My Assignment topic is Cyber securityAssignment length should be 10-15 pages and the requirement is below 1. Cover page 2. Table of contents 3. Executive Summary (2-3 pages in length) 3.1 Provides a...

1 answer below »
My Assignment topic is Cyber securityAssignment length should be 10-15 pages and the requirement is below
1. Cover page


2. Table of contents


3. Executive Summary (2-3 pages in length)


3.1 Provides a clear statement of the technology project that is being assessed


3.2 An overview of your recommendations to management as to the merits of the project based on your risk assessment


4. Risk assessment based on threats, vulnerabilities and consequences (4 - 10 pages in length)
List assets - 10
Threats - 4
Vulnerabilities - 4


4.1 These are must be derived from an IT control framework and any existing industry risk recommendations for the project.


4.2 Identify and discuss the key threat agents.
 List threat agents
 Issues
 Consequences
 Include pictures, images, tables, analysis


4.3 What could be done to mitigate the risks and their impact on the system
 Impact
 Mitigation


5 Provide a brief summary (literature review) (2 - 4 pages in length)


5.1 Protection mechanisms you could employ for the information security.
 Safe guards
 Other measurements Security mechanisms
 like change in key principle of information security


6 Conclusion


7 References


8 Appendices








Answered Same DaySep 22, 2020ITC596Charles Sturt University

Answer To: My Assignment topic is Cyber securityAssignment length should be 10-15 pages and the requirement is...

Ankit answered on Sep 26 2020
153 Votes
11
Student Id    
                    Student Name
                    Cyber security
    
Table of contents
    Topic
    Page Number
    Executive Summary
    3 to 4
    Risk assessments
    4 to 7
    Security measurements
    7 to8
    Conclusion
    8 to 9
    References
    10
1. Executive Summary
Today attackers are more active so companies must expand their emphasis on cyber security to secure priv
ate information and frameworks. There is no organization whether it’s small or large is safe due to cyber attacks and even small threats could cause remarkable money related, reputational or administrative impacts. In order to protect the organization from cyber attacks, IT control framework can lessen the probability of threat, improve threat recognition and reaction, and quicken recuperation endeavours to restrain harm.
I am working in Gigantic Corporation as a communicator between Technologists in this company and Business stakeholder. Company saves its data on cloud as it provides them easy way to store and retrieve large amount of data. There are several advantages of cloud computing but companies are worried to store data on cloud due to rise in cyber attacks or security issues.
This document focuses on the current technology used in this company and threats or vulnerabilities from this technology. The main purpose of this report is to address current threats or vulnerabilities and list of assets. The document also focuses on how to prevent this threat and what protection mechanism is used.
1.1 Current Technology in company
Gigantic Corporation has various branches in other countries. It is good decision taken by Gigantic Corporation Ltd to move its data and infrastructure to cloud. There are various benefits of using cloud computing. Cloud computing is very good for their firm because this technology offers their best technological benefits i.e. client/server, adaptability and outsourcing. The good thing about this technology is it divided workload on various servers and this computing make high change in their IT infrastructure.
1.2 Security issues or threats to company from cloud computing
Cybercrime is one of the major issues now days. It is a noteworthy worry for most of firms. Indeed, even in the wake of migrating to the cloud, many organizations cannot excited in searching for cyber threats, and simply after they distinguish "smoke" do they perceive that they have a cyber attack. For instance, DoS makes essential information on the cloud inaccessible until the point when sufferer pay money to third party, generally in type of bitcoins, to get a key that will open the information. [Ecpi]
All firms face various level of risk associated with threats or Vulnerabilities. Threats inside company are intention to cause harm to their data or assets. This is responsibly of upper management to reduce risks from these threats. There is no organization whether it’s small or large is safe due to cyber attacks and even small threats could cause remarkable money related, reputational or administrative impacts. [Smith 2016]
                
Figure 1: Cloud Security risks
2. Risk assessments
“Vulnerabilities are flaws in the company framework or weakness that makes the hacker to take control of system or network. Many companies such as IT organizations, government organizations etc. are at the risk of vulnerabilities. Vulnerabilities can be classified as internal and external to firm.”
There are various security risks or vulnerabilities face by company in cloud as shown in figure 1 and some of the risks or vulnerabilities are explained below:
a) Data security, privacy and control risks:...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here