MIS607_Assessment_2_Case Scenario XXXXXXXXXXPage 1 of 1 Case Scenario The Business & Communication Insurance (B&C Insurance) began business as a private health insurer, established by Gary RT.L &...

1 answer below »
Check files


MIS607_Assessment_2_Case Scenario Page 1 of 1 Case Scenario The Business & Communication Insurance (B&C Insurance) began business as a private health insurer, established by Gary RT.L & family in 1965 through the Health Insurance Commission. This company was set up to compete with private "for-profit" funds. The company’s headquarters is located in New York and has offices in various other countries including Spain, Australia and Hong Kong. The CEO of the B&C Insurance recently received a ransom email from an unknown company claiming that they have access to the company strategic plans and personal details of 200,000 clients. A sample of personal details of 200 clients was included in the email as a ‘proof’. Ransom emails are normally sent through unreliable external networks that are outside the company’s security boundary. The CEO consulted the senior management and they acted promptly to investigate and contain the threat with the aid of forensic computer specialists. The first step was to validate the threat. The management team found a discussion on a hacker site in the dark net that had personal information of 200,000 clients of B&C Insurance for sale. This also included the details of the 200 clients, provided in the ransom email as ‘proof’. The investigation also confirmed that the details of the 200 customers are genuine. The senior management considered the need to identify threats and give practical guidance on how to manage the risks of identity fraud to be of utmost importance. Therefore, a team of consultants was appointed to prepare a series of reports to identify various threats and to develop cybersecurity crisis management plans in order to respond to potential threats/ risks of sophisticated hackers penetrating into the internal systems of the company and accessing client information. As the cybersecurity specialist in the team, you have been asked to write a report to identify the threat types and key factors involved. In doing so, you are required to identify the most ‘at-risk’ components, create awareness among the staff of such high-risk components and how to manage them. In addition, this report is to help key stakeholders, including the executive managers, to make decisions on what course of actions must be undertaken to mitigate potential threats. https://en.wikipedia.org/wiki/Health_Insurance_Commission MIS607_Assessment_3_Brief_Mitigation plan for threat report_ Module 6.1 Page 1 of 4 Task Summary For this assessment, you are required to write a 2500 words mitigation plan for threat report based on knowledge you gained about threat types and key factors in Assessment 2. You are required to use the Assessment 2 case as context to write a report to address or alleviate problems faced by the business and to protect the customers. In doing so, you are required to demonstrate your ability to mitigate threat/risks identified in Assessment 2 through the strategy you recommend (STRIDE). Context Cybersecurity help organizations to mitigate threats/risks, reduce financial loss and safety violations, decrease unethical behaviour, improve customer satisfaction, and increase efficiency, as well as to maintain these improved results. Threats can be resolved by Risk Acceptance (doing nothing), Risk Transference (pass risk to an externality), Risk Avoidance (removing the feature/component that causes the risk) and Risk Mitigation (decrease the risk). This assessment gives you an opportunity to demonstrate your understanding of cybersecurity and your capability to explain Risk Mitigation strategies for such threats. Mitigations should be chosen according to the appropriate technology and resolution should be decided according to the risk level and cost of mitigation. Task Instructions 1. Read the Assessment 2 Case Scenario again to understand the concepts discussed in the case. 2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the mitigation plan for threat report. 3. The mitigation plan for threat report should address the following: • Setting priorities for risks/threats ASSESSMENT 3 BRIEF Subject Code and Title MIS607 Cybersecurity Assessment Mitigation Plan for Threat Report Individual/Group Individual Length 2500 words (+/- 10%) Learning Outcomes The Subject Learning Outcomes demonstrated by successful completion of the task below include: b) Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data. c) Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution. d) Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts. Submission Due by 11:55pm AEST Sunday end of Module 6.1 Weighting 45% Total Marks 100 marks MIS607_Assessment_3_Brief_Mitigation plan for threat report_ Module 6.1 Page 2 of 4 • Analyse the case in terms of identified risk categories and scenarios • Apply standard mitigations • Discuss specific resolutions for improvement, and justify their significance • Provide recommendations for mitigating risk based on an assessment of risk appetite, risk tolerance and current risk levels (Choose techniques to mitigate the threats) • Make recommendations to the CEO on how to conduct risk management, key issues involving your process improvement model, including a road map, the identification of appropriate technologies for the identified techniques, communicating the strategy, and a suggested timeline. 4. The report should consist of the following structure: A title page with subject code and name, assignment title, student’s name, student number, and lecturer’s name. The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in mitigation plan report. You will need to inform the reader of: a) Your area of research and its context (how to mitigate or manage threats) b) The key concepts you will be addressing c) What the reader can expect to find in the body of the report The body of the report will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the report. Set priorities for identified threats from assessment 2, analyse the case in terms of identified risk categories and discuss specific resolutions and recommendations for improvements in the body of the report. The conclusion (will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report. 5. Format of the report The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning. 6. Referencing There are requirements for referencing this report using APA referencing style for citing and referencing research. It is expected that you used 10 external references in the relevant subject area based on readings and further research. Please see more information on referencing here: https://library.torrens.edu.au/academicskills/apa/tool 7. You are strongly advised to read the rubric, which is an evaluation guide with criteria for grading the assignment—this will give you a clear picture of what a successful report looks like. Submission Instructions Submit Assessment 3 via the Assessment link in the main navigation menu in MIS607 Cybersecurity. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades. Academic Integrity Declaration I declare that, except where I have referenced, the work I am submitting for this assessment task is my own work. I have read and am aware of the Torrens University Australia Academic Integrity Policy and Procedure viewable online at http://www.torrens.edu.au/policies-and-forms. I am aware that I need to keep a copy of all submitted material and their drafts, and I will do so accordingly. https://library.torrens.edu.au/academicskills/apa/tool http://www.torrens.edu.au/policies-and-forms MIS607_Assessment_3_Brief_Mitigation plan for threat report_ Module 6.1 Page 3 of 4 Assessment Rubric Assessment Attributes Fail (Yet to achieve minimum standard) 0-49% Pass (Functional) 50-64% Credit (Proficient) 65-74% Distinction (Advanced) 75-84% High Distinction (Exceptional) 85-100% Visual appeal and presentation of content Title page included. Adheres to the font, spacing, format, word count requirement. Appropriate use of paragraphs, sentence construction, spelling, and grammar. 20% No title page. Incorrect font and size with poor line spacing and large gaps in pagination, tables, or diagrams. Report is written as a block of text with no breaks in between ideas. Separate ideas cannot be clearly discerned. Many errors in spelling or grammar. Does not adhere to the word count requirement. Title page is included. Missing most information. Incorrect font and size is used or poor line spacing and large gaps in pagination
Answered Same DayNov 27, 2021

Answer To: MIS607_Assessment_2_Case Scenario XXXXXXXXXXPage 1 of 1 Case Scenario The Business & Communication...

Asif answered on Nov 28 2021
154 Votes
Running Head: Mitigation plan for threat report
3
Mitigation plan for threat report
Mitigation plan for threat report
Table of Contents
Introduction    3
Discussion    3
Risk priorities    3
Analysing the identified case and risks    5
Applying standard mitigations    6
Resolution for improvement and justification    7
Recommending techniques for mitigating the risks    7
Recommendation to the CEO    8
Conclusion    9
Reference List    11
Introduction
The ultimate purpose of this present study paper is to offer proper mitigating planning for one company’s cyber threats. The
mitigation planning will be aligned as per the cyber security standard and techniques. Cyber security is all about protecting the internet-connected systems like data, software and hardware from any cyber-attacks. This practice has been implemented through enterprises and individuals for protecting the company's IT platform against all typed unauthorized access to the computerized systems and data centres. Hence, the prime concepts that this present study paper will be covering are identifying the risks and then prioritizing them. In addition to this, the identified risks’ relevance to the considered company then will be analysed. The study then will outline some standard mitigating standards with justified resolution. Some key techniques will thus be proposed to the considered company’s CEO so that proper road map can be outlined for mitigating all the identified risks. The readers of this study hence might expect to attain one in-depth understanding on cyber identity threat and its mitigating techniques.
Discussion    
Risk priorities
Risk is the likelihood of losing something of value and based on future uncertainty. In the same way, it can be said that, It is likelihood of negative occurrence, loss and damage. The risks that can be identified from the given case of B&C Insurance Company are as follows:
· Reputational risk: It is also called reputation risk/danger/ threat to the strong image or name of a particular business entity. This has a direct and indirect negative impact on the overall success and growth of the company. These types of risk may occur due to inappropriate actions of a company itself or actions of employees. Moreover, it is also found that, this risk often outcomes from a gap among what the company says and what it is perceived to have done. In the same way, it is not only important but also essential for the organization to maintain its business reputation in the market and industry to grow and expand business in an effective and proper manner.
· Risk of losing Existing clients: it is the risk occurs when a company or organization fails to offer expected products or services to its existing customer in timely manner. This is also have major impact on the success of a company. On the other hand, it should also be noted down that, this types of risk is faced by a company due to a number of specific causes including poor customer services, products or services offered by the company failed to meet expectations, wants and needs of customers, lack of value, Inconsistent business, out-dated sales or marketing strategies. So, a company should pay attention on retaining and attracting its base of existing customers to manage such types of risks in an effective and proper manner.
· Facing legal cases on the context of “breaching of privacy”:
· Risk of misusing business data: These types of risks are generally faced by a company when any third party or hackers hack the private or confidential data of a company and use for their own purpose in order to gain profit. For case, any hacker can hack the business data of a company and sell it to others to earn profit. Hence, it is essential for a company to adopt more advanced technology or cyber security polices in order to mitigate such types of risks successfully.
· Financial damage risk: It is also called economic or financial risk which is the possibility of losing money on an investment or business venture. This may affect the financial strength and position of a company directly or indirectly.
After identifying all the “at-risk” components, the probable risks will now be prioritized here. Hence, at the very first, the risk of misusing the confidential data will be put. It is because 200,000 clients’ personal information has been stolen and hence the clients’ personal safety is at high stake. The company needs to take up its responsibility to safeguard the clients’ well-being and hence this identified risk should be prioritized on the foremost. Then the reputational risk will be placed. Along with this, it should also be noted down that, this hacking is sure to arouse questions on the company’s IT safety context. Thus the company can lose all its viability and trust among its clients (Riedy & Hanus, 2016). It can completely ruin the brand reputation of the considered firm on a long-term basis. Hence, this risk is prioritized in the second spot. Thirdly, the risk of losing all the clients should be prioritized. Along with this, it is also important to know that, the company having lost its reputation will also suffer from losing the clients. Both these risks are thus prioritized one after other. In addition to this, the risk of encountering legal prosecution on the legislative norms of “breaching of privacy” is then prioritized. It is because some clients can sue the company under the charges of negligence on clients’ safety context. Hence, the company needs to be ready to deal with such risk. At the same time, it is found and analyzed that, the financial damage risk whereas will be prioritized at last. It is because if...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here