Reference no: EM133499026
AusAuto started its business two decades ago as a mail-order company, selling accessories and spare parts for various car models. The company used to distribute a catalogue to customers by mail, but it recently started using a web-based catalogue. Customers can order from this online catalogue via an inquiry form on the AusAuto website. AusAuto cooperates with suppliers in the same sector.
Due to the increase in orders since going online, AusAuto has developed an inventory system. It launched an automated online store and
integrated it with the inventory system, so that the warehouse is notified when a purchase is made. The online store uses a credit-card-
enabled payment system, instead of the previous cash-on-delivery system. The store also enables suppliers to sell products directly to
AusAuto with a commission on sales. The server hosting these applications also hosts software development platforms used by the IT team.
The company values its online store and its databases storing information about inventory, customers and suppliers. Employees access
applications from within the organisation but also remotely over the internet. Based on risk analysis, AusAuto found it critical to keep its online store, and to ensure the privacy of customer information for compliance with data protection laws.
This assessment is linked to the following course learning outcomes:
CLO 4 Evaluate cybersecurity asset management, risk management strategies and security program management used in business organisations.
CLO 5 Apply the usage of performance metrics, KPIs and reporting in cybersecurity governance.
Marking criteria
This assessment will measure your ability to:
- Discuss security strategic goals, initiatives, and business needs
- develop cybersecurity program management considering relevant cybersecurity initiatives and projects derived from strategic initiatives
- develop performance metrics
- develop reporting scheme
- structure and formatting
RMIT Classification: Trusted
Assessment Details
Case study overview
Consider that you have been hired by the company you considered in assessment 1 as a security
professional to help them move their business online and address the cybersecurity program
management challenges that come with such initiatives.
For this assessment, complete each of the following steps:
1. Read the case study you selected in assessment 1. Revise your strategic goals, initiatives
and business needs
2. Develop security program by converting security initiatives into projects and tasks using
frameworks such as NIST CSF or similar
3. Develop metrics to measure the effectiveness of the proposed projects or tasks
4. Proposed security reporting scheme based on metrics you developed earlier
Target Audience
Executive level staff at the organisation.
Recommended Length and Structure
• Executive summary/introduction
• Cybersecurity strategic goals, initiatives and business needs
• Cybersecurity program development
• Performance metrics and KPI
• Cybersecurity Reporting and Oversight
• Conclusion