SIT763 Cyber Security Management Assignment

Assignment Help Computer Network Security
Reference no: EM132786510

SIT763 Cyber Security Management, Deakin University

Assessment: Critical thinking task

Organisation - Secureworx

Cyber Security Compliance, Incident Management and Response

Learning outcome 1: - Assess security risks, threats and vulnerabilities to the organisation and implement appropriate information security protection mechanisms by analysing requirements, plans and IT security policies.

Learning outcome 2: - Identify personnel security, training and security education needs, and associated legal and ethical awareness and propose strategies for corporations taking into account cost benefit ratios.

Brief description of assessment task

This task requires students to become familiar with and analyse applicable regulatory and compliance requirements related to the cyber security policy statements for a corporate organisation. The analysis will be considered in the context of incident management and response. Students will need to develop the relationship between an identified risk from the policy statement and applicable regulatory requirements to formulate an incident management and response procedure that can be enacted in the case of the risk eventuating.

This is an individual assessment task. The student is required to submit their solution for given task along with the evidence to support findings, and a bibliography. The solution should consist of:

• 500 word summary of applicable regulatory and compliance requirements
• flow chart of steps to perform for incident management and response
• written procedure related to the identified risk and run through following steps of flow chart.

Background information
This assessment has been designed for you to demonstrate and apply understanding of compliance and incident response planning by considering a scenario involving a ransomware attack. The purpose is to provide you with the experience necessary to learn and apply incident response for cyber security management within an organization you may or already are working for.

This is a critical thinking task. You need to demonstrate application and extension of the knowledge learned from the content provided and participation/discussion in the workshops. Your level of knowledge and experience will determine the extent of research required to be performed by you to complete the matrix.

Instructions

Use the SecureWorx SAD (Solution Architecture Document) New Organisational Management System Version 1-00 to complete this assessment task where required.

A channel on TEAMS has been provided for queries related to assessment 4. Questions requesting specific answers or solutions will NOT be responded to. You will need to allow up to 48 hours for a response to a query.

Task 1: Compliance to Australian Notifiable Data Breaches (NDB) scheme

Using ‘Part 4' of the document from the link below, answer the following questions that Transcon would have to comply with to meet the Australian Government Notifiable Data Breaches Scheme (NDB) for a ransomware attack classified as a eligible data breach. (500 words)

1. What is it about the incident that would classify it as an eligible data breach?
2. How is an assessment to be performed following an eligible data breach? Include the timeframe for completing the assessment as part of your answer.
3. To whom and how will the notification of the data breach be communicated?

Task 2: Incident Management and Response Diagram

Using the 4 major steps of the NIST Incident Response lifecycle namely: 1. Preparation, 2. Detection and Analysis, 3. Containment, Eradication, and Recovery and 4. Post-Incident Activity depicted on page 13 of the following document; create a diagram that provides Transcon with an incident response plan for a ransomware attack.

Task 3: Ransomware Attack Procedure

Using the Transcon SAD identify where and explain how a ransomware attack could occur. Using your diagram from task 2, provide Transcon with a written procedure to follow for the identified ransomware attack.

Attachment:- Critical thinking task.rar

Attachment:- Resources.rar

Reference no: EM132786510

Questions Cloud

Differentiate between the various forms of multiplexers : Discuss where a multiplexer would appear in a network and the specific rationale for using a particular form of multiplexer. Discuss the OSI levels involved.
Calculate the budgeted cash collection for March : The company pays 45% of the cost of the inventory in the month of purchase, and 55% during the following month. Calculate the budgeted cash collection for March
Describe the mandate system that was established after wwi : Describe the mandate system that was established after WWI. Which mandates in the Middle East did Britain and France get? What was the Sharifian or Hashemite.
Discuss at least three characteristics that place art : Choose one piece of art from chapter 13 and discuss at least three characteristics that place it in the period (high renaissance, reformation).
SIT763 Cyber Security Management Assignment : SIT763 Cyber Security Management Assignment Help and Solution, Deakin University - Assessment Writing Service - Identify personnel security, training
Discuss thoughts about the image of modern seoul : Compared to the existing image or prejudice you originally had about Seoul, what do you relate to? Or what did you find out for the first time?
What would be the budgeted cost for the coming year : Virginia Company, a merchandising firm, operated 4 sales offices last year at a total cost of $680,000, What would be the budgeted cost for the coming year
Strategic alliances are important for all nonprofits : Post an evaluation of whether strategic alliances are important for all nonprofits to employ.
What is Jonathan Crowley portfolio alpha : Jonathan Crowley is a portfolio manager for a large pension fund. What is Jonathan Crowley's portfolio alpha

Reviews

len2786510

2/4/2021 11:20:20 PM

This is the organisation u have to do the assignment - Secureworx_SAD_v1-00 These are the rubrics plz consider for HD grade - SIT763_assessment_4_rubric Use this template - Assessment_Task 4_Template.

Write a Review

Computer Network Security Questions & Answers

  How a bluetooth radio module functions as radio transmitter

Explain how a Bluetooth radio module functions as a radio transmitter or a receiver (transceiver) at the Bluetooth radio-frequency (RF) layer.

  Understanding of theoretical concepts

conduct independent investigation into networking related topics from books, the Internet and through practical investigation.

  Explain the importance of encryption

Suppose an executive-level manager asked you to explain the importance of encryption. Any current topic or article related to penetration techniques.

  Discuss specific malware and social engineer attacks

Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals

  Determine the primary security concerns

Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

  Innovation and small business

Evaluate how networking can mitigate the issues small-business owners face regarding isolation so they can become more innovative.

  What is stated in security policy or policies and standards

Develop the practices that will be used to ensure the business enforces what is stated in the security policy or policies and standards.

  What are the different places an ips can be based

What are the different places an IPS can be based? How can an IPS attempt to block malicious activity? How does a UTM system differ from a firewall?

  Discuss the challenges that incident handlers face

Discuss the challenges that incident handlers face in identifying incidents when resources have been moved to a cloud environment.

  Describe the function of a firewall

Describe the function of a firewall. (Minimum word count: 70) Which tunneling protocols are commonly used by VPNs? (Minimum word count: 25) Describe a differential backup.

  Have you ever been the victim of a software error

Should the FBI be responsible for the accuracy of information about criminals and crime victims it enters into the National Crime Information Center database?

  Identify one method a forensic investigator may use

Identify one method a forensic investigator may use to identify a potential RAT program? How malware may try to hide itself on an asset.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd