Reference no: EM132478054 , Length: word count:4000
CTEC5802 - Cyber Threat Intelligence - De Montfort University
Learning outcome 1: Demonstrate an in-depth knowledge, understanding and critical awareness of the cyber threats domain.
Learning outcome 2: Critically analyse and correlate breach information, risk assessment and make preventative recommendations.
Learning outcome 3: Explain and demonstrate understanding of the psychological motivations of the threat actors.
Learning outcome 4: Demonstrate an awareness of developing standards and relate research on security policy formulation.
Questions to be undertaken:
The assignment is to test the understanding of the materials and content from the module. The approach is to use a well-documented in the Internet in the Internet the Staysure Limited case study and consolidate learning through an application of the approaches learned in the module to the case study examination and solving.
Stage 1: Staysure Limited Case Study Articulation
Question 1 Summarise the Staysure Limited case study, citing explicitly the source references and description of the case available in the Internet. (>500 words)
Question 2 Produce a high-level security architecture for the Staysure Limited case study (schemes/diagrams and narrative), citing the source references.
Stage 2 Threat Analysis and Risk Assessment of the Staysure Limited Case Study
Question 3 Produce a risk assessment of the architecture and system, covering all of the assets, vulnerabilities, threat sources and threat actors, citing the source references when needed. (>500 words)
Question 4 Write a short summary report making recommendations that would have prevented the breach, citing the source references. (>500 words)
Stage 3 Psychological Motivations and Insider Threat in the Staysure Limited Case Study
Question 5 Exploring the key psychological motivations that could be used to explain the attack for the Staysure Limited case study. Discuss how aspects of Insider Threat could be used to explore/explain this attack for the Staysure Limited case study, citing the source references. Include the possible Insider Threat ‘type' that could be at work giving a clear rationale for this choice. (>500 words)
Stage 4 Security Assurance Architecture of the Staysure Limited Case Study
Question 6 Design a security assurance architecture of the Staysure Limited case study that would have prevented the data breach, citing the source references. Explain your architecture and its components. (>500 words)
Question 7 Present a set of information security policies covering the system of the Staysure Limited case study, to include overall security policies, citing the source references. Please note that you cannot copy-paste policies presented in the class but need to create your own ones as a policy designer in this case. (>500 words)
Referencing style - Harvard
Attachment:- Cyber Threat Intelligence.rar
Identify the target viewing audience of project runway
: Identify the target viewing audience of Project Runway, and explain how segmenting, targeting, and positioning contribute to the show's success.
|
Determine the actions of the incident response team
: Determine the actions of the incident response team that are the most critical in the event of a major incident or disaster. Provide a reference in APA.
|
Determine the conflict of interest issue at crazy mike apps
: Are there limits to how much you could give before it would shift from a gift to a bribe? If there is a limit, how was the number chosen?
|
What is the total percentage return for an investor
: What is the total percentage return for an investor who purchased a stock for $5.92, received $2.38 in dividend payments, and sold the stock for $9.51?
|
CTEC5802 Cyber Threat Intelligence Assignment
: CTEC5802 Cyber Threat Intelligence Assignment help and solution, De Montfort University - assessment writing service - ummarise the Staysure Limited case study
|
What kind of information was compromised
: Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation.
|
What is rollins wacc
: a. What is Rollins' WACC? b. Discuss the problems of estimating the cost of capital for privately owned firms?
|
In what ways did iso affect standards for network security
: What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security?
|
Discuss the visual assets such as charts and annotations
: Discuss the visual assets such as charts, interactive controls, and annotations that will occupy space in your work. Discuss the best way to use space in terms.
|