diff_months: 11

Assessment 3: Details and instructions

Download Solution Now
Added on: 2024-11-22 18:30:15
Order Code: SA Student Sairan IT Computer Science Assignment(5_24_42703_721)
Question Task Id: 508145

Assessment 3: Details and instructions

Due date6/6/2024 - 11.59 pm (AEST/AEDT)

Weighting45%

Word count/length2500 words

The reference list is not included in the word count, but in-text citations are included.

Despite the strictest security protocols and measures, every organization has certain vulnerabilities that can be exploited by hacking attacks. Once these vulnerabilities are identified, cyber security professionals need to be well-equipped to securing them. Occasionally, however, these may not be secured in time. A security consultant also needs to be able to counter the attack with the resources available.

ThisAssignment 2requires you think about the multiple ways in which a business or an organizations security vulnerabilities can be exploited, and you will be required to defend against such attempts so as to disrupt a hacking attack and securing the organizations vulnerabilities.

Instructions

In this assignment, you will be provided with three context briefs from which you will be required to select any one business or organization for your analysis and complete the tasks below (A & B). As much as possible, focus on the details provided in the brief. Where information is not provided but integral to your analysis, make reasonable assumptions (which should be clearly stated and explained).

Vulnerability Analysis

Security Plan

1. Vulnerability Analysis

You will be required to assess organizational vulnerabilities for your chosen context and develop a defense plan to disrupt the hackers activities.

Selectthreeorganization vulnerabilities and compare them in terms of:

Level of potential exposure

Likelihood of this vulnerability being exploited.

Magnitude of potential impacts

Please note that yourthreeselected vulnerabilities should vary in all the above-mentioned characteristics.

2.Security Plan

Based on your chosen vulnerabilities,propose asecurity planthat can be implemented by your organisation to reduce exposure. Your security plan should include:

Focus on thesocial and organisation elementsof ensuring good security, and the trade-offs between security and freedom.

Suggest3 approachesthis organisation could take to enhance their cybersecurity, and for each approach discussThe resources required to implement this frameworkEvaluation of the effectiveness vs. costs of your proposed security plan

Ability of the proposed framework to cover multiple vulnerabilitiesImplications on the organisation and their core business

Trade-offs between security, privacy and freedom

How does the global environment around hacking improve or complicate your defense plan? Discuss the role of the local and global hacking community. Provide an example of one global organisation that could help you.

Context 1: School

Location & environment

Inner suburb school

On the outskirts of the city, with both residential and commercial buildings

Mid to high-density area

Technology

Password-protected Wi-Fi for students and staff

3 computer labs with 10 computers and network-connected printers

Use of personal iPads and laptop computers is allowed for studentsUse of externally hosted learning management system, which also manages grades and enrolment.

Externally hosted email for students (Gmail)

Externally hosted file sharing (Google Drive)

Staff files are secured within school firewall and cloud-synchronized on nightly basis.

All files are backed up on the school server every night.

Staff HR system runs on the school server (located on the premises)

People

1000 student, from grade 10 to 12

48 teachers, 9 maintenance staff, 12 casual staff

All permanent staff require police checks.

Students have given email address with their student ID and the school domainOther people engaged with the school include parents, community organisations, government staff and vendors.

Context 2: Cafe

Location & environment

Inner suburb cafe

On the outskirts of the city, with both residential and commercial buildings

Mid to high-density area

Technology

Password-protected Wi-Fi for staff and patrons

iPads used for taking orders, sending orders wirelessly to kitchen, and transmitting to cashier countersExternally hosted file sharing for staff (Google Drive)

Staff HR and POS systems run on the cafe server (located on the premises)

POS (Point of Sales) system with integrated:

Payment technologies

Staff rosters

Operating hours

Hourly sales reports

All files are backed up on the cafe server every nightPOS system and staff files secured within caf firewall and cloud-synchronised on a nightly basisPeople

Permanent full-time staff: 3 baristas, 5 waiters, 1 manager

2 maintenance staff who come in every evening after closing (8 pm)

All permanent staff require police checksMaintenance staff require reference checks with their previous employer(s)

Context 3: Hospital

Location & environment

Inner suburb hospital

On the outskirts of the city, with both residential and commercial buildings

Mid to high-density area

Technology

Password-protected Wi-Fi for visitors/patients

Visitors and patients can request for password from any receptionistHospital staff use different network, also password-protectedInternally hosted email for staff

Nurses and doctors are given a hospital iPad, receptionists use desktopsExternally hosted software system to manage electronic medical and health records (EMR, EHR)

Billing system

Prescriptions

Scanned documents

Medication tracking

Staff HR system runs on the hospital server (located on the premises)

Staff files are secured within hospital firewall and cloud-synchronised on nightly basisAll files are backed up on the hospital server every nightCloud files include those from 3 other hospitals in the chain, in surrounding suburbsPeople

Permanent full-time staff: 200 doctors, 500 nurses, 20 receptionists

Casual: 35 maintenance staff

Operate on roster, 5 each dayPermanent staff have thorough police & background checks with referencesStaff have given email address with their staff ID and the hospital domainOther people engaged with the hospital include community organisations, government staff and student volunteers.

Helpful resources and reference materials to help you write a Security Plan:

GOVSEC - 03 - Security planning and risk management (protectivesecurity.gov.au)https://www.ferc.gov/sites/default/files/2020-04/security-plan-example.pdfhttps://www.protectioninternational.org/wp-content/uploads/2012/04/1-7_Manual_English_3rdEd.pdfhttps://uniserveit.com/blog/10-step-cybersecurity-plan-for-your-small-businesshttps://blog.rsisecurity.com/how-to-write-an-effective-cybersecurity-plan-for-your-small-business

  • Uploaded By : Pooja Dhaka
  • Posted on : November 22nd, 2024
  • Downloads : 0
  • Views : 162

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more