Explain how a ransomware attack could occur

Assignment Help Basic Computer Science
Reference no: EM133073139 , Length: 5 pages

SIT763 Cyber Security Management - Deakin University

Task 1: Compliance to Australian Notifiable Data Breaches (NDB) scheme

Using ‘Part 4' of the document from the link below, answer the following questions that Transcon would have to comply with to meet the Australian Government Notifiable Data Breaches Scheme (NDB) for a ransomware attack classified as a eligible data breach. (500 words)

1. What is it about the incident that would classify it as an eligible data breach?

2. How is an assessment to be performed following an eligible data breach? Include the timeframe for completing the assessment as part of your answer.

3. To whom and how will the notification of the data breach be communicated?

Task 2: Incident Management and Response Diagram

Using the 4 major steps of the NIST Incident Response lifecycle namely: 1. Preparation, 2. Detection and Analysis, 3. Containment, Eradication, and Recovery and 4. Post-Incident Activity depicted on page 13 of the following document; create a diagram that provides Transcon with an incident response plan for a ransomware attack.

Task 3: Ransomware Attack Procedure

Using the Transcon SAD identify against what asset and explain how a ransomware attack could occur. Using your diagram from task 2, provide Transcon with a written procedure to follow for the identified ransomware attack.

Attachment:- Assessment Task Template.rar

Reference no: EM133073139

Questions Cloud

How much is the total liabilities after the merger : Pragmatic issues 10,000 shares of its P 10 par value shares for the net assets of Systematic. How much is the total liabilities after the merger
What is unlevered value : Nadia Corporation adjusts its debt so that its interest coverage (EBIT/Interest) remains constant at 3. Nadia's EBIT next period is projected to be $15 million
What effect do you think the higher demand : During COVID the demand for many luxury goods, including Rolex watches, increased. Given that Canada has an MSRP law, what effect do you think the higher demand
What is the fraction of ownership : An investment bank is conducting an equity issuance to raise equity capital for a manufacturing ?rm to ?nance its $126 million new project that has a present va
Explain how a ransomware attack could occur : Explain how a ransomware attack could occur. Using your diagram from task 2, provide Transcon with a written procedure to follow for the identified ransomware
Construct a portfolio of two bonds : Information about Bonds A and B is given below. Construct a portfolio of these two bonds to match the value and duration of a 20-year, 8% coupon bond (Face valu
What is the maturity of the bond in years : If the current price of the bond is $14,200, what is the maturity of the bond in years? Recall that the compounding interval for bonds is 6 months.
Expected return of the new portfolio : You are managing a stock portfolio for a client that contains three assets, A, B, C. You currently hold each in equal proportion and the portfolio has the follo
Determine number of units that Campbell Company must sell : Determine the number of units that Campbell Company must sell in order to break even assuming no changes are made to the selling price and cost structure

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd