CMP73001 Cybersecurity Management Assignment

Assignment Help Computer Network Security
Reference no: EM132487332

CMP73001 Cybersecurity Management - Southern Cross University

Task Description

You are hired by Advanced Medicos Limited (AML), a healthcare product sell company, as a cybersecurity consultant to help in security management and to address the contemporary and emerging risks from the cyber threats the company is facing. AML is providing a platform for Australian customers to sell their product online. The vision of the company is to be among the top 5 nation-wide. The board from the advice by Chief Information Officer (CIO) and Chief Information Security Officer (CISO) has concluded that they should get to point that the key services such as web portal should be able to recover from major incidents in less than 20 minutes while other services can be up and running in less than 1 hour. In case of a disaster, they should be able to have the Web portal and payroll system fully functional in less than 2 days.

The company is a new company which is growing rapidly. While the company uses its database server to store the information of its customers' private data, credit card info, etc. it has a poordesigned network with a low level of security. As the company is responsible for the privacy and the security of customer personal info, credit card details, the security of payment transactions, etc. they have decided to improve their information security. Therefore, they have hired you to do the following task:

- Risk assessment exercise: perform a full cyber risk assessment exercise for this company and document the outcomes.

Existing IT infrastructure of AML:
- Office 365 Emails Hosting
- 2 Web server providing web services and payment options
- A physical database server storing customer information
- DHCP and DNS servers
- Servers located in a server room accessible by all staff
- There is no virtual/cloud storage
- The backup files are stored on a single computer connected to the internal network
- Two 24-port Cisco Catalyst switches (1Gbps ports)
- Switches are access layer switches
- ADSL router
- 40 PCs with outdated antivirus
- The operating systems used in the company are Windows 2012 server and Windows 10

- Windows Firewalls are on
- No security configuration on routers and switches
- Telnet connection is used by IT people to remotely check the configuration of the network devices.
Therefore, there is no encryption in remote access.
- Two wireless access points
- Wireless security is WPA
- 10 Voice over IP phones
- Servers located in a server room accessible by all staff
- There is no virtual/cloud storage
- The backup files are stored on a single computer connected to the internal network
- There are 40 staff including three IT people (IT staff are responsible to look after internet connection, network devices, Wi-Fi, Voice over IP service, LAN, computers, servers, hardware and software, and video conference facilities).
- All staff and equipment are on a single floor.
- The roles and responsibilities of people who are responsible for information security management are not clear and they are not documented. All IT staff help in information security management.

For this assignment, you need to write a report to the CEO of the company and answer a number of questions. You should also identify assets, perform risk assessment, and propose solutions to mitigate risks. Your answer should be submitted in PDF/DOC files.

Task 1: Identify and manage asset

To perform a risk assessment for this company, you should first identify all information assets and their business values. This is necessary because unidentified assets are not considered in risk assessment. In this question, you need to identify information assets based on your judgment and then perform the asset classification. You should classify information assets as different categories of assets which might need different protection based on their sensitivity and their value. Make a table for your task 1 and add the following information in your table:
a. provide a list of assets (at least 10 assets should be identified) and provide a meaningful description for the assets e.g. what is it used for, and what is included etc.
b. determine the asset location and ownership, assign a unique ID for the asset. Each id should give some hint about the asset. For instance, HW.01 can be interpreted as Hardware Asset number 1.

c. classify the identified assets based on their sensitivity. The identified classes should be based on your understanding and experience of each asset. You need to do some research and find at least three common classes of information assets. Create a Weighting Factor Analysis (WFA) to rank the identified assets.

Explain how information security governance can help AML to have efficient asset management.

To improve the level of cybersecurity in AML, you should develop some security policies. The policies should cover different assets like people, technology, access control, etc. The links below give you some examples of information security policies. For this question, at least 5 policies should be provided. It is expected that you first create your Enterprise security or enterprise information policy.

Task 2: Vulnerability management and risk management
Do some research about different steps of Enterprise Risk Management by ISO framework and briefly explain each step.

Identify vulnerabilities in the company assets and their threats. This information should be shown in a table called vulnerability assessment table (TVA worksheet). One extra column should be added for brief vulnerability analysis.

Create a risk assessment table including the identified threats and vulnerabilities, the likelihood of their occurrence, the expected impact of the threats on the company's operations, and the risk rating.

You should answer this question based on your answer to question 2.2 and based on the experience that you gained in the basic Cybersecurity unite. The risk analysis matrix should be used in this task.

Attachment:- Cybersecurity Management Assignment.rar

Reference no: EM132487332

Questions Cloud

What amount of outstanding checks at the end of December : In the month of November, Kinsey Company Inc. wrote checks in the amount of $27,750. What is the amount of outstanding checks at the end of December
Create a venn diagram to compare special considerations : Create a Venn diagram to compare and contrast special considerations that should be addressed when working with families of students with special needs from.
Define deviance and describe the sociological theories : Define deviance and describe the sociological theories that account for deviance, conformity and social control.
What is the cost of inventory sold during the period : The ending inventory balance was $2,250. l1 Woods 00. uses the periodic inventory system, what's the cost of inventory sold during the period?
CMP73001 Cybersecurity Management Assignment : CMP73001 Cybersecurity Management Assignment help and solution, Southern Cross University - assessment writing service
How much can Mary deduct : During 2016, her share of the business loss is $140,000. In 2017, her share of the business loss is $100,000. How much can Mary deduct in 2016 and 2017
Calculate the net cash flow for each of the year in question : Calculate the net cash flow for each of the years in question. In addition a further $20,000 working capital will be required at the start of the project.
How much of the payments will be included in taxable income : how much of the payments will be included in Patrick's taxable income for 2017 if he chooses to take $1,300 monthly over his life and the life of his wife
Determine the NPV of the project : Determine the NPV of the project and advise as to whether or not it should be accepted. Vent Ltd is considering buying a new machine in order to produce

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd