Reference no: EM133180686
ISYS1002 Cybersecurity - Southern Cross University
Task Description:
You are interviewed by Southern Cross University for a position of cybersecurity consultant to work in a university's cybersecurity program. As part of the interview, you are required to complete the following tasks:
• To complete the tasks, use the given guidelines.
Task 1: discuss five important roles of cybersecurity in the university.
• What are the elements of cybersecurity, and what has to be protected?
Task 2: develop five questions that allow you to identify the most critical information assets of the university.
• What is an information asset?
• What makes an information asset critical?
Task 3: discuss why risk assessment is the most critical step in developing and managing cyber security in the university.
• What is risk assessment?
• What do you know by performing risk assessment and what you do not know if not performing risk assessment from the cybersecurity perspective?
• How are risk assessment results used to develop and manage cybersecurity, and how they can affect the business decision-making process?
Task 4: identify the top five threats to the university information assets.
• Clearly understand the difference between important security concepts, including threats, hazards, attacks, and incidents.
• Search for security threat, incident, and trend reports and use the results from reputable sources such as government organisations and security companies.
• Identify relevant threats by studying statistics and
Task 5: let's assume that the university website is one of the most critical information assets of the university. Discuss how the top five threats could/could not impact the asset. Rank the threats based on their levels of impact on the asset. Support your discussion by quoting reputable sources of information.
• Identify potential weaknesses (vulnerabilities) of the asset based on three information security components: confidentiality, integrity, and availability.
• Study the working mechanism of each threat to assess the potential impact of the threat on the asset by exploiting the vulnerabilities. Use your own and public domain knowledge to help you with the impact assessment.
Your report should have correct grammar and spelling; Well supported Arguments; Cite all reference sources.
Attachment:- Cybersecurity.rar