What do you know by performing cybersecurity risk assessment

Assignment Help Computer Network Security
Reference no: EM132344073

Assignment: Cybersecurity - Risk assessment

Task Description

You are interviewed by an organisation for a position of cybersecurity consultant to work in a cybersecurity program in the organisation such as your educational institute SCU, a legal firm, a division of large business/government organisation, or other moderate sized organisation.

As part of the interview, you are required to complete the following tasks:

• Task 1: risk assessment - discuss why risk assessment is the most critical step in developing and managing cyber security in the organisation and identify the limitations of the current risk assessment methods.
• Task 2: Threat landscape - develop five questions and justify why you think they allow you to identify the most critical information assets of the organisation. Create a WFA template to rank the assets (you will fill this WFA when you do Ass2). We just need the template.
• Task 3: Threat landscape - identify the top five threats to the organisation information assets. Support you finding by quoting reputable sources of information.
• Task 4: Threat landscape for website - the open doorway to your organisation. Let us assume that an organisation's website is one of the most critical information assets of the organisation. Discuss how the top five threats identified in Task 3 could or could not impact the asset. Rank the threats based on their levels of impact on the asset. Support your discussion by quoting reputable sources of information. You are free to make any assumption(s) you wish regarding the organisation structure, mission, vision, business profile, etc. which will need to be documented in the appropriate sections of your report.

Assignment-1 Guideline

Task 1: The importance of risk assessment

To complete this task, use the following questions to guide your discussion:

• What is risk assessment?

• What do you know by performing cybersecurity risk assessment?

• What do you think is difficult for you to do/obtain in the risk assessment process?

• How risk assessment results are used to develop and manage cybersecurity and how they can affect the business decision making process?

Task 2: Critical asset identification
To complete this task, use the following questions to guide your thought:

• What is an information asset?

• What make an information asset critical?

• What can be included in WFA to classify the organisation information assets?

Task 3: Threat identification

To complete this task, use the following guidelines:

• Clearly understand the difference between important security concepts including threats, hazards, attacks and incidents.
• Search for security threat, incident and trend reports and use the results from reputable sources such as government organisations and security companies.

• Identify relevant threats by studying statistics and figures found in the reports.

• Summarize each threat, threat agent, method of delivery and working mechanism

Task 4: Threat assessment

To complete this task, use the following guidelines:

• Identify potential weaknesses (vulnerabilities) of the asset based on three information security components: confidentiality, integrity and availability.

• Study the working mechanism of each threat to assess the potential impact of the threat on the asset by exploiting the vulnerabilities. Use your own and public domain knowledge to help you with the impact assessment.

Format and Presentation

You are recommended to present the assignment in a standard report format with the title page that details your name, student-id, unit, course and date/time information. You will also provide a TOC page for the navigation. There is no report template to be used in this assignment, so you can design your own template or refer to online resources.

However, the report should be well presented with clear headings, titles and subtitles.

Attachment:- Cybersecurity_Assignment.rar

Reference no: EM132344073

Questions Cloud

What number of minutes do they need to wait to receive : The director decides that 15 percent of the customers should receive this discount. What number of minutes do they need to wait to receive the discount?
What would be the probability of choosing a spade : If the first time you were not able to put the card back, what would be the probability of choosing a spade?
What is the probability of picking 4 boston cream : If you purchased two dozen donuts (24), consisting of 6 glazed, 6 Boston cream, 6 Sprinkles and 6 Maple leaf.
What is the value of pa-b : If p(A)=p(B)=0.25, and A and B are independent.
What do you know by performing cybersecurity risk assessment : CMP71001 - Cybersecurity - Southern Cross University - discuss why risk assessment is the most critical step in developing and managing cyber security
Probability that all ten of the people are smokers : Suppose ten people are randomly selected from a population where it is known that 22 percent of the population are smokers.
Find the banzhaf power index for each player : Consider the weighted voting system [16 :12,2,2,1]. Find the Banzhaf power index for each player?
Difference between populations means : Consider the variables under consideration I reach exercise and state what use you think researchers might make of your results
Calculate the mean and standard deviation of the attendance : (i) Calculate the mean and standard deviation of the attendance for each sample.

Reviews

len2344073

7/23/2019 4:41:28 AM

Discuss impact of the threats and rank them 2 Support your threat ranking by analysing the possible damage each threat can bring to the asset and how the damage will affect the organisation business continuity. Documentation 1 Professional presentation. 1 Correct grammars and spelling; Arguments are well and logically supported; Cite all reference sources. Total 20

len2344073

7/23/2019 4:41:12 AM

Task 2 4 Five questions to identify the most critical information assets 2 Questions should allow to identify most critical assets of the given organisation. The questions are well formatted. You should make clear who is the questions are designed for. Avoid generic questions, like what is the most critical asset. Instead, the questions should be concrete enough, so they can be answered. WFA worksheet (template) 2 WFA should include at least 3 well designed criteria that match with the given context. Task 3 5 Top five threats to the organisation information assets 5 Correctly identify the threats; each threat is sufficiently detailed Task 4 4 Identify the asset vulnerabilities 2 Correctly identify the vulnerabilities; each vulnerability is sufficiently detailed

len2344073

7/23/2019 4:41:04 AM

The following marking rubric will be used for the marking of your submission. It contains a detailed breakdown of the marking criteria for this assignment. Make sure you read CAREFULLY this to understand how your work would be graded against each of the defined criteria.Criteria Max Mark Note to the student Task1 6 Define risk assessment in the context of cybersecurity 1.5 The definition correctly and precisely shows the essence of the risk assessment process and its objectives. Identify knowledge obtained by performing risk assessment 1.5 Think about the objectives of risk assessments to help you identify the important information you want to know by undertaking the assessment Discuss how risk assessment results are used 1.5 Provide solid arguments and support of the use of risk assessment results in improving cybersecurity Identify limitations of the current risk assessment approaches 1.5 Think about what are not trivial and difficult for you when performing risk assessments?

len2344073

7/23/2019 4:40:50 AM

20% of overall unit assessment This assignment is developmental and cumulative. You are strongly advised to start doing this assignment from Week-3 in your study. Leaving your starting date to the week before the due date is a very poor strategy for success in the unit.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd