Evaluate the likelihood and impact

Assignment Help Computer Engineering
Reference no: EM133903122

Cyber Security

Assessment - Cyber Risk Assessment
Artefact Development

Task

Demonstrate your understanding of key cyber security concepts aligned with learning outcomes LO1, LO2, and LO3. Identify threats, conduct a risk assessment, and produce a document tailored to non-technical business stakeholders.

Additionally, this task requires you to leverage open-source cyber security and generative AI tools, simulating real-world practices in cyber risk assessment.

LO1: Contextualise the terminology associated with cyber security for diverse stakeholders in business.
LO2: Identify vulnerabilities and threats pertaining to the IT infrastructure of organisations.
LO3: Recommend risk mitigation strategies to address cyber security vulnerabilities and threats.

Assessment Description

This assessment simulates industry practices for conducting risk assessments within a business context. You will demonstrate your ability to investigate network traffic using tools such as nmap and Wireshark, and conduct a risk assessment based on the ISO 27001 framework. Additionally, you are expected to utilise generative AI tools, such as ChatGPT or Gemini, to support and enhance your workflow.
Your final deliverable is a comprehensive Risk Assessment Report designed to assist the company's executives in strengthening their cyber security posture. Access assignment help for any subject instantly.

Case Study
Kaplan Care is a small medical practice comprised of several doctors and administrative staff operating in a hybrid work arrangement. The organisation's IT infrastructure includes:
Patient Records Server: Runs an electronic medical record (EMR) system accessible via HTTP/HTTPS.
File Sharing Server: Hosts patient scans and lab reports, shared via server message block (SMB) protocol.
Remote Access Server: Provides virtual private network (VPN) access for remote staff. Recently, employees of the practice have noticed several anomalies including:
Delayed server responses
Unauthorised login attempts on the VPN server
Suspicious outbound connections to unrecognised IP addresses You are provided with two files:
xml file for nmap: Pre-generated results simulating a network scan of Kaplan Care's current
infrastructure. Includes details on open ports, running services, and detected vulnerabilities.
pcap file for Wireshark: Captured network traffic simulating suspicious traffic patterns like plaintext credentials, connections to unusual external IPs, and SMB traffic anomalies. Access assignment help for any subject instantly.
You have been brought in to assess the network's cyber security posture, identify risks, and present recommendations.

Assessment Instructions
Identify relevant threats
Use a generative AI tool to help you identify potential cyber risks relevant to Kaplan Care. Include screenshots of your interaction, demonstrating how you have used the tool as a brainstorming assistant, and not as the sole source of information.
Review the outputs and select five (5) key risks to include in your report.
List your chosen threats and provide a brief rationale for why each one is significant to the organisation.
Analyse network traffic
Open your xml file on nmap and your pcap file on Wireshark.
Examine the data from both tools to identify any evidence that relates to the risks you previously identified. (e.g., look for anomalies such as unusual ports, IP addresses, or traffic patterns that align with your selected risks).
Document your findings for each of the risks using screenshots of nmap or Wireshark, and provide a brief explanation of the data the supports your findings.
Conduct a risk assessment
Use a generative AI tool to help you evaluate the likelihood and impact of each of the five (5) selected threats. Include screenshots of your interaction.
Validate your AI-generated results manually. Identify at least two (2) results that you disagree with, provide alternative assessments, and briefly justify your perspective.
Use the risk matrix below to determine the risk score of each threat.
Considering Kaplan Care's Medium risk appetite, recommend appropriate controls when necessary. Align your recommended controls with industry standards, such as the NIST Cybersecurity Framework (CSF), ISO27001, and the ACSC Essential Eight.

Reference no: EM133903122

Questions Cloud

Create a project plan by defining the goals : Create a project plan by defining the goals, identifying project stakeholders, determining the project scope, and defining the project risks.
What are the primary strengths of the team : MGT 605- What are the primary strengths of the team? What are its potential weaknesses? How positive is the management team about the team's potential?
Compare the accuracy of the techniques using rmse : Apply forecasting techniques to a given dataset and provide a business application of the forecasts - Case Study: Sales Forecasting for NovaTech Electronics
Organisational learning and development strategy design : Identify at least communication techniques that can be used in an ongoing communication process with key stakeholders to share information
Evaluate the likelihood and impact : Cyber Security Identify vulnerabilities and threats pertaining to the IT infrastructure of organisations and Examine the data from both tools to identify
Disadvantage-advantage of hendy motivation calculus model : Disadvantage and advantage of Hendy's motivation calculus model with the reference of two principles in which Maslow's hierarchy of needs operate.
What is the strategic fit between nomura and lehman : What is the strategic fit between Nomura and Lehman? (Based off the Nomura and Lehman merger in the 2008 financial/economic crisis).
Key success factors for wdc and its rivals in mainland china : Identify and justify the KPIs that Walt Disney Company should use to evaluate its overall performance in mainland China over the next 5 years.
Concept of the blue economy from green to blue economy : Advise to develop Africa's concept of the blue economy; from green to blue economy; discuss how the voyage began.

Reviews

len3903122

8/5/2025 11:13:52 PM

Some of you may be getting an error message when you were trying to run the Command on Slide 30 for Week-4. The new version of OpenSSL recognises "genpkey" for generating a private key instead of "genkey" as specified, so please change the "genkey" in the command to "genpkey" and you should be fine. All other commands whould be working fine. Assessment 1 Webinar Its my supplementary, so i need higher marks to pass

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd