Develop a threat and risk assessment

Assignment Help Computer Network Security
Reference no: EM132206559

Scenario

You are the principal consultant for a community based Charity. The Charity is involved in locating and providing accommodation, mental health services, training and support services to disadvantaged people in the community.

The Charity has joined a community cloud provided by a public cloud vendor in order to access a number of applications for their 500 support staff and administrative users. A small number of the Charity's applications are mission critical and the data that those applications use is both confidential and time sensitive.

The community cloud would also be used to store the Charity's 200TB of data. The data would be held in a SaaS database run by the public cloud vendor. The Charity's data contains a considerable amount of confidential information about the people to whom the Charity provides services.

The Charity collects PII data on the clients who use its services so that it can assist them to manage their different service requirements. This PII data also includes holding some digital identity data for some of the more disadvantaged clients, particularly if they also have mental health issues.

The charity has now started its move to the Cloud and is in the process of implementing the following services:
• A SaaS HR and Personnel management suite,
• A COTS Payroll solution that is implemented in the AWS Cloud,
• A PaaS SharePoint platform that forms the basis of the charity's Intranet platform.

You team has workshopped and researched the Threat and Risk analysis for these projects and has developed the policy strategies and controls for Privacy and Data Protection which are required.

The charity has been approached by the Australian Government to trial the centralisation of support services to clients of the charity. This would include such services as income support for clients who are disadvantaged, homeless, or in need of mental health support. Normally, this would require the client interacting with at least three separate government agencies as well as with the charity.

The Government has now decided that they want to centralise the application and continued administration of these services from a number of different agencies into one single portal run by the charity. The Government's strategy is that the process of support applications and administration for virtually all support services follows an almost identical workflow, even though some of the data may differ for different types of services. Their aim is to have a single workflow for all support services, with some additional steps in case of special requirements for a particular type of service. Ultimately, if this trial is successful, the Government will roll out this program to all citizens.

The Government also sees the opportunity to gain a better view of what support services these citizens need, and wants to link that data to other data that they hold about each citizen. In order to achieve this, the Government plans to make the charity's clients register on the MySupport portal and create their own informal digital identity. This will allow all the support services, applications, supporting data, documents, renewal dates, and other associated information for each individual digital identity to be available for viewing on a single page. This data, particularly when linked to a citizen's digital identity, can then be used for more effective planning and decision making by Government and other public agencies.

The plan also has the advantage of simplifying the process of applying for support services and ensuring that they have timely administration for the charity's clients so that they only need to go to a single web portal to acquire the support that they require.

Tasks
After the successful engagement of your team to develop privacy and personal data protection strategies for the charity, the team has now been engaged to develop a Personally Identifiable Information (PII) privacy and personal data protection strategy for the charity.

Team Setup
This assignment is the last of the team assignments for this subject. The rationale for using a team approach is that most IT policy formulations are normally conducted by teams of between 2-5 Architects, Information Security experts, Operations and Business leaders for each problem. You are already assigned to a team and the team, as a whole, will be responsible for the development of the policies.

Team Member Responsibilities

Each team member will be assessed on:
• The final privacy and personal data protection strategies presented by the team;
• The individual contributions that they have made to the policy formulation. This will be shown by the entries that they have made in the

Team forum;

Team members should note that:
• A total of 20% of the total marks for this assignment are for individual contributions. These include:
o Contributions to the development of privacy and data protection policies, and
o Reasoning behind the development of privacy and data protection policies
• A team member without any individual contributions in the Team Forum will be regarded as having not contributed to the risk assessment.

This will result in either reduced marks or no marks being awarded to that team member for this assignment.

The task:

Your team is to:

1. Develop a Threat and Risk Assessment (TRA) for PII data for the MySupport portal. This TRA should consider both the privacy and data protection aspects of PII data in the portal.

2. Develop a PII strategy proposal for the MySupport portal. The strategy should consider the threats and risks to both Privacy and data protection for the PII data collected in the MySupport portal as well as possible controls to mitigate the identified risks.

3. Develop a strategy to protect the informal Digital Identity that a user may create in the MySupport portal. You should consider both the privacy and data protection aspects for a digital identity as well as possible controls to mitigate the identified risks.
4. Develop an outline plan for the Governance of:
1. PII data and digital identities for users of the MyLicence portal.
2. Personal data and PII data for DAS users of the HR Personnel Management suite.
3. PII data and financial data for users and DAS staff in the COTS payroll suite. (20 marks)
5. Create a PowerPoint slide deck that gives a comprehensive overview of the above tasks. This slide deck is not to exceed 30 slides.

Presentation

The team is to submit the following documents to complete this assessment:
• A PowerPoint presentation that gives a comprehensive overview of the four (4) tasks.
o The presentation should be a maximum of 30 slides, including introduction, conclusions and recommendations.
o Each slide should have speaking notes in the Notes section which expand on the information in the slide.
o The slides should give refer to the additional information contained in the appendices.
o Images and quotations used in slides must be referenced on that slide.
o The slide deck does not require a reference list.
• The TRA is to be attached in a separate Word document marked as Appendix A. The TRA can be presented in tabular format or similar.
• The PII strategy is to be attached in a separate Word document marked as Appendix B. This document should be fully referenced in APA 6th edition format, and should not exceed 5 pages.
• The Digital Identity is to be attached in a separate Word document marked as Appendix C. This document should be fully referenced in APA 6th edition format, and should not exceed 5 pages.
• The Governance plan is to be attached in a separate Word document marked as Appendix D. This document should be fully referenced in APA 6th edition format, and should not exceed 10 pages.
• A copy of the discussions in the team Wiki or forum should be exported into a single Word document marked as Appendix E.

Attachment:- cloud privacy assesment.rar

Reference no: EM132206559

Questions Cloud

What is the utility level achieved by any consumer : Write down the production side equilibrium conditions for the model and use these plus the demands to solve for the general equilibrium in Autarky?
How do you think the employer would respond : If John Mills or the union filed a complaint with the LRB of BC, how do you think the employer would respond? Why? If you were the Investigator at the BC LRB.
Discuss element of a mobile marketing campaign : Select a B2C B2B, or non profit organization, business, or brand of your choice. Outline and discuss each element of a mobile marketing campaign utilizing.
What are some of criticisms of traditional national income : What are some of the criticisms and limitations of traditional national income accounting measures? What might you use to enhance these measures?
Develop a threat and risk assessment : PII Strategy - Develop a strategy to protect the informal Digital Identity that a user may create in the MySupport portal - Develop a Threat and Risk Assessment
For what new price initech requested andrew to pay : Andrew has decided to open an online store that sells home and garden products. After searching around, he chooses the software company Initech to provide.
Write a method that takes an array of integers number : Test this method in the main by creating an array of size entered by the user (the size should be even number).
Write a mips code that would switch the values of registers : Write a MIPS code that would switch the values of registers R1 and R2. Your code SHOULD NOT use Loads/Stores.
Discuss the relevant microeconomic theory : Discuss the relevant microeconomic theory which can enhance the understanding of the issue outlined in the article (report) and how business can apply.

Reviews

len2206559

1/2/2019 11:57:12 PM

Each student is required to submit the following through EASTS when their group assignment is complete. This submission should contain the following: • Student name • Team name • Assignment number • Assignment file name • Copy of the student's answer to the question allocated to them by the team. This will allow you to receive marks and feedback when your team assignment is marked.

len2206559

1/2/2019 11:57:03 PM

Q5. PowerPoint presentation (10 marks) Comprehensive overview that shows excellent logical analysis and planning Thorough overview that shows excellent proficient analysis and planning Detailed overview that shows good logical analysis and planning Quality of Wiki/forum interaction (20 marks) Proactively initiates and facilitates discussion, explicitly using appropriate strategies and tools. Initiates and facilitates discussion using appropriate strategies and tools. Evidence that there is a planned strategy to engage with peers in the forums.

len2206559

1/2/2019 11:56:57 PM

Q3. Digital Identity strategy for MySupport (20 marks) Comprehensive development of policy covering all aspects, with excellent analysis of digital identity issues Thorough development of policy covering most aspects, with proficient analysis of digital identity issues Detailed development of policy covering most aspects, with competent analysis of digital identity issues Q4. Outline Governance plan (20 marks) Comprehensive development of governance plan showing excellent logical analysis Thorough development of governance plan showing proficient logical analysis Detailed development of governance plan showing good logical analysis

len2206559

1/2/2019 11:56:50 PM

Question HD DI CR Q1. TRA for PII data (10 marks) ________________________________________ Comprehensive evaluation and matching of threats to PII data with controls showing excellent logical analysis Thorough evaluation and matching of threats to PII data with controls showing proficient logical analysis Detailed evaluation and matching of threats to PII data with controls showing good logical analysis Q2. PII strategy for MySupport portal (20 marks) Comprehensive development of policy covering all aspects, with excellent discussion of threats and risks to PII data Thorough development of policy covering most aspects, with proficient discussion of threats and risks to PII data Detailed development of policy covering most aspects, with good discussion of threats and risks to PII data

Write a Review

Computer Network Security Questions & Answers

  Create another working signature and message

Using the RSA public key (e, n) = (1612093, 97059503) and the plain message/signature pair [m, s] = [12345678, 41009275] create another working signature and message pair without factoring the RSA modulus.

  Find out the modification made to the excel spreadsheet

A dissatisfied employee that is planning to leave an organization decides to delete a file from the server. He then copied an Excel Spreadsheet into another file, modifies the new file and deletes the old file.

  Categories of tasks performed with computer forensics tools

Analyze the five categories of tasks performed with computer forensics tools and provide an example of a software tool that performs each task - Explain how a comparison table can assist a decision maker when analyzing computer forensic tools.

  Cryptography problem

Alice, Bob, and Carol want to use secret key cryptography to authenticate each other. Compare the security of having a single shared secret that they all share, with the security of having each of them use their own secret

  Subnet masking and designing small networks

Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks and corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

  Review the risk section of the companys sec form ten-k

Review the Risk section of the company's SEC Form 10-K. Develop a list of 5 or more specific cyberspace or cybersecurity related risks which the company included in its report to investors.

  Write a function with the name scoretoletter

Write a function 'sumOfThrows' that takes two parameters 'throws' and 'sides'. 'sides' should have a default values of 6.

  Explain efficiency issues and alternate method

Bob sending an encrypted, signed message to Alice and Carol.

  How would you implement the different types of glass

Explain How does the different types of glass affect building security and how would you implement the different types of glass into the facility.

  Describe various issues related to network security

Prepare a paper that discusses this issue. The paper should identify and describe various issues related to network security.

  Conduct research about different sniffing tools

Conduct research and gain knowledge about different sniffing tools. Solve complex problems in secure wireless network designs.

  What challenges does law enforcement face

What challenges does law enforcement face in controlling Child Pornography? How can law enforcement deal with this problem?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd