PBL - Cyber Security Risk Assessment

Assignment Help Other Subject
Reference no: EM132502536 , Length: word count:4500 + 14 PPT

PBL - Cyber Security Risk Assessment - Risk Assessment Report

In this assessment, students must perform a risk analysis of a scenario organisation's cyber risk, identify threats and vulnerabilities of information assets, forecast the consequences of a successful attack and recommend how each threat should be treated.

The risk assessment must be able to cater for accidental or deliberate hardware, software and network failures or attacks. Please be aware that you will need to make assumptions and guestimates for this assessment to make your risk assessment plausible. It is perfectly okay to do this.

Topics -

The following are three scenarios to be used for the cyber security risk assessment report for Assessment.

Scenario 1 - You have worked for Commonwealth Bank for a number of years as a Security Analyst. You have recently been promoted to their head office as an IT Security Manager. You discover that, in the week prior to your arrival, the bank was the victim of a cyber-attack. You discover that they have not completed a risk assessment for a number of months. Therefore, you decide to conduct a comprehensive risk assessment of their Data Centre, which is contained in their head office, and serves the wider network and branches.

Scenario 2 - You work for a well-known retailer, Target Australia. They recently had a major attack on their IT systems. While dealing with the aftermath of the attack, it became apparent that their cyber security risk assessment was woefully inadequate and extremely outdated. You have been tasked with creating a new cyber security risk assessment. Your risk assessment should be able to be applied to all of the retail outlet's facilities, buildings and networks.

Scenario 3 - You work for an organization in an IT or IT security capacity. You can use your own organisation for the scenario.

There are many risk assessment templates available on the Internet which show what should be covered in a risk assessment report. Please review some of these (3 or more) and use them as a guide to creating your own risk assessment report. This is a major task. If done properly, it will take you many weeks to complete. Do not wholesale copy what are in the templates as the University plagiarism software will pick it up and you will fail the assessment.

Try to think of the important issues to the scenario organisation that you have chosen as all risk assessment reports will not be the same - they are designed to be specific to an organisation (or organisation type). It is understood that there is an element of guess-work in this but you should be able to create a good risk assessment report with the limited information you have. You should conduct preliminary research on the organisation that you are basing your RA on (structure, size, locations, management structure etc.) this way you are more likely to produce a piece of work that is realistic.

In the report you should highlight how you arrived at your likelihood, impact and overall risk rating for each of your risks/threats.

Your risk assessment controls and recommendations should be supported by references and citations.

You must justify and support why you have chosen a particular control/solution/response/recommendation.

More Scenarios - Write and present an issue-specific policy for:

- Bring Your Own Device (BYOD)

- Social networking at work

- Use of file sharing technologies

- Mobile phones

- Appropriate use of email

Include components such as management decisions, roles and responsibilities matrix, scope, communication plan etc.

Attachment:- Cyber Security Risk Assessment File.rar

Reference no: EM132502536

Questions Cloud

How you would address a breach of confidentiality : Post strategies you might prefer to use to ensure confidentiality in a treatment group for individuals living with HIV/AIDS. Describe how informed consent.
Determine hitung for cost of goods manufactured : Determine Hitung for Cost of Goods Manufactured and Cost of Goods Sold. PT. Ginting saat ini sedang menghitung biaya di dalam satu bulan tersebut.
Describe the challenges in merging the two cultures : Imagine that your hospital has recently merged with a group of clinical centers. As a high-level executive, you and your team have been asked to combine.
Book- and market-value balance sheets of the united frypan : Here are book- and market-value balance sheets of the United Frypan Company (figures in $ millions):
PBL - Cyber Security Risk Assessment : PBL - Cyber Security Risk Assessment - Perform risk analysis of a scenario organisation's cyber risk, identify threats and vulnerabilities of information assets
Compute cost per equivalent unit for fifo : Compute cost per equivalent unit for both the weighted average and FIFO methods. Pablo Company calculates the cost for an equivalent unit of production
Describe the gottman method of couple therapy : Post an explanation of how the Gottman Method of couple therapy and its underlying Sound Relationship House Theory differs from the therapies and theories you.
MGT600 Management, People and Teams Assignment : MGT600 Management, People and Teams Assignment Help and Solution, Laureate International Universities - Assessment Writing Service
What strategy does the traditional system of accounting : What strategy does this traditional system of accounting for store support costs suggest to increase the profitability of the Eugene store?

Reviews

Write a Review

Other Subject Questions & Answers

  When a neuron is at resting potential

When a neuron is at resting potential

  Create a continuous internal control process

Using the framework issued by COSO (found in your textbook, or click here to follow the link to the Web site), discuss the components and how they fit together.

  Is it ethical for an insurance company to deny a claim

Will Ellen recover the $500,000 in insurance proceeds? Is it ethical for an insurance company to deny a claim on the basis of a "technicality?"

  What were your five highest strengths

Describe how these strengths are expressed in your daily life. Are there any you do not exercise regularly

  Wrirte explanation of some beliefs and traditions of culture

Write a brief explanation of some beliefs and traditions of the culture. The above elements can either be included on one page of your website or separated.

  What are circadian rhythms

What are circadian rhythms? Why do we sleep? Identify and describe insomnia and hypersomnia.

  How would you go about treating this person

A person suffering from PTSD and a substance use disorder can be complicated to treat. How would you go about treating this person?

  Will the research procedures ensure during data collection

Are participant recruitment and data collection adequately described, such that the study's risks and burdens can be discerned - Will the research procedures ensure during data collection?

  Identify three potential dam sites along any of water ways

Identify three potential dam sites along any of the water ways found within the map for a dam of approximately 200m x 100m x 5m.

  Example of an element of culture

Give an example of an element of culture or society that has progressed, evolved, or improved over time, whether centuries or millennia. Is it possible to see religions progressing, evolving, or improving over time in a similar way?

  Paper - treatment of an uninsured homeless patient

For this first assignment you will write a paper addressing the following: Choose one of these examples: Treatment of an uninsured homeless patient and Downsizing a department with a 20% reduction in force

  What are benefits and disadvantages of the model in general

Changing the Organizational Structure at Pine Software LLC. Pine Software LLC (PS) is a mid-sized software development firm located in suburban Chicago Illinois

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd