PBL - Cyber Security Risk Assessment

Assignment Help Other Subject
Reference no: EM132502536 , Length: word count:4500 + 14 PPT

PBL - Cyber Security Risk Assessment - Risk Assessment Report

In this assessment, students must perform a risk analysis of a scenario organisation's cyber risk, identify threats and vulnerabilities of information assets, forecast the consequences of a successful attack and recommend how each threat should be treated.

The risk assessment must be able to cater for accidental or deliberate hardware, software and network failures or attacks. Please be aware that you will need to make assumptions and guestimates for this assessment to make your risk assessment plausible. It is perfectly okay to do this.

Topics -

The following are three scenarios to be used for the cyber security risk assessment report for Assessment.

Scenario 1 - You have worked for Commonwealth Bank for a number of years as a Security Analyst. You have recently been promoted to their head office as an IT Security Manager. You discover that, in the week prior to your arrival, the bank was the victim of a cyber-attack. You discover that they have not completed a risk assessment for a number of months. Therefore, you decide to conduct a comprehensive risk assessment of their Data Centre, which is contained in their head office, and serves the wider network and branches.

Scenario 2 - You work for a well-known retailer, Target Australia. They recently had a major attack on their IT systems. While dealing with the aftermath of the attack, it became apparent that their cyber security risk assessment was woefully inadequate and extremely outdated. You have been tasked with creating a new cyber security risk assessment. Your risk assessment should be able to be applied to all of the retail outlet's facilities, buildings and networks.

Scenario 3 - You work for an organization in an IT or IT security capacity. You can use your own organisation for the scenario.

There are many risk assessment templates available on the Internet which show what should be covered in a risk assessment report. Please review some of these (3 or more) and use them as a guide to creating your own risk assessment report. This is a major task. If done properly, it will take you many weeks to complete. Do not wholesale copy what are in the templates as the University plagiarism software will pick it up and you will fail the assessment.

Try to think of the important issues to the scenario organisation that you have chosen as all risk assessment reports will not be the same - they are designed to be specific to an organisation (or organisation type). It is understood that there is an element of guess-work in this but you should be able to create a good risk assessment report with the limited information you have. You should conduct preliminary research on the organisation that you are basing your RA on (structure, size, locations, management structure etc.) this way you are more likely to produce a piece of work that is realistic.

In the report you should highlight how you arrived at your likelihood, impact and overall risk rating for each of your risks/threats.

Your risk assessment controls and recommendations should be supported by references and citations.

You must justify and support why you have chosen a particular control/solution/response/recommendation.

More Scenarios - Write and present an issue-specific policy for:

- Bring Your Own Device (BYOD)

- Social networking at work

- Use of file sharing technologies

- Mobile phones

- Appropriate use of email

Include components such as management decisions, roles and responsibilities matrix, scope, communication plan etc.

Attachment:- Cyber Security Risk Assessment File.rar

Reference no: EM132502536

Questions Cloud

How you would address a breach of confidentiality : Post strategies you might prefer to use to ensure confidentiality in a treatment group for individuals living with HIV/AIDS. Describe how informed consent.
Determine hitung for cost of goods manufactured : Determine Hitung for Cost of Goods Manufactured and Cost of Goods Sold. PT. Ginting saat ini sedang menghitung biaya di dalam satu bulan tersebut.
Describe the challenges in merging the two cultures : Imagine that your hospital has recently merged with a group of clinical centers. As a high-level executive, you and your team have been asked to combine.
Book- and market-value balance sheets of the united frypan : Here are book- and market-value balance sheets of the United Frypan Company (figures in $ millions):
PBL - Cyber Security Risk Assessment : PBL - Cyber Security Risk Assessment - Perform risk analysis of a scenario organisation's cyber risk, identify threats and vulnerabilities of information assets
Compute cost per equivalent unit for fifo : Compute cost per equivalent unit for both the weighted average and FIFO methods. Pablo Company calculates the cost for an equivalent unit of production
Describe the gottman method of couple therapy : Post an explanation of how the Gottman Method of couple therapy and its underlying Sound Relationship House Theory differs from the therapies and theories you.
MGT600 Management, People and Teams Assignment : MGT600 Management, People and Teams Assignment Help and Solution, Laureate International Universities - Assessment Writing Service
What strategy does the traditional system of accounting : What strategy does this traditional system of accounting for store support costs suggest to increase the profitability of the Eugene store?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd