Evaluate and explain legal privacy and ethical situations

Assignment Help Case Study
Reference no: EM133553396 , Length: word count:3500

Assessment - Oral Presentation

Task Overview:

This document provides you with information about the requirements for your assessment. Detailed instructions and resources are included for completing the task. The Criterion Reference

Purpose

Through this assessment, you will develop your ability to:

1. Analyse and evaluate the potential risks associated information security vulnerabilities, attacks and threats and explain how security architecture, design and controls that can be applied to mitigate those potential risks;

2. Analyse systems and hardware failures and provide advice and guidelines on disaster recovery and business continuity plans for critical recovery of information and operational systems;

3. Evaluate and explain legal privacy and ethical situations to effectively managing information security; and

4. Communicate effectively both written and orally by providing advice and guidance on the risks and technical and people issues associated with management of information security to business managers and operational employees in organisations.

Case

Case Study: Optus Ransomware Attack

Australian telecommunications company Optus fell victim to a significant cyberattack and data breach in September 2022. Optus was hit by a cyber attack that compromised customer information. Information that may have been exposed includes customers' names, dates of birth, phone numbers and email addresses. For some customers, addresses and ID document numbers such as driver's licence or passport numbers have been exposed. The breach involved both current and former customers. Someone on an underground cybercrime forum claimed they stole the account data of 11.2 million people from Optus. They're demanding $1 million in cryptocurrency not to sell the information to other people. Otherwise, they said they will sell it in parcels.

* Note: Research this Optus Ransomware Attack in more detail.

In this assessment, you are required to:

• Put together a high-level Cyber Security Incident Response Report, as the IT Security Consultant, which provides:

• An executive summary,
• Background and problem analysis,
• A threat analysis,
• A legal ramifications assessment and
• A set of recommendations (lessons learnt from the Ransomware Attack in the case study).

• Present your Cyber Security Incident Response Report professionally, be concise and to the point for a senior management audience.

• Ensure this assignment is all your own work. It is acceptable to discuss course content with others to improve your understanding and clarify requirements, but solutions to assignment questions must be done on your own.

• Not copy from anyone, including artificial intelligence tools (such as ChatGPT), tutors and fellow students, nor allow others to copy your work.

Task description

Step 1: Task Understanding

• Read the Instructions and Checklist (Steps) carefully.
• Read the Guide: Rubrics in Cadmus Manual and then your Marking Rubric.

Step 2: Analyse Case

• Read The Case carefully and thoroughly.

• Gather relevant sources and materials to understand the Ransomware Attack better and get more details.

• Take notes on key points of the sources you gather, including main arguments, key concepts, and evidence presented.

• Include citations and references in your notes.

• Evaluate the credibility and reliability of the sources you gather, considering the author's expertise, the publication, and the publication date.

• Analyse the sources you have gathered, looking for patterns, themes and perspectives that will help

you to develop your own argument.

Step 3: Identify Problems

• Based on your analysis, outline the problems using this framework:

• Problem: what is the primary problem? Secondary problems?

• Evidence: what proof is there that these are the main issues?

• Symptoms: what are the symptoms of these problems?

• Relationship: how are the problems related? Independent? Related?

• Results: what are the ramifications? Short term? Long term?

Step 4: Solve Problems

• Based on your analysis, outline the potential solutions using this framework:

• Alternatives: what are all the possible solutions?

• Limitations: what limits are there on the possible solutions?

• Suitability: are the solutions reasonable given the circumstances?

• Costs: what are the costs? Advantages? Disadvantages?

• Outcome: which possible solution best solves the problem?

Step 5: Write Cyber Security Incident Response Report.

• Write your Cyber Security Incident Response Report using this structure:

Cover Page

Table of Contents

Executive Summary: half-page brief outlining background and problem analysis, threat analysis, legal ramifications and key recommendations ( 250 words).

Body of Report:

Brief Introduction

Background and problem analysis: Define what is a Ransomware Attack; analyse, evaluate and discuss the impact and extent of the Ransomware Attack as noted in the case study and its customers and business partners (20 Marks 750 words).

Threat Analysis: Analyse Ransomware Attack on the company in terms of how this might have occurred? In your answer consider what vulnerability / vulnerabilities and/or lack of security controls might have been exploited to realise this ransomware attack. (1000 words).

Legal Ramifications: Evaluate and explain what are the legal and privacy ramifications of a ransomware attack for company should the company paid the ransom? (500 words).

Set of Recommendations: Provide a set of recommendations to improve security posture of the company in terms of protection from a Ransomware attack. (1000 words). Your key recommendations should address the following:

• What are the key lessons learnt from this Ransomware Attack on the transport and logistic systems of the company in terms of applying security controls (physical, technical, administrative),

• What are the best practices and standards to improve protection (prevention, detection, recovery) and mitigate the risks arising from a ransomware attack?

Conclusions Reference list
• For this assessment you will use Harvard referencing.

• In text citations: You must include intext citations in the body of your work.

TIP: to avoid plagiarism, you must give credit if you use the work of others

Step 6: Review

• When you have completed your Cyber Security Incident Response Report, review your work carefully for spelling, grammar or other errors.

• Check that citations and references match.

• Read the Marking Rubric again to check that you have met the criteria.

Step 7: Submit Final

List of References

Academic writing and copyright law require that you acknowledge the source when using the ideas of others. In this course, we use the Harvard AGPS Style that requires a list of references (not bibliographies) and in-text citation of sources. Include page numbers in in-text citations for quoted or closely paraphrased material. The case study should not be referenced but the ideas that you used from your prescribed text and readings must be cited in-text and included in the list of references. Only list those sources that you cited in your written work. Make sure that you follow the correct Harvard AGPS method of referencing.

Reference no: EM133553396

Questions Cloud

Which score will your course evaluator transfer into : When your pdf form of your "Lab Pass" verification for your Shadow Health assignment is uploaded into the correct location in Canvas, which score will
What is the secularization thesis : What is the secularization thesis? Why is it important for understanding religion today?
What is one major issue in public health arena : What is one major issue in the public health arena that you think merits more attention than it is currently getting from the healthcare establishment,
How could you use the information as a consumer : Locate your state's department of health website on the Internet and see what types of statistics are available. How could you use the information
Evaluate and explain legal privacy and ethical situations : Analyse and evaluate the potential risks associated information security vulnerabilities, attacks and threats and explain how security architecture
How would you collect or obtain your data : How would you collect or obtain your data? What time of study design would you use? (e.g., cohort, case-control, observational, or randomized control trial
About your target group sudanese refugees : Demographical Information about your target group Sudanese refugees residing at Blacktown, NSW
Exceptional talents and tertiary qualifications : Many refugees and assylum seekers have exceptional talents and tertiary qualifications in certain areas
Characteristics of power and performance sports : What are the characteristics of power and performance sports? How does the media play a role in societal legitimation? What is self-objectification?

Reviews

Write a Review

Case Study Questions & Answers

  What can we do about lost sales due to poor customer service

What can we do about lost sales due to poor customer service by outside "contract" sales staff and how can we restore the attractiveness and power of the TAM brand for major cus- tomers so they aren't lured away by low-cost, low-quality competitors..

  Describe alternatives for resolving the ethical dilemma

Summarize the ethical issue involved. Consider and describe alternatives for resolving the ethical dilemma, including possible ramifications for each alternative. Decide on a course of action

  Evaluate the expected and actual effect of each given policy

Evaluate the expected and actual effects of each policy. Your response needs to include the name of the policy, description of the policy, the year it was implemented and discussion of expected and actual outcomes in term of the GDP, unemployment ..

  Different stages of the software engineering process

Different stages of the Software Engineering Process using a simulated industry case study and develop components of the Software Specification and Design

  What a strategic issue might look like

What a strategic issue might look like - Any strategic problem or issue that Walmart, the world's leading retailer, may have or is currently facing

  Case analysis: eastman kodak-kodaks transition to digital

What were the driving forces behind Kodak's decision to transition to digital photography and what were the major issues faced by Kodak in the transition process?

  Understand the abc pty ltd case

Read and understand the ABC Pty Ltd case before proceeding to answer the questions in Assessment Tasks section

  What is the significance of the findings

What is the significance of the findings? What direction do they suggest for future research? Discuss at least three considerations for future research

  The andaman-nicobar group of islands

Write a case study on the topic "The Andaman-Nicobar group of islands"

  Was it wrong for altair 8800 owners to use altair basic

Was it wrong for Altair 8800 owners to use Altair BASIC on their computers without paying Micro-Soft?

  Discuss reasons for the fall in quantity demand

How will you influence people to strive willingly for group objective in your organization (target based industry)? Apply your interpersonal influence through communication process towards attaining your specialized goals?

  Discuss fitbits differentiation strategy

Evaluate the FITBIT's environment using PESTEL elements.- Discuss FITBIT's differentiation strategy.- Describe FITBIT's positioning strategy in comparison to its competitors.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd