Human threats and errors of privacy of data

Assignment Help Other Subject
Reference no: EM133034936

CYBERSECURITY -Mitigation Plan for Threat Report

TASK SUMMARY

Reflecting on your initial report the organisation has decided to continue to employ you for the next phase: risk analysis and development of the mitigation plan.

The organisation has become aware that the Australia Government (AG) has developed strict privacy requirements for business. The company wishes you to produce a brief summary of these based on real- world Australian government requirements (similar to how you used real-world information in first assessment for the real-world attack).

These include the Australian Privacy Policies (APPs) especially the requirements on notifiable data breaches.

The PEP (company: Peters Excellent Packers) wants you to examine these requirements and advise them on their legal requirements.

Also ensure that your threat list includes attacks on customer data breaches. The company wishes to know if the GDPR applies to them.

REQUIREMENTS

This assessment is the continuation the first assessment. You will start with the threat list from the first assessment. Please use the following 3 threats:(Please link thesethreats with privacy concerns)*IMPORTANT...you can change slighted change the treat too.

1.Theft may occur in many cases which process for equipment devices of information. The most frequent information stolen are Banking information, website credentials, and passwords for specific online resources that are part of the company business models.

2.Data breach occurrences have some human threats and errors of privacy of data. It usually happens when an intruder is able to get past security measures.

3.Breaking network protection, without protection users, can intercept sensitive information or access to different devices

*You may need to include threats related to privacy concerns. Beginning with the threat list:

-You need to align threats/vulnerabilities, as much as possible, withcontrols.
-Perform a risk analysis and determine controls to beemployed.
-Combine the controls into a project ofmitigation.
-Give advice on the need for ongoing cybersecurity, after your main mitigationsteps.

Attachment:- Mitigation Plan for Threat Report.rar

Reference no: EM133034936

Questions Cloud

How much would she pay in monthly mortgage payments : Given the bank has calculated Marcie's Gross Debt Service (GDS) ratio as 31%, how much would she pay in monthly mortgage payments
Build relationships with vendors and suppliers : Communicate the vision to all team members and leads by example. Reinforce the O&B values daily and inspires the team with his/her exciting vision for the futur
Theoretical knowledge of leadership : My entire professional and personal experience has made me a person who is readily adaptable to different industries, goods, people, work circumstances
Prepare the journal entry to record the write-off : During the next month, a $5,000 accounts receivable is written off as uncollectible. Prepare the journal entry to record the write-off
Human threats and errors of privacy of data : Mitigation Plan for Threat Report - risk analysis and development of the mitigation plan and Breaking network protection, without protection users
Analysis of the cultural dimensions and cultural attitudes : Case Scenario: You work for the Canadian tour operator. You have been asked to be part of a team traveling to Japan to negotiate a contract with a local tourism
Explain the purpose of course objectives : Explain the purpose of course objectives/expected learning objectives and where they are found in each nursing course.
Prepare journal entries required to record the investment : Prepare the journal entries required to record the investment in the bonds in the general ledger of Gums Ltd for the year ended 30 December 2020
Step in the cook-chill food production process : Outline one consideration for each step in the 'cook-chill' food production process.

Reviews

Write a Review

Other Subject Questions & Answers

  Market research policy and procedure

What extent the research has provided information against the research objectives specified in your market research project plan

  MGT502 Exemplary Business Presentation Assignment

MGT502 Business Communication Assignment Help and Solution - Laureate International Universities, Australia. Assessment - Exemplary Business Presentation

  What is it important to collect mortality data

let's imagine you are a filed worker for the centre for global health research and are helping obtain verbal autopsy data by interviewing citizens how could respond tactfuly and truthfully to the granmother who said " whats the use talking about now ..

  Summarize the law created by the state you chose to research

Summarize law created by state you chose to research and suggest one modification to or overall criticism of law. Support your suggestion with sound reasoning.

  Discuss the types of resistance

The text provides 14 faces of resistance. Select three of these types of resistance, and create a brief scenario in which it might occur.

  What should he do in the given situation

George is going to replace his car in 3 years when he graduates, but now he needs a radiator repair. The local shop has a used radiator.

  Explain what sources the author uses to prove her argument

Explain how the author proves - Explain how the author proves her argument, including specific details from the book.In other words, summarize the book.

  When would the mmpi-a be appropriate for use

When would the MMPI-A be appropriate for use? How do you feel about its use based on your readings and research? Discuss the uses and pros/cons of the MMPI-2

  Criminal justice system

Computer technology has provided the criminal justice system with a number of benefits such as program algorithms

  How you will handle the delicate nature of the topic

Explain how you will handle the delicate nature of this topic. How will you stand firm in your expectations while still showing respect and care for the teacher

  Explain evidence-based corrections

It is your first week on the job. Your supervisor wants to know what you think about evidence-based corrections (EBC)

  What are some of the complex issues related to gender

As you have learned from the text and perhaps from your own experiences, characteristics such as gender, culture, socioeconomic status, learning styles.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd