What the attacker did stole and wanted

Assignment Help Computer Engineering
Reference no: EM133663804

Assignment: IS Security and Risk Management

Overview

Write a report to discuss recent types of information security attacks, protection mechanisms and risk management.

Approach Analysis

You are required to choose one of the data breaches from the list above in Table 1 and create a report on it. Your report must include the following information.

A. Detail of the Attack:

This section of your report should include the elements below.

1. What was the attack? What vulnerability was exploited?
2. Was the vulnerability already known? When did it happen?
3. Were there any controls implemented against the vulnerability and yet it was exploited?

B. Analysis and Action:

This section of your report should include the elements below.

1. When and how did the target figure out about the attack?
2. For how long, the risk was not actioned?
3. Did the organisation have a risk assessment policy and procedure?
4. Did the organisation maintain a risk register?
5. Was the vulnerability included in the risk register?
6. How was the risk perceived (critical/non-critical/high/medium/low)?
7. What the attacker(s) did, stole, and wanted?
8. Did the organisation pay anything because of the attack?
9. What action did they adopt to avoid further damage?

C. Risk assessment

1. Risk Identification
2. Risk Analysis
3. Risk Evaluation

Risk Identification and Assessment

In this section, you need to identify risks and conduct an analysis of the selected use case. Regarding the selected scenario, reasonable assumptions can be made if they are adequately documented and supported. To perform risk identification and analysis, you can choose either of the following tools or a combination of them.

1. Factors Analysis in Information Risk (FAIR)
2. NIST Privacy Risk Assessment Methodology (PRAM)
3. NIST CyberSecurity Framework (CSF)

Description

Assume you have been recruited as a cybersecurity specialist by the client organization (the use case you chose). You are responsible for conducting a security risk assessment and preparing this report for the board members. In most organizations, board members have minimal levels of computer literacy and risk-related knowledge. Include the following information in your report preparation:

A. Introduction

B. Details of the attack

C. Analysis and action

D. Risk Assessment

1. Risk Identification
2. Risk Analysis
3. Risk Evaluation

E. Conclusion

F. References

Reference no: EM133663804

Questions Cloud

Comprehensive review of the reference materials : Comprehensive review of the reference materials you have utilised - Individual Cover Page with the students Identification (Name and Student Number)
Create a data frame and load the excel or csv file : Create a data frame and load the Excel or CSV file. Create a temp dataset with your main dataset. Perform arithmetic with one of your numeric fields.
Identify potential sources of information that can be used : CT 421- Identify potential sources of information that can be used to develop and support ideas. Identify the problem to be solved.
What is the main function of the mitochondria : What is the main function of the mitochondria within the cells - what would be your hypothesis on how this can happen knowing the function of the mitochondria
What the attacker did stole and wanted : BIS 3004- What the attacker(s) did, stole and wanted? Did organisation pay anything because of the attack? What action did they adopt to avoid further damage?
Job description for entry-level store employee : Use the table below to draft a job description for an Entry-level Store Employee.
Explain the planning process : Explain the planning process that outlines the key elements and strategies for the company to reach the risk management.
Develop a business plan for online media solutions : Develop a business plan for Online Media Solutions. To prepare to develop the business plan, you need to arrange a meeting with the Senior Management team
If lighting is recessed in return air plenum ceiling : If lighting is recessed in a return air plenum ceiling, what will the effect be on supply air needed to cooling the occupied space?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd