Identified risk categories and scenarios

Assignment Help Computer Network Security
Reference no: EM132961385

MIS607 Cybersecurity - Laureate International Universities

Mitigation Plan for Threat Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.
Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary
For this assessment, you are required to write a 2500 words mitigation plan for threat report based on knowledge you gained about threat types and key factors in Assessment 2. You are required to use the Assessment 2 case as context to write a report to address or alleviate problems faced by the business and to protect the customers. In doing so, you are required to demonstrate your ability to mitigate threat/risks identified in Assessment 2 through the strategy you recommend (STRIDE).

Context
Cybersecurity help organizations to mitigate threats/risks, reduce financial loss and safety violations, decrease unethical behaviour, improve customer satisfaction, and increase efficiency, as well as to maintain these improved results. Threats can be resolved by Risk Acceptance (doing nothing), Risk Transference (pass risk to an externality), Risk Avoidance (removing the feature/component that causes the risk) and Risk Mitigation (decrease the risk). This assessment gives you an opportunity to demonstrate your understanding of cybersecurity and your capability to explain Risk Mitigation strategies for such threats. Mitigations should be chosen according to the appropriate technology and resolution should be decided according to the risk level and cost of mitigation.

Task Instructions
1. Read the Assessment 2 Case Scenario again to understand the concepts discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the mitigation plan for threat report.

3. The mitigation plan for threat report should address the following:
• Setting priorities for risks/threats

• Analyse the case in terms of identified risk categories and scenarios
• Apply standard mitigations
• Discuss specific resolutions for improvement, and justify their significance
• Provide recommendations for mitigating risk based on an assessment of risk appetite, risk tolerance and current risk levels (Choose techniques to mitigate the threats)
• Make recommendations to the CEO on how to conduct risk management, key issues involving your process improvement model, including a road map, the identification of appropriate technologies for the identified techniques, communicating the strategy, and a suggested timeline.

4. The report should consist of the following structure:
A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in mitigation plan report. You will need to inform the reader of:
a) Your area of research and its context (how to mitigate or manage threats)
b) The key concepts you will be addressing
c) What the reader can expect to find in the body of the report

The body of the report will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the report. Set priorities for identified threats from assessment 2, analyse the case in terms of identified risk categories and discuss specific resolutions and recommendations for improvements in the body of the report.

The conclusion (will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA referencing style for citing and referencing research.

7. You are strongly advised to read the rubric, which is an evaluation guide with criteria for grading the assignment-this will give you a clear picture of what a successful report looks like.

Attachment:- Mitigation Plan for Threat Report.rar

Reference no: EM132961385

Questions Cloud

Research the product history of apple : Research the product history of Apple, Inc. from its origins through today and the innovative ideas advanced by the late Steve Jobs during his illustrious caree
Personality and job performance-the big five revisited : What is interrater agreement? as mentioned in the article "Personality and Job Performance: The Big Five Revisited" by Gregory M. Hurtz and John J. Donovan
Culturally sensitive and competent human service worker : Recognizing that cultural awareness is a lifelong process, describe how this newer awareness will assist you in becoming a more culturally sensitive and compete
What is the function of organizational behavior management : 1. Do you believe that having an Emotional volatility within the workplace may earn you a bad reputation of being overly emotional and overreactive. Justify you
Identified risk categories and scenarios : Identified risk categories and scenarios - Provide recommendations for mitigating risk based on an assessment of risk appetite, risk tolerance and current risk
Thoughts about cultural relativism-utilitarianism : What are your thoughts about cultural relativism, utilitarianism, and deontology?
Swot analysis in conjunction with the business plan : As a health care manager, why would you complete a SWOT analysis in conjunction with the business plan? Provide examples.
How performance appraisals are function of hr and management : Discuss how performance appraisals are a function of HR and management.
Discuss the advantages and disadvantages of trends : The trend in compensation is towards pay for competencies and towards more performance-based variable pay. Discuss the advantages and disadvantages of these tre

Reviews

Write a Review

Computer Network Security Questions & Answers

  Complete the comptia network and certification practice exam

In order to identify your strengths and weaknesses, you will first complete the CompTIA Network+ Certification Practice exam.

  Examine potential security risks

Examine potential security risks, data breaches, and lost devices. Provide guidelines on how these risks could be mitigated

  Analyze the major ways that cryptography can help

Analyze the major ways that cryptography can help alleviate risks that exist when using cloud computing.

  Summarise and review contemporary topics in IT security

CO4510 Advanced Topics in IT Security Research Paper Assignment - Investigate, summarise and review contemporary topics in IT security

  Calculate m mod p in rsa cryptosystem

Assume that instead of using composite N = pq in RSA cryptosystem, we simply use prime modulus p. Calculate m mod p. Justify correctness and analyze running time of decryption algorithm.

  CT6034 Advanced Networking and Security Assignment

CT6034 Advanced Networking and Security Assignment Help and Solution, University of Gloucestershire - Assessment Writing Service

  What are common protection measures that you can do

What common critical or potentially dangerous areas can you find? What are common protection measures that you can do?

  Fundamental security properties

List the three fundamental security properties and for each give an example of failure. Justify your answer based on literature and Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and pag..

  Determine the expected time to meet this probability

Determine the expected time to meet this probability under each of the conditions -

  Most difficult type of cyber attack to defend against

Consider how this information could be used by an organization for its security program. Was anything surprising to you - Post a message to the forum regarding your experience with any of the cyber attacks described in the text.

  Write a report on network design and management trends

Write a report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security and hardware.

  Discuss specific characteristics of global botnets

Discuss Six specific characteristics of global Botnets (such as purpose, size, attack method, attribution, etc.), and describe how these characteristics have emerged, changed, or evolved over the past 5-10 years.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd