ISYS1002 Cybersecurity Assignment

Assignment Help Computer Engineering
Reference no: EM133180686

ISYS1002 Cybersecurity - Southern Cross University

Task Description:

You are interviewed by Southern Cross University for a position of cybersecurity consultant to work in a university's cybersecurity program. As part of the interview, you are required to complete the following tasks:
• To complete the tasks, use the given guidelines.

Task 1: discuss five important roles of cybersecurity in the university.
• What are the elements of cybersecurity, and what has to be protected?

Task 2: develop five questions that allow you to identify the most critical information assets of the university.
• What is an information asset?
• What makes an information asset critical?

Task 3: discuss why risk assessment is the most critical step in developing and managing cyber security in the university.
• What is risk assessment?
• What do you know by performing risk assessment and what you do not know if not performing risk assessment from the cybersecurity perspective?
• How are risk assessment results used to develop and manage cybersecurity, and how they can affect the business decision-making process?

Task 4: identify the top five threats to the university information assets.
• Clearly understand the difference between important security concepts, including threats, hazards, attacks, and incidents.
• Search for security threat, incident, and trend reports and use the results from reputable sources such as government organisations and security companies.
• Identify relevant threats by studying statistics and

Task 5: let's assume that the university website is one of the most critical information assets of the university. Discuss how the top five threats could/could not impact the asset. Rank the threats based on their levels of impact on the asset. Support your discussion by quoting reputable sources of information.
• Identify potential weaknesses (vulnerabilities) of the asset based on three information security components: confidentiality, integrity, and availability.
• Study the working mechanism of each threat to assess the potential impact of the threat on the asset by exploiting the vulnerabilities. Use your own and public domain knowledge to help you with the impact assessment.
Your report should have correct grammar and spelling; Well supported Arguments; Cite all reference sources.

Attachment:- Cybersecurity.rar

Reference no: EM133180686

Questions Cloud

Business plan for hypothetical medical facility : Write a business plan for a hypothetical medical facility of your choice. Give an evaluation of methods and indicate when they should be used for best results
Relationship between performance and reward management : 1. Discuss the relationship between performance and reward management and individual job performance (drawing on the research literature)
Difference between gender identity and sexual orientation : Explain the difference between gender identity and sexual orientation, and why it is important professionally to understand this difference.
Basics Of Workers Compensation and Claims : Does the employer have a right to deny her worker's compensation claim for the car accident? What do you recommend Gladys do in this situation?
ISYS1002 Cybersecurity Assignment : ISYS1002 Cybersecurity Assignment Help and Solution, Southern Cross University - Assessment Writing Service
Describe principles of fee-for-service plans : Describe the principles of fee-for-service plans and managed care plans. Summarize three broad health-care plan design alternatives.
Describes level of health insurance coverage : Describes the level of health insurance coverage in the United States and the financial protection provided by that coverage.
Summarize the changes in global politics : Summarize the changes in global politics and the advantages or disadvantages of globalization.
How do you qualify for CHAMPVA : Describe two health care plans offered by TRICARE. How do you qualify for CHAMPVA?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss information systems infrastructure

Information systems infrastructure: evolution and trends, Mobile computing and its business implications

  Define the terms attributes sampling and variables sampling

Audit Sampling: Types of Audit Samples. You have been assigned to the audit of Phillip's Inc., a chain of convenience stores.

  Define thoughts on implementation of new security policies

In 80 words or more what are your thoughts on the implementation of new security policies to the user community. What issues are you expecting to face?

  Generate and displays fibonacci sequence numbers

The program should be interactive and display the range of Fibonacci sequence given number n (eg. 500). in the languages Visual Basic and Java.

  Draw a uml class diagram that shows the relations

The bank supports the following transactions involving accounts belonging to the same customer: withdrawal, transfer, deposit.

  Define what is scope creep

Define what is scope creep. Illustrate scope creep with reference to a project you know about. Could the scope creep be avoided? Can scope creep be a good thing and under what circumstances?

  Give one huge advantage of using javascript

One huge advantage of using JavaScript is you can accept input from the visitors to your site. As a visitor adds information to your form, what would you do to control inappropriately entered values.

  Allocation and deallocation of mono-dimensional

Declare and implement a function DisplayMatrix(...) that displays the address of the matrix of floats in the memory and all its elements.

  Write a function that takes as input two arguments

Write a function (caesar.m) that takes as input two arguments: a string to encrypt and the key (shift value), and outputs a single argument.

  Make an idef1x e-r diagram

The scenario is that the Public Affairs Office at Highline University receives requests for speakers on particular topics. To be capable to respond to such request, that office wants to build a database.

  Compare the instruction sets of intel itanium and mips

Compare the instruction sets of Intel 8080 and Intel Pentium II with respect to instruction execution speeds and modes of execution.

  How can you extract from the output of find name

How can you extract from the output of find . -name "*.c" -print only the filenames in the current directory and not in its subdirectories?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd