Explain how a ransomware attack could occur

Assignment Help Basic Computer Science
Reference no: EM133073139 , Length: 5 pages

SIT763 Cyber Security Management - Deakin University

Task 1: Compliance to Australian Notifiable Data Breaches (NDB) scheme

Using ‘Part 4' of the document from the link below, answer the following questions that Transcon would have to comply with to meet the Australian Government Notifiable Data Breaches Scheme (NDB) for a ransomware attack classified as a eligible data breach. (500 words)

1. What is it about the incident that would classify it as an eligible data breach?

2. How is an assessment to be performed following an eligible data breach? Include the timeframe for completing the assessment as part of your answer.

3. To whom and how will the notification of the data breach be communicated?

Task 2: Incident Management and Response Diagram

Using the 4 major steps of the NIST Incident Response lifecycle namely: 1. Preparation, 2. Detection and Analysis, 3. Containment, Eradication, and Recovery and 4. Post-Incident Activity depicted on page 13 of the following document; create a diagram that provides Transcon with an incident response plan for a ransomware attack.

Task 3: Ransomware Attack Procedure

Using the Transcon SAD identify against what asset and explain how a ransomware attack could occur. Using your diagram from task 2, provide Transcon with a written procedure to follow for the identified ransomware attack.

Attachment:- Assessment Task Template.rar

Reference no: EM133073139

Questions Cloud

How much is the total liabilities after the merger : Pragmatic issues 10,000 shares of its P 10 par value shares for the net assets of Systematic. How much is the total liabilities after the merger
What is unlevered value : Nadia Corporation adjusts its debt so that its interest coverage (EBIT/Interest) remains constant at 3. Nadia's EBIT next period is projected to be $15 million
What effect do you think the higher demand : During COVID the demand for many luxury goods, including Rolex watches, increased. Given that Canada has an MSRP law, what effect do you think the higher demand
What is the fraction of ownership : An investment bank is conducting an equity issuance to raise equity capital for a manufacturing ?rm to ?nance its $126 million new project that has a present va
Explain how a ransomware attack could occur : Explain how a ransomware attack could occur. Using your diagram from task 2, provide Transcon with a written procedure to follow for the identified ransomware
Construct a portfolio of two bonds : Information about Bonds A and B is given below. Construct a portfolio of these two bonds to match the value and duration of a 20-year, 8% coupon bond (Face valu
What is the maturity of the bond in years : If the current price of the bond is $14,200, what is the maturity of the bond in years? Recall that the compounding interval for bonds is 6 months.
Expected return of the new portfolio : You are managing a stock portfolio for a client that contains three assets, A, B, C. You currently hold each in equal proportion and the portfolio has the follo
Determine number of units that Campbell Company must sell : Determine the number of units that Campbell Company must sell in order to break even assuming no changes are made to the selling price and cost structure

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The rising importance of big-data computing stems

The rising importance of big-data computing stems from advances in many different technologies.

  Explain what is meant by the term foreign key

Explain what is meant by the term foreign key.Explain what is meant by the term foreign key.

  What is the capacity of the nurse team

a. What is the capacity of the nurse team over the course of a 11 hour work day?

  What are the pros and cons of outsourcing

Discuss with your classmates the issues to consider when deciding which aspects of your project for this course would be candidates for outsourcing.

  Single line of code to declare

1. A single line of code to declare, create, and initialize "blue, "green", and "red" into a string array

  What then happens to the frame b1

Give a reasonable lower bound for the probability that A wins all the remaining back off races.

  Telecom Network Security

Compare and contrast the difference of network security within an on-premise environment and a cloud environment.

  Find all summary of descriptive statistics for temperature

Find all summary of descriptive statistics for temperature in degrees Fahrenheit when the formula to convert Kelvin to Fahrenheit is:

  How does the ai technology utilize networks are there risks

How does the AI technology utilize networks are there risks, constraints, dependencies?

  Are the observations truly independent

Using the probability from part (c), estimate the probability that the fire station's driveway is at least partially blocked at least once over 60 cycles of the light (roughly one hour). Use the binomial distribution to help answer this problem.

  Explain how anti-viruses and anti-spyware software work

Identify common types of malware and the threats they pose. Explain how anti-viruses and anti-spyware software work.

  Bayesian classification is based on bayes theorem

Bayesian classification is based on Bayes' Theorem. Bayesian classifiers are the statistical classifiers. Discuss what is Bayesian classification in data mining

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd