Reference no: EM133758031
Fundamentals of Cyber Security
Learning Outcome 1: Demonstrated understanding of the fundamental principles of cybersecurity and demonstrated capacity to interpret, apply, and evaluate the relevant security tools and approaches to identify and mitigate threats, attacks, and common vulnerabilities.
Learning Outcome 2: Demonstrated high level of written and verbal communication skills relevant to the planning, design, and implementation of a technical solution.
Anzaw Pty Ltd Case study
With its headquarters in Sydney and a branch in Brisbane, Anzaw Pty Ltd operates state-of-the-art automobile manufacturing lines. Using significant amounts of automation and advanced technology in its production lines, together with augmented reality for designing its cars of the future, Anzaw also embraces big data and artificial intelligence throughout its operations. Anzaw's organisational functions are world-class.
The headquarters' ICT Infrastructure is shown in Figure 1. The key servers used by Anzaw Pty Ltd are Web Server, Database Server and Mail Server. The purposes of these servers are:
Web Server: Hosts the Website of the Anzaw Pty Ltd
Database Server: Hosts the designs and manufacturing details of various cars
Mail Server: Used for receiving and sending emails
Anzaw Pty Ltd would like to take advantage of scalability and on-demand resources provided by Cloud Computing and are interested in adopting a Hybrid Cloud deployment model in the future.
Given the competitive nature of the automobile industry, and situated within a complex and dynamic external environment, Anzaw requires their production lines to be optimised continuously through the use of the latest cutting-edge hardware and software technology systems. In turn, these systems need to deliver not only high levels of work-flow but also high levels of information security. Information security is increasingly important as the company's technological vision and goals now extend to their automobiles through technological innovation and breakthroughs associated with using the Internet of Things (IoT). Indeed, Anzaw currently feels it is vulnerable to several types of malicious cyberattacks that aim to capture valuable business information in order to sell such information in the black market. Despite these dangers, the management at Anzaw has had little time to focus on areas of information security vulnerability. Therefore, they have hired you as an independent information security consultant to advise them on various aspects of information security issues and vulnerabilities.
Assuming the role of an independent information security consultant, use information given in the case study to answer the following questions.
Question 1: Discuss the existing security landscape pertaining to information systems of Anzaw Pty Ltd, including common vulnerabilities, potential threats, and possible repercussions of a security breach.
Question 2: Demonstrate your knowledge of important security tools such as authentication, access control, and cryptographic techniques that should be used within the Anzaw Pty Ltd to protect the information systems.
Question 3: Analyse and explain various security technologies, scanning and probing tools that Anzaw Pty Ltd should use to master the best practices in protecting information.