Evaluate and explain legal privacy and ethical situations

Assignment Help Case Study
Reference no: EM133553396 , Length: word count:3500

Assessment - Oral Presentation

Task Overview:

This document provides you with information about the requirements for your assessment. Detailed instructions and resources are included for completing the task. The Criterion Reference

Purpose

Through this assessment, you will develop your ability to:

1. Analyse and evaluate the potential risks associated information security vulnerabilities, attacks and threats and explain how security architecture, design and controls that can be applied to mitigate those potential risks;

2. Analyse systems and hardware failures and provide advice and guidelines on disaster recovery and business continuity plans for critical recovery of information and operational systems;

3. Evaluate and explain legal privacy and ethical situations to effectively managing information security; and

4. Communicate effectively both written and orally by providing advice and guidance on the risks and technical and people issues associated with management of information security to business managers and operational employees in organisations.

Case

Case Study: Optus Ransomware Attack

Australian telecommunications company Optus fell victim to a significant cyberattack and data breach in September 2022. Optus was hit by a cyber attack that compromised customer information. Information that may have been exposed includes customers' names, dates of birth, phone numbers and email addresses. For some customers, addresses and ID document numbers such as driver's licence or passport numbers have been exposed. The breach involved both current and former customers. Someone on an underground cybercrime forum claimed they stole the account data of 11.2 million people from Optus. They're demanding $1 million in cryptocurrency not to sell the information to other people. Otherwise, they said they will sell it in parcels.

* Note: Research this Optus Ransomware Attack in more detail.

In this assessment, you are required to:

• Put together a high-level Cyber Security Incident Response Report, as the IT Security Consultant, which provides:

• An executive summary,
• Background and problem analysis,
• A threat analysis,
• A legal ramifications assessment and
• A set of recommendations (lessons learnt from the Ransomware Attack in the case study).

• Present your Cyber Security Incident Response Report professionally, be concise and to the point for a senior management audience.

• Ensure this assignment is all your own work. It is acceptable to discuss course content with others to improve your understanding and clarify requirements, but solutions to assignment questions must be done on your own.

• Not copy from anyone, including artificial intelligence tools (such as ChatGPT), tutors and fellow students, nor allow others to copy your work.

Task description

Step 1: Task Understanding

• Read the Instructions and Checklist (Steps) carefully.
• Read the Guide: Rubrics in Cadmus Manual and then your Marking Rubric.

Step 2: Analyse Case

• Read The Case carefully and thoroughly.

• Gather relevant sources and materials to understand the Ransomware Attack better and get more details.

• Take notes on key points of the sources you gather, including main arguments, key concepts, and evidence presented.

• Include citations and references in your notes.

• Evaluate the credibility and reliability of the sources you gather, considering the author's expertise, the publication, and the publication date.

• Analyse the sources you have gathered, looking for patterns, themes and perspectives that will help

you to develop your own argument.

Step 3: Identify Problems

• Based on your analysis, outline the problems using this framework:

• Problem: what is the primary problem? Secondary problems?

• Evidence: what proof is there that these are the main issues?

• Symptoms: what are the symptoms of these problems?

• Relationship: how are the problems related? Independent? Related?

• Results: what are the ramifications? Short term? Long term?

Step 4: Solve Problems

• Based on your analysis, outline the potential solutions using this framework:

• Alternatives: what are all the possible solutions?

• Limitations: what limits are there on the possible solutions?

• Suitability: are the solutions reasonable given the circumstances?

• Costs: what are the costs? Advantages? Disadvantages?

• Outcome: which possible solution best solves the problem?

Step 5: Write Cyber Security Incident Response Report.

• Write your Cyber Security Incident Response Report using this structure:

Cover Page

Table of Contents

Executive Summary: half-page brief outlining background and problem analysis, threat analysis, legal ramifications and key recommendations ( 250 words).

Body of Report:

Brief Introduction

Background and problem analysis: Define what is a Ransomware Attack; analyse, evaluate and discuss the impact and extent of the Ransomware Attack as noted in the case study and its customers and business partners (20 Marks 750 words).

Threat Analysis: Analyse Ransomware Attack on the company in terms of how this might have occurred? In your answer consider what vulnerability / vulnerabilities and/or lack of security controls might have been exploited to realise this ransomware attack. (1000 words).

Legal Ramifications: Evaluate and explain what are the legal and privacy ramifications of a ransomware attack for company should the company paid the ransom? (500 words).

Set of Recommendations: Provide a set of recommendations to improve security posture of the company in terms of protection from a Ransomware attack. (1000 words). Your key recommendations should address the following:

• What are the key lessons learnt from this Ransomware Attack on the transport and logistic systems of the company in terms of applying security controls (physical, technical, administrative),

• What are the best practices and standards to improve protection (prevention, detection, recovery) and mitigate the risks arising from a ransomware attack?

Conclusions Reference list
• For this assessment you will use Harvard referencing.

• In text citations: You must include intext citations in the body of your work.

TIP: to avoid plagiarism, you must give credit if you use the work of others

Step 6: Review

• When you have completed your Cyber Security Incident Response Report, review your work carefully for spelling, grammar or other errors.

• Check that citations and references match.

• Read the Marking Rubric again to check that you have met the criteria.

Step 7: Submit Final

List of References

Academic writing and copyright law require that you acknowledge the source when using the ideas of others. In this course, we use the Harvard AGPS Style that requires a list of references (not bibliographies) and in-text citation of sources. Include page numbers in in-text citations for quoted or closely paraphrased material. The case study should not be referenced but the ideas that you used from your prescribed text and readings must be cited in-text and included in the list of references. Only list those sources that you cited in your written work. Make sure that you follow the correct Harvard AGPS method of referencing.

Reference no: EM133553396

Questions Cloud

Which score will your course evaluator transfer into : When your pdf form of your "Lab Pass" verification for your Shadow Health assignment is uploaded into the correct location in Canvas, which score will
What is the secularization thesis : What is the secularization thesis? Why is it important for understanding religion today?
What is one major issue in public health arena : What is one major issue in the public health arena that you think merits more attention than it is currently getting from the healthcare establishment,
How could you use the information as a consumer : Locate your state's department of health website on the Internet and see what types of statistics are available. How could you use the information
Evaluate and explain legal privacy and ethical situations : Analyse and evaluate the potential risks associated information security vulnerabilities, attacks and threats and explain how security architecture
How would you collect or obtain your data : How would you collect or obtain your data? What time of study design would you use? (e.g., cohort, case-control, observational, or randomized control trial
About your target group sudanese refugees : Demographical Information about your target group Sudanese refugees residing at Blacktown, NSW
Exceptional talents and tertiary qualifications : Many refugees and assylum seekers have exceptional talents and tertiary qualifications in certain areas
Characteristics of power and performance sports : What are the characteristics of power and performance sports? How does the media play a role in societal legitimation? What is self-objectification?

Reviews

Write a Review

Case Study Questions & Answers

  From the scenario, prioritize the attributes of golds reling

From the scenario, prioritize the attributes of Golds Reling's brand from the brand map presented in the scenario according to the attributes that you believe would be most important to the new tablet's target market. Provide support for your respons..

  Discuss critically infosys current and future strategy

Discuss critically Infosys current and future strategy. What advice would you give Kris Gopalakrishnan and KShop has resulted in information overload among staff. What operational measures would you suggest to overcome such challenges?

  Review tarmac business case for diversity

Review Tarmac's Business Case for Diversity and the Learning Resources. Think about Tarmac's approach to managing diversity and how it relates to organisational behaviour concepts and human resource processes.

  Enron case shared activity

Enron was the first nationwide natural gas pipeline network in the United States. As the company grew, executives shifted the company's primary focus from energy delivery and infrastructure to investing in the stock market.

  Ebay inc internet success or fairy tale

Read the case study "eBay Inc.: Internet Success or Fairy Tale? "and answer the question below,   Use the 2002 financial statement data to replicate the Meyer's report calculations that illustrate the conclusion based on the 2001 data reached in the ..

  Mintendo game girl case study

Which option delivers the maximum profit for the supply chain: Sandra's plan, Bill's plan, or no promotion plan at all? How does the answer change if a discount of $10 must be given to reach the same level of impact that the $5 discount received?

  Splash soft drinks case study

Splash Soft Drinks Inc. (SSD) has recently achieved sales that exceeded its expectations after it introduced a new beverage that was greatly welcomed by their customers. The company is currently considering opening a new plant to which some of the pr..

  Details of the task using tesco plc

Details of the task Using Tesco plc (www.tesco.com) as a case study, prepare a report of no more than 2,500 words that:

  What are the common manifestations of alcoholic cirrhosis

What are the common manifestations of alcoholic cirrhosis? Which of these are secondary to hepatocellular failure? Which are secondary to portal hypertension?

  Judge the extent to which the marketing plan at just us

From the case study, judge the extent to which the marketing plan at Just Us! is outdated. Propose two (2) ways that Just Us! could improve the customer experience and thus sustain future growth.

  Read natasha kingery case and answer the questions

Read the DATA CASE on pages 126-127 about Natasha Kingery who is considering furthering her education and is seeking financial advice. Determine the interest rate she is currently earning on her inheritance by going to Yahoo!

  Identify the relevant facts of the case study

Imagine you are the financial controller of XYZ Ltd a corporation that is a very large donor to HOHO. You have recently become aware that its TV advertising has resulted in the charity violating the 25% expenditure ratio for its charity drive.    Id..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd