Reference no: EM133630941
Part 1
Activity 1:
Research online templates for:
• incident response (IR) plan
• disaster recovery (DR) plan
• business continuity (BC) plan
Note that: Organizations can either create and develop the three planning elements of the CP process (the IR, DR, and BC plans) as one unified plan, or they can create the three elements separately in conjunction with a set of interlocking procedures that enable continuity.
Note: they are simple templates provided in the slides (response plan). You can use these to answer the below question.
Case study:
Using the template (s), you found in activity one, design a BRIEF incident response plan for Koala Health. Include actions to be taken if each of the following events occur:
• Virus attack
• Power failure
• Fire
• Employee error (mistake)
• ISP failure
What other scenarios do you think are important to plan for?
Part 2
Readings:
Check the updated links for the below two reading resources under additional resources on Moodle.
1. cloud-computing-security-for-cloud-service-providers
2. cloud-computing-security-for-tenants
Activity 1:
Assuming Koala Telehealth has moved all its systems to the cloud. Identify the relevant cybersecurity risk and mitigationtechniques required.
Hint: you can use a table like the one used in Article 2 (Cloud Security for tenants).
Part 3
This week we have learnt about the technical controls that can be implemented to provide protection against security incidents. This includes the detection, prevention and mitigation of such incidents.
Activity 1:
COVID-19 have set a new working model where several staff continue to work remotely from home.
1. What are the security issues that surround the use of remote working?
2. Assume that there are concerns that the CQU network is being accessed by people who do not have the necessary authorisation. Would you use an intrusion detection system? Or an intrusion prevention system or a firewall or a combination of any of the three?
Activity 2:
Read Capital One Data Breach Compromises Data of Over 100 Million
What information assurance issues should be considered when a business decide to move to the cloud?
Activity 3:
What do we know about Optus hack?
What could have been done to prevent it.