques Used
2.3. Risk Model
3. System Components
3.1. Technology Components
4. Physical Vulnerability Assessment
5. Risk Assessment Results
6. Conclusion
7. Recommendations
7.1 Cyber Security Policy
7.2 Cyber Security Awareness Strategy
7.3 Cyber Security Training
7.4 Best Practice Hygiene
8. References/Appendix
8.1 Peer review of Cyber Security Policy
8.2 References