Perform a risk analysis and determine controls

Assignment Help Other Subject
Reference no: EM133032110

MIS607 Cybersecurity - Laureate International Universities

Assessment - Mitigation Plan for Threat Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.

Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.

Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary
Reflecting on your initial report (A2), the organisation has decided to continue to employ you for the next phase: risk analysis and development of the mitigation plan.

The organisation has become aware that the Australian Government (AG) has developed strict privacy requirements for business. The company wishes you to produce a brief summary of these based on real- world Australian government requirements (similar to how you used real-world information in A2 for the real-world attack).

These include the Australian Privacy Policies (APPs) especially the requirements on notifiable data breaches. PEP wants you to examine these requirements and advise them on their legal requirements. Also ensure that your threat list includes attacks on customer data breaches. The company wishes to know if the GDPR applies to them.

You need to include a brief discussion of the APP and GDPR and the relationship between them. This should show the main points.

Be careful not to use up word count discussing cybersecurity basics. This is not an exercise in summarising your class notes, and such material will not count towards marks. You can cover theory outside the classes.

Requirements

Assessment 3 (A3) is a continuation of A2. You will start with the threat list from A2, although feel free to make changes to the threat list if it is not suitable for A3. You may need to include threats related to privacy concerns.

- Perform a risk analysis and determine controls to be employed.
- Combine the controls into a project of mitigation.
- Give advice on the need for ongoing cybersecurity, after your main mitigation steps.
Note:
- You must use the risk matrix approach covered in classes. Remember risk = likelihood x consequence. (Use the tables from Stallings and Brown and remember to reference them in the caption.)
- You should show evidence of gathering data on likelihood, and consequence, for each threat identified. You should briefly explain how this was done.
- At least one of the risks must be so trivial and/or expensive to control that you decide not to use it (in other words, in this case, accept the risk). At least one of the risks, but obviously not all.
- Provide cost estimates for the controls, including policy or training controls. You can make up these values but try to justify at least one of the costs (if possible, use links to justify costs).

Reference Requirement

A3 requires at least 5 references (but as many as you like above this number) with at least 3 references coming from peer-reviewed sources: conferences or journals. (Please put a star "*" after these in the reference section to highlight which are peer reviewed.)
One of the peer-reviewed articles must be uploaded in pdf format along with the A3 report (this can be done in BB). This pdf will be referred to here as the "nominated article". (Zero marks for referencing if the nominated article is not itself peer-reviewed.) Of course, the nominated article should be properly referenced and cited, but you need to site an important direct quote from within the article (with page number), not just a brief sentence from the abstract. The quote should also relate to the main topic of the article, not just a side issue.

Report Structure & Format
The report should consist of the following heading structure.
- Title Page
With subject code and name, assignment title, student's name, student number, and lecturer's
name. Also include AI declaration.
- Executive Summary
This should be written after the report and should briefly summarise what you did and what you found. It should be capable of being read by management generally, even those with relatively little IS experience.
- Body of the Report
Discussion of APP and GDPR
Threat list and STRIDE categorisation summary Threat analysis
Using risk matrix
Threats and controls Mitigation scheme
- Conclusion
Summarise major findings or recommendations that the report puts forward.
- References
Use only APA style for citing and referencing.

Attachment:- Case Scenario.rar

Reference no: EM133032110

Questions Cloud

What is the book value after the second year : n the second year, the popper produced 12,000 buckets of popcorn. What is the book value after the second year on the popcorn popper
Develop a gantt chart in ms project : Develop a Gantt chart in MS Project for this project - tasks with durations, start/finish dates, organized into deliverables and linked as appropriate
Estimate cash disbursements related to purchases : Purchases in December 2020 are expected to be $75,400. Estimate cash disbursements related to purchases for each month of the first quarter of 2021
What is the present value of the tax savings : The company's required rate of return is 13 percent. What is the present value of the tax savings related to depreciation of the equipment
Perform a risk analysis and determine controls : Mitigation Plan for Threat Report Assessment - Perform a risk analysis and determine controls to be employed
How much should chichi report as net cash : Issued 5,000 of its preference shares for land having a fair value of P320,000. How much should Chichi report as net cash from financing activities
What would be the amount of consolidated retained earnings : What would be the amount of consolidated retained earnings on December 31, 2021, if the parent had applied either the initial value or partial equity method
What is one share of this stock worth to you : Beginning 5 years from now, the dividend is expected to increase by 4.0 percent annually. What is one share of this stock worth to you
Prepare the appropriate entries for both Western Soya Co : Prepare the appropriate entries for both Western Soya Co. and Rhone-Metro on December 31, 2021. Show how Rhone-Metro calculated $156,000 annual lease payments

Reviews

Write a Review

Other Subject Questions & Answers

  Which goal statement do you think is more appropriate

Which goal statement do you think is more appropriate? Explain why you think the statement is suitable. Also provide an explanation as to why the other.

  Variety of ethical dimensions to the responses

There are a wide variety of ethical dimensions to the responses of individuals (such as scientists, politicians, environmental activists, journalists, and  "normal" people) and organisations  (e.g. Government, business and the media) to the inform..

  Explain what hanh mean

Explain what Hanh means when he says that the Buddha sees "the rose of true being" (in other words, explain the "dialectics of prajñaparamita

  Analyze the impact of legal and ethical considerations

Legal and Ethical Considerations for Group and Family Therapy - Considering the Health Insurance Portability and Accountability Act (HIPPA).

  Causes of disproportionate minority confinement

What are the root causes of disproportionate minority confinement - What additional factors affect disproportionate minority confinement and minority youth?

  What actions would you take to reduce turnover

If you became the new manager at a restaurant with high employee turnover, what actions would you take to reduce turnover and increase retention of employees?

  Gender-race and ethnicity have affected your behavior

How do you think gender, race, and ethnicity have affected your behavior?

  Design IP plan for the network

ITNE2003 - Install, Configure, Operate and troubleshoot Medium-Size Networks - Write down the configuration command in Branch B router to statically route all

  How you will go about getting the job

Have you started researching about how to apply for adatabase manager job? How you will go about getting the job.

  Identify the normal values for each of the given labs

Identify the normal values for each of the following labs. Consider normal values across gender, race, and age, and pregnancy status, when applicable.

  What are health challenges a nurse may encounter refugees

What are some health challenges a nurse may encounter refugees? Include in your answer communicable and non-communicable diseases you may find

  Identify a change needed in community in health care policy

Identify a change needed in your community in health care policy and discuss how you could impart change during your career as an NP.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd