Apply the coras risk assessment methodology

Assignment Help Computer Engineering
Reference no: EM133926231 , Length: word count:2000

Assessment - CORAS Risk Assessment on SIM Porting Scenario

LO 1: Describe key terms and concepts in cybersecurity, cyber law, intellectual property and cybercrime.
LO 2: Analyse approaches to network security, firewalls, intrusion-detection systems and intrusion prevention systems.
LO 3: Formulate approaches for incident analysis, risk management in cyberspace and incident response.

Purpose

In this assessment you will use the CORAS approach to risk analysis on a provided case study.

Task details
Read the provided case study and, using the CORAS approach to risk analysis, identify and model applicable risks.

Instructions
Referring to the following case study (and the resources provided below (e.g. the paper, CORAS and Risk Assessment reading materials), use the CORAS risk assessment methodology to identify and model applicable risks using asset, threat, risk, treatment and treatment overview diagrams.

Overview
This assessment requires you to apply the CORAS risk assessment methodology to a re- alistic case study. The case study concerns a home-based microenterprise (for example, a home-based online business) that becomes the victim of a SIMporting (SIMswap) attack. A SIM porting attack occurs when an adversary convinces a telecommunications provider to transfer the victim's mobile phone number to a SIM card under the adversary's control. Once the attacker controls the number, they can intercept SMS onetime passwords, reset account credentials and potentially drain financial accounts. Your task is to identify what is valuable to the business (Assets), analyse how such an attack unfolds (Threats), estimate the associated risks (unwanted incidents) and propose treatments (risk controls).

What you must deliver
Your submission must be a single PDF of approximately 2 000 words (±10%; diagrams, tables, figure captions, and the reference list are excluded from this word count) containing the following sections. Use the accompanying Template.tex (or its PDF rendition) as the structure and complete each section with your analysis and figures. Get expert-level assistance in any subject with our assignment help services.

Cover page. Include the title, subject code, your name, student number, the submis- sion date, and the word count.

Executive summary. Provide a concise, one-paragraph summary of the scenario, the highest-priority risks, and your key recommended treatments.
Introduction. Include:
Problem Statement (business background and the SIM-porting incident),
Purpose & Objectives (why CORAS; what you will analyse and deliver),
Target Description & Views (the analysis goals, the specific target(s) in use-e.g., mobile number, storefront, cloud services-and the business/organisation view- point on why these are critical),
Scope (what is in/out of scope and why), and
Methodology & Standards (CORAS plus any standards/guidance you will refer- ence; tools used to draw diagrams).
Stakeholder and viewpoint analysis. Identify all relevant parties (e.g. business owners, telecommunications provider, cloud providers, customers, regulators) and de- scribe their interests/priorities. Use a table to capture role and priority.
Asset identification and valuation. Create a table listing the business assets rele- vant to the scenario. Assign relative values for confidentiality, integrity, and availabil- ity, and rank the assets by importance. Briefly justify why each asset matters. (These rankings will feed into the TVA matrix.)
Asset diagram. Draw a CORAS asset diagram showing assets, parties, and their relationships. Highlight the most critical assets.

High-level threat identification. Summarise the main threat agents, unwanted incidents, and vulnerabilities relevant to SIM porting. Keep this high-level (save detail for the threat diagram).

Detailed CORAS threat diagram. Produce a detailed threat diagram showing the paths an attacker might take, the vulnerabilities exploited, and the resulting unwanted incidents. Include at least two paths (e.g. social engineering, insider misuse, IoT pivot). Use CORAS notation and annotate likelihoods where appropriate.

Risk analysis. Define your risk function and evaluation metrics (likelihood and im- pact scales) and justify them with credible sources. Build a Threat-Vulnerability- Asset (TVA) ranking matrix, and explain how the TVA rankings inform placement in the risk matrix.

Risk evaluation and prioritisation. Using the TVA matrix and the risk matrix, rank the risks, state which are acceptable and which require treatment, and justify the acceptance criteria.

Risk treatment planning. For each unacceptable risk, select an option (avoid, mitigate, transfer, or accept) and propose one or more controls with short justification (cost, feasibility, residual risk). Include a CORAS risk-treatment diagram linking risks to controls.

Conclusions and recommendations. Summarise the key findings and highlight quick wins versus longer-term improvements. Ensure recommendations align with busi- ness objectives and the regulatory environment.

References. Provide a reference list in APA 7th edition. Cite all external sources used (e.g. official guidance on SIM-swap/port-out prevention). Do not rely solely on lecture notes.

Hints and guidance
Draw from credible sources. Consult reports from regulators (e.g. ACMA, CISA), industry bodies (e.g. FINRA) and reputable news articles for statistics on SIMporting fraud. Use these sources to justify your likelihood estimates and control recommenda- tions.
Avoid providing solutions in the introduction. The introduction should set up the scenario and explain why a risk assessment is needed, not present your treatments. Save detailed controls for the risk treatment section.

Use the CORAS language. CORAS diagrams have specific symbols (e.g. stick figures for threat agents, ellipses for vulnerabilities, triangles for unwanted incidents, money bags for assets).

Reference no: EM133926231

Questions Cloud

Would you say the firm is on solid financial ground : What do you notice? Do the assets match the liabilities and equity? Is the firm making money? Would you say the firm is on solid financial ground?
How much would the insurer pay : A building worth $100,000 is insured for $60,000 under a policy with a 90% co-insurance clause. How much would the insurer pay?
How a financial manager determine optimal capital structure : How would a financial manager determine optimal capital structure? How would it fit in with company's capital expenditures, growth plans, and operating results?
How does finance affect you daily : How does finance affect you daily? Give some examples and explain how learning finance can help you manage your own money.
Apply the coras risk assessment methodology : CSE4004 Cyber security principles - Assessment - CORAS Risk Assessment on SIM Porting Scenario, La Trobe University - Describe key terms and concepts
Identify the two component that contributed most to observed : Identify the two components that contributed most to the observed change in Disney's return on common equity between Year 9 and Year 13.
What is the price-earnings ratio : ABC Industries had additions to retained earnings of $250,000. If the company has 100,000 shares of common stock outstanding, what is the price-earnings ratio?
Give four detailed examples of motivational speeches : Give four detailed examples of motivational speeches on Financial Well-being: Strategies for financial literacy, saving and investment to achieve security.
What are some cost of home ownership that are not deductible : Sometimes it is just as important to know what not to do as it is to know what you are able to do. What are some cost of home ownership that are not deductible?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd