Cyber security threats - vulnerabilities and risk

Assignment Help Computer Engineering
Reference no: EM132490667 , Length: word count:3500

BN223 Cyber Security Principles - Melbourne Institute of Technology

Assignment - Cyber Security Threats, Vulnerabilities and Risk

Learning Outcome 1: Understand the common types of threat and vulnerabilities to cyber systems and data

Learning Outcome 2: Discuss the design and secure solutions for organisations in socio-technical context

Tasks:

It is to note that this assignment consists of two parts a) Assignment 1a and b) Assignment 1b.
A. Identify a target company to be analyzed for protection and security
B. Write a review article for the topic described below

1. Topic - Network security Vulnerability and its impact on threats and attacks

System security challenges have increased over the years especially with critical systems such as banking, healthcare, and the use of advance utilities becoming more connected. On the other hand, the malicious actors have evolved from early-day hackers whose intentions were mostly curiosity to modern-day hackers who has the intentions of financial gain to espionage and beyond. To effectively secure against these threats and attacks, it is important to understand what we are securing, how we are securing it, and who we are securing against.

Assignment 1a description:

You need to cover the following topics to secure the company network. The following is the scope for Assignment 1A.

1. Literature review about attacks facing companies and how to secure them

2. Identify a target company: You need to select an existing company and describe its current network setup, business mission/objectives, and historical attacks if existed. This company should have multiple branches nationally and/or internationally that are connected over internet.

3. Know The Enemy. You need to conduct a research and identify the possible enemy according to business of the selected company, and what would motivate them to conduct possible attacks.

4. Assess the vulnerability of the company system network when connecting to external parties. Discuss these vulnerabilities existed at the company and how to check for them

Assignment 1b description:

5. Know Your Self. Threat is the presence of something valuable that makes a threat credible. The value and nature of a valuable define the nature of the threat, the risk posed by a threat, and the cost of defense. You need to define/list the assets that you have to protect, the risks associated with those assets, and the costs of protecting or not protecting them, so you can define the threat to your network. This analysis of an organization's assets and risks would lead to create a proper security policy. You need to prepare the following:

a. Assess the vulnerability of the company system network (internally). Discuss the possible vulnerabilities might exist at the company and how to check for them.

b. Discuss the different type of threats facing this company.

c. What could be the potential risks and how to mitigate them?

d. The cost of defence for addressing the important risks.

e. Describe the steps for security policy needed to secure the company's network.

f. What is the role of security standards in improving the network security? You can give example of NIST framework

g. Search for CISCO SAFE model (as shown in the reference below) and describe their method for analyzing threats, risks, and policies across an organization and implementing controls.

Reference: "SAFE Overview Guide: Threats, Capabilities, and the Security Reference Architecture,"
h. Prepare slides (between 5- 8 slides) for presentation during the lab class. Read the instruction attached carefully.

i. Important: You need to include a revision of the literature review done at assignment1-a based on feedback from tutor.

Attachment:- Cyber Security Principles.rar

Reference no: EM132490667

Questions Cloud

What effect would transaction have on net income : Non-dividend-paying shares were sold early in 2020 and their original cost was recovered exactly. What effect would this transaction have on 2020 net income?
What is the coefficient of kinetic friction : If he pushes with a force of 241 N directly to the right (NOT AT ANY ANGLE), what is the coefficient of kinetic friction? The mass of the couch is 36.3 kg.
Explain steps researchers took to ensure generalizability : Post your explanation of who the sample is. Also explain steps researchers took to ensure generalizability. Be sure to discuss how the study results could
Develop sampling structures - probability and nonprobability : Using your research problem and the refined question you developed in Week 4, develop two sampling structures: probability and nonprobability.
Cyber security threats - vulnerabilities and risk : Assignment - Cyber Security Threats, Vulnerabilities and Risk and Understand the common types of threat and vulnerabilities to cyber systems and data
What type of research study design is each of given : What type of research study design is each of the following? And why? Clinically, radiologically, and electromyographic features in 6 children with joint.
Compute frequency and percentage by political affiliation : Compute the frequency and percentage by political affiliation of all states. Then compute the percentile rank and standardized score by political affiliation.
Could you measure the earth magnetic field : Could you measure the Earth's magnetic field (magnitude and direction) using the magnetic field sensor? If so, How? If not, why not?
Calculate the energy using given data : You serve a volleyball with a mass of 2.1 kg. The ball leaves your hand with a speed of 30 m/s. The ball has kinetic energy. Calculate the energy.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd