Reference no: EM133035391
MIS607 Cybersecurity - Laureate International Universities
Mitigation Plan for Threat Report
Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.
Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.
Task Summary
Reflecting on your initial report (A2), the organisation has decided to continue to employ you for the next phase: risk analysis and development of the mitigation plan.
The organisation has become aware that the Australian Government (AG) has developed strict privacy requirements for business. The company wishes you to produce a brief summary of these based on real- world Australian government requirements (similar to how you used real-world information in A2 for the real-world attack).
These include the Australian Privacy Policies (APPs) especially the requirements on notifiable data breaches. PEP wants you to examine these requirements and advise them on their legal requirements. Also ensure that your threat list includes attacks on customer data breaches. The company wishes to know if the GDPR applies to them.
You need to include a brief discussion of the APP and GDPR and the relationship between them. This should show the main points.
Be careful not to use up word count discussing cybersecurity basics. This is not an exercise in summarising your class notes, and such material will not count towards marks. You can cover theory outside the classes.
Requirements
Assessment 3 (A3) is a continuation of A2. You will start with the threat list from A2, although feel free to make changes to the threat list if it is not suitable for A3. You may need to include threats related to privacy concerns.
Beginning with the threat list:
• You need to align threats/vulnerabilities, as much as possible, with controls.
• Perform a risk analysis and determine controls to be employed.
• Combine the controls into a project of mitigation.
• Give advice on the need for ongoing cybersecurity, after your main mitigation steps.
Note:
• You must use the risk matrix approach covered in classes. Remember risk = likelihood x consequence. (Use the tables from Stallings and Brown and remember to reference them in the caption.)
• You should show evidence of gathering data on likelihood, and consequence, for each threat identified. You should briefly explain how this was done.
• At least one of the risks must be so trivial and/or expensive to control that you decide not to use it (in other words, in this case, accept the risk). At least one of the risks, but obviously not all.
• Provide cost estimates for the controls, including policy or training controls. You can make up these values but try to justify at least one of the costs (if possible, use links to justify costs).
Report Structure & Format
The report should consist of the following heading structure.
• Title Page
With subject code and name, assignment title, student's name, student number, and lecturer's
name. Also include AI declaration.
• Executive Summary
This should be written after the report and should briefly summarise what you did and what you found. It should be capable of being read by management generally, even those with relatively little IS experience.
• Body of the Report
Discussion of APP and GDPR
Threat list and STRIDE categorisation summary Threat analysis
Using risk matrix
Threats and controls Mitigation scheme
• Conclusion
Summarise major findings or recommendations that the report puts forward.
• References
Use only APA style for citing and referencing.
Note: Reference list should be at least 5 and use APA 7th style edition
Attachment:- Cybersecurity.rar
Assignment on dsm incentive program
: Problem: Building upon Ontario electricity prices, please comment on the strengths of the overall DSM framework you investigated from Ontario.
|
What is the interest rate per month
: A financial adviser recommends that a client deposit $3,500 into a fund that earns 7.5% annual interest compounded monthly. What is the interest rate per month
|
What is the number of shares outstanding on december
: On January 1, 2020, Addy Company had 110,000 shares issued and 100,000 shares outstanding. What is the number of shares outstanding on December
|
Moral decisions free from rationalization
: When faced with a moral decision employees should follow the two-step process of identifying the relevant obligations, effects, and ideas and then try to decide
|
Real- world australian government requirements
: Produce a brief summary of these based on real- world Australian government requirements (similar to how you used real-world information in A2 for real-world
|
Benefits of removing pasta alla adamo
: Once you have classified each menu item in question 1, explain what course of action should be taken with each item on your cocktail list.
|
What will the operating income or loss be for the year
: If the proposal is accepted and sales remain at the current level, what will the operating income or loss be for the following year
|
Building linear program to maximize revenue
: You work for CNN.com and are in charge of selling banner ads for next Friday. You contract with companies to plan how many visitors to the CNN website
|
Benefits for a business by facilitating
: Undertake research to demonstrate an understanding of microservices and how they contribute to business processes.
|