Determine Suitable Security Education Training

Assignment Help Basic Computer Science
Reference no: EM133064535

SIT763 Cyber Security Management - Deakin University

Brief description of assessment task

This task requires students to determine a suitable SETA (Security Education Training and Awareness) Program for corporate organisations. Students will be required to formulate SETA approaches to meet the requirements for various stakeholders within the organisation. Students will need to show the relationship between the policy statements of the organisation, the actions required to meet the SETA needs for each stakeholder or group and the associated risk(s) that the program serves to control. Students will be assessed on their ability to compare and contrast the purposes of the SETA elements and suitably match these to the policy statements of the organisation.

This is an individual assessment task. The student is required to submit their solution for given task along with the evidence to support findings, and a bibliography. The solution sheet should consist of:

The results of an analysis presented in the form of a matrix that compares the SETA requirements for various stakeholders based on a defined policy statement and identified risk for the given organisation. How success in terms of SETA effectiveness will be measured must also be addressed.

Background information
This assessment has been designed for you to demonstrate and apply understanding of SETA approaches for cybersecurity management programs. The purpose is to provide you with the experience necessary to learn and apply SETA approaches for cyber security management within an organization you may or already are working for.

This is a critical thinking task. You need to demonstrate application and extension of the knowledge learned from the content provided and participation/discussion in the workshops. Your level of knowledge and experience will determine the extent of research required to be performed by you to complete the matrix.
The following is a really good resource providing examples from industry experts on phishing attack identification, prevention and avoidance. It is recommended reading to gather ideas and help with completing the matrix.

Instructions
Use the SecureWorx SAD (Solution Architecture Document) New Organisational Management System Version 1-00 to complete this assessment task where required.

Task 1: Transcon SETA Matrix

Transcon have defined the following policy statement for managing instances of social engineering, particularly relating to various types of phishing attacks.

Policy Statement: Social Engineering
Transcon will provide the necessary SETA program to maintain the protection of the NOMS IT infrastructure, services and data from all types of social engineering attacks.

An organizational SETA program consists of three elements: security education, security training, and security awareness. You have been hired by Transcon to provide a SETA program for the NOMS system. This will be based on developing a strategy for the following 3 roles: 1. CIO; 2. Senior ICT Security Specialist; and 3. Administrative staff.

You are required to develop one strategy for each role. You MUST choose which SETA element is best suited for each role based on your knowledge and research. You may choose more than one element for a particular role e.g. both awareness and training for administration staff. It is most important that your choice is appropriately justified.

Use the criteria below to complete ‘Table 1 Transcon SETA Matrix' that will result in providing the SETA program for Transcon.

Element - State and justify the SETA element i.e. education, training, awareness; for each role.
Risk- Describe an example of how a social engineering spear-phishing attack could be used to target each role. When writing your example, consider the background and skill level of the users in each role to ensure they understand its meaning.
Method - identify a suitable method to implement the SETA element. Explain why the method will be effective for each role and use a reference to support your answer.
Learning - identify a suitable activity the user in each role will complete to measure their learning. Explain why you have chosen this particular activity and use a reference to support your answer.
ROI (Return on Investment) - Describe a favourable outcome of the SETA element that will demonstrate to Transcon management that it has been successful in terms of protecting users from spear-phishing attacks.

Task 2: Evaluation of Transcon Controls

Identify from the SAD what security controls Transcon already has in place that could assist with the prevention of spear-phishing attacks. Hint: refer to section ‘7 Interfaces'.

Provide Transcon with a recommendation of a suitable technology solution to help protect the NOMS system from spear-phishing attacks. Ensure to provide Transcon with a reason for your recommendation and explain how it would fit in with the NOMS High-level integration diagram displayed in Figure 7 of the SAD.

Transcon SETA Program

Role

Criteria

Transcon SETA Strategy

 

Element

 

Risk

 

Method

 

Learning 

 

ROI

 

 

Element

 

Risk

 

Method

 

Learning 

 

 

 

ROI

 

 

Element

 

Risk

 

Method

 

Learning 

 

ROI

 

Table 1 Transcon SETA Matrix

Attachment:- Cyber Security Management.rar

Reference no: EM133064535

Questions Cloud

Calculate the revaluation gain and prepare the journal entry : On 1 April 2014 the company revalued the building to its fair value of $220,000. Calculate the revaluation gain and prepare the journal entry
Prepare the journal entries in ceres books : On November 1, 2019, Pisces declares a total cash dividend of $180,000. Prepare the journal entries in Ceres's books for the 2019 calendar year
Find out about the financial challenges organization : Find out about the financial challenges the organization is having and apply key financial management concepts to address some of the concerns.
What additional rate of discount was offered : An electronic game listed at $148.00 less 20%, 5%, 4% is offered at a further reduced price of $101.50. What additional rate of discount was offered
Determine Suitable Security Education Training : Develop one strategy for each role. You MUST choose which SETA element is best suited for each role based on your knowledge and research
Distinguish between international and domestic banking : Distinguish between International and Domestic Banking. Define balance of payment. Distinguish between balance of payment and balance of trade
Gala Project : Gala is the code name given by CEBEX for a high-tech security system project funded by the U.S. Department of Defense (DOD).
What is terra total depreciation deduction : Terra's taxable Income for the year before the Sec. 179 deduction is $1,700,000. What is Terra's total depreciation deduction related to this property
Ethical Reflection : The objective of the ethical reflection paper is to surface your personal values,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd