SIT763 Cyber Security Management Assignment

Assignment Help Computer Network Security
Reference no: EM132786510

SIT763 Cyber Security Management, Deakin University

Assessment: Critical thinking task

Organisation - Secureworx

Cyber Security Compliance, Incident Management and Response

Learning outcome 1: - Assess security risks, threats and vulnerabilities to the organisation and implement appropriate information security protection mechanisms by analysing requirements, plans and IT security policies.

Learning outcome 2: - Identify personnel security, training and security education needs, and associated legal and ethical awareness and propose strategies for corporations taking into account cost benefit ratios.

Brief description of assessment task

This task requires students to become familiar with and analyse applicable regulatory and compliance requirements related to the cyber security policy statements for a corporate organisation. The analysis will be considered in the context of incident management and response. Students will need to develop the relationship between an identified risk from the policy statement and applicable regulatory requirements to formulate an incident management and response procedure that can be enacted in the case of the risk eventuating.

This is an individual assessment task. The student is required to submit their solution for given task along with the evidence to support findings, and a bibliography. The solution should consist of:

• 500 word summary of applicable regulatory and compliance requirements
• flow chart of steps to perform for incident management and response
• written procedure related to the identified risk and run through following steps of flow chart.

Background information
This assessment has been designed for you to demonstrate and apply understanding of compliance and incident response planning by considering a scenario involving a ransomware attack. The purpose is to provide you with the experience necessary to learn and apply incident response for cyber security management within an organization you may or already are working for.

This is a critical thinking task. You need to demonstrate application and extension of the knowledge learned from the content provided and participation/discussion in the workshops. Your level of knowledge and experience will determine the extent of research required to be performed by you to complete the matrix.

Instructions

Use the SecureWorx SAD (Solution Architecture Document) New Organisational Management System Version 1-00 to complete this assessment task where required.

A channel on TEAMS has been provided for queries related to assessment 4. Questions requesting specific answers or solutions will NOT be responded to. You will need to allow up to 48 hours for a response to a query.

Task 1: Compliance to Australian Notifiable Data Breaches (NDB) scheme

Using ‘Part 4' of the document from the link below, answer the following questions that Transcon would have to comply with to meet the Australian Government Notifiable Data Breaches Scheme (NDB) for a ransomware attack classified as a eligible data breach. (500 words)

1. What is it about the incident that would classify it as an eligible data breach?
2. How is an assessment to be performed following an eligible data breach? Include the timeframe for completing the assessment as part of your answer.
3. To whom and how will the notification of the data breach be communicated?

Task 2: Incident Management and Response Diagram

Using the 4 major steps of the NIST Incident Response lifecycle namely: 1. Preparation, 2. Detection and Analysis, 3. Containment, Eradication, and Recovery and 4. Post-Incident Activity depicted on page 13 of the following document; create a diagram that provides Transcon with an incident response plan for a ransomware attack.

Task 3: Ransomware Attack Procedure

Using the Transcon SAD identify where and explain how a ransomware attack could occur. Using your diagram from task 2, provide Transcon with a written procedure to follow for the identified ransomware attack.

Attachment:- Critical thinking task.rar

Attachment:- Resources.rar

Reference no: EM132786510

Questions Cloud

Differentiate between the various forms of multiplexers : Discuss where a multiplexer would appear in a network and the specific rationale for using a particular form of multiplexer. Discuss the OSI levels involved.
Calculate the budgeted cash collection for March : The company pays 45% of the cost of the inventory in the month of purchase, and 55% during the following month. Calculate the budgeted cash collection for March
Describe the mandate system that was established after wwi : Describe the mandate system that was established after WWI. Which mandates in the Middle East did Britain and France get? What was the Sharifian or Hashemite.
Discuss at least three characteristics that place art : Choose one piece of art from chapter 13 and discuss at least three characteristics that place it in the period (high renaissance, reformation).
SIT763 Cyber Security Management Assignment : SIT763 Cyber Security Management Assignment Help and Solution, Deakin University - Assessment Writing Service - Identify personnel security, training
Discuss thoughts about the image of modern seoul : Compared to the existing image or prejudice you originally had about Seoul, what do you relate to? Or what did you find out for the first time?
What would be the budgeted cost for the coming year : Virginia Company, a merchandising firm, operated 4 sales offices last year at a total cost of $680,000, What would be the budgeted cost for the coming year
Strategic alliances are important for all nonprofits : Post an evaluation of whether strategic alliances are important for all nonprofits to employ.
What is Jonathan Crowley portfolio alpha : Jonathan Crowley is a portfolio manager for a large pension fund. What is Jonathan Crowley's portfolio alpha

Reviews

len2786510

2/4/2021 11:20:20 PM

This is the organisation u have to do the assignment - Secureworx_SAD_v1-00 These are the rubrics plz consider for HD grade - SIT763_assessment_4_rubric Use this template - Assessment_Task 4_Template.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd