What is ethical behaviour and what ethical considerations

Assignment Help Computer Network Security
Reference no: EM133188120 , Length: word count:2000

Report

Task Description:
You are hired as a cybersecurity consultant to work on asecurity program to address the contemporary and emerging risks from the cyber threatsthe university is facing. Your tasks are the following:
• To complete the tasks, use the given guidelines.

Task 1: The university is currently using a password-based authentication system to control user access to the university's information system. However, the Bring Your Own Device (BYOD) policy recently implemented by the university has raised some security concerns. As a security consultant, assess the risk from the BYOD policy to the university's information system.
• Identify the most critical 5 (Five) components of the university's information system - thecritical information assets.
• Identify five (5) threats (five) the BYOD policy may bring to the identified critical assets.
• Identify potential vulnerabilities( at least one) of each asset against the identified threats.
• Assess the risk to the university's information system using either a quantitative orqualitative risk assessment approach and document the risk assessment process.
• Do the cost benefit analysis for 2 years to recommend at least one (1) security measure againt each assestto mitigate the risk indentifed.

Task 2: You have identifiedthat Spamming is among the top cybersecurity threats facedby the university. Use the Spam Act 2003 and available online resources to developa guideline for university students and staff to combat the threat.
• Definition of spam and its distinctive characteristics.
• At least three (3) real examples of spam, show the spam characteristics.
• An instruction to the users on how to recognise and safely handle spam.
• An instruction to the IT administrator on how to minimize the spam threat.

Task 3: Investigate and document the Australian legal requirements that SCU will need to complywith.
• What would be the consequence(s) for non-compliance for SCU?
• What is ethical behaviour and what ethical considerations may SCU have intheir sector?
• What is the distinction between ethical behaviour and illegal behaviour?
• How does ethical behaviour relate to security positions within the SCUorganization?
Your report should have correct grammar and spelling; Well supported Arguments; Cite all reference sources.

Attachment:- Report.rar

Reference no: EM133188120

Questions Cloud

How much is the benefit expense in profit or loss : How much is the benefit expense in 2022 profit or loss and the amount of prepaid (accrued) banefit as of December 31, 2022
Bulgaria-a whole nation hacked : In July 2019, an anonymous hacker emailed Bulgarian media outlets to proclaim that they had gained access to the database of the Bulgarian tax service. As is of
Communication theory-organizational communication research : locate an academic journal article that uses a traditionalist, interpretive, or critical-interpretivist perspective to examine a communication issue in organiza
Calculate the net capital gain : Calculate the Net Capital Gain, if any, to be included as Mary's assessable income for the year ending 30 June 2021
What is ethical behaviour and what ethical considerations : Do the cost benefit analysis for 2 years to recommend at least one (1) security measure againt each assestto mitigate the risk indentifed
What amount of investment income should be reported : What amount of investment income should be reported on Johnson's income statement for the year ended December 31, 2022
How much is the carrying value of the right-of-use asset : How much is the carrying value of the right-of-use asset as of December 31, 2023 and the amount of depreciation expense for year 2023
How do we measure equipment performance : What can go wrong if TPM assumptions are applied blindly and Culture conflict, a higher educated foreman refusing to pursue his/her original job
What is the carrying amount of the right-of-use asset : At inception of the lease Mixer paid P120,000 initial direct cost. What is the carrying amount of the right-of-use asset at the end of 2022

Reviews

Write a Review

Computer Network Security Questions & Answers

  Which operating systems are best for particular hardware

Your task is to explain to her which operating systems are best for particular hardware - Should would like your help installing Windows 8.1 on the new Apple as she really likes the Windows operating system.

  Identify steps required for implementing a security program

Identify three steps required for implementing a physical and environmental security program. Explain how you would factor risk management practices into the development of the policies you constructed above.

  Project - security plan for a general support system

CSIA 413: Cyber Security Policy, Plans, and Programs. Research and then draft the required system security plan for a General Support System

  Explain concept of server virtualization to seniormanagement

Explain the concepts of server virtualization to senior management so that they understand the concepts and can form an opinion on the solution.

  Describe a technique used by hackers to cover their tracks

Describe a technique used by hackers to cover their tracks after a network attack. This may take a little bit of research so please post your source in this discussion

  Design and undertake substantial investigations

Develop a deep and systematic understanding and knowledge of Information Environments in terms of deterrence, detection, protection and reaction to access

  What two linux commands can be used for pattern matching

What command can you use to determine the MAC address of a Linux-based machine and What three are valid permissions under Linux?

  Project proposal for networking course project

Prepare project proposal for Networking Course Project - A brief description of the modules in your project E.g. Administrator Module, User Module, etc

  Describes the five phases of an attack

CSIS 343- Our text describes the five phases of an attack, and we'll be discussing all those phases in this course. Although the phases from the text represent a generalized attack framework

  Design an algorithm to achieve the byzantine agreement

Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

  Identify potential physical threats that require attention

Identify at least five potential physical threats that require attention. Determine the impact of at least five potential logical threats that require attention.

  Request assistance with network lan

Request assistance with Network LAN w/VOIP and Wireless Design Assignment - Must use the World Wide Trading Company Case Study as a reference to complete this assignment successfully.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd