Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

You are interviewed by an organisation such as your educational institute, a small to medium sized business, a division of large business/government organisation, or other moderate sized organisation, for a position of cybersecurity consultant to work in a cybersecurity program in the organisation.
As part of the interview, you are required to complete the following tasks:
• Task 1: discuss why risk assessment is the most critical step in developing and managing cyber security in the organisation and identify the limitations of the current risk assessment methods.
• Task 2: develop five questions and justify why you think they allow you to identify the most critical information assets of the organisation. Create a WFA template to rank the assets (you’ll do WFA in Ass2).
• Task 3: identify the top five threats to the organisation information assets. Support you finding by quoting reputable sources of information.
• Task 4: let's assume that an organisation website is one of the most criticalinformation assets of the organisation. Discuss how the top five threats could/could not impact the asset. Rank the threats based on their levels of impact
on the asset. Support your discussion by quoting reputable sources of information.You are free to make any assumption(s) you wish regarding the organisation structure, mission, vision, business profile, etc. which will need to be documented in the appropriate sections of your report.

Task 1: Identifying the Importance of Risk Assessment and Its Limitations

TASK – 1

Risk assessment is a process in which find the assets of an organization, which are affected from the outside attacks. In case of cyber security, the identification of assets, which are affected from the cyber-attacks, such as Privacy, data security, softwares, hardware. Based on these assets could find the risks for the organization (ACSC, 2017).  

Identification of risks in an organization is a tough process on the bases of their assets. There are so many types of failures and faults in the system because of the virus, worms, and threats. There are so many malwares, which affects the system from different sources. They may be harm hardware or softwares of the organization (Rouse, 2013). On the bases of risk assessment, every organization can characterize the system working; it can be change the processes, functions of the systems according to the risk assessments.

 According to my opinion, it is also beneficial for the identification of the threats for the system of organization. Based on risk assessment, system can determine inherent risk and impacts of different risks.  Risk assessment is helpful for customization of control environment. There are different controls according to risks in the system to the assets of an organization.  There are few different types of rating provided to the risks and based on them, administrator can take actions for that threats. It is divided into three categories basically, which are high, medium, and low. Basic risks of an organization from cyber-attacks are unauthorized access in to system, misuse of information, data leakage, process failure, Loss of data, and service disruption. They all are affected productivity of a system (Arlitsch & Edelman, 2014).   

TASK - 2

There are basic five questions about the identification of the critical information assets:

  • What is Information Assets of an organization?
  • What is identification of assets of an organization?
  • What is the value of assets of an organization?
  • What is Critical information assets management?
  • What are the types of informational assets of an organization?

A single entity, which is having body of knowledge in managed and organized manner, is known as information assets.   They are having financial value for an organization.  They are also public record with in few criteria. In case of information architecture, organization devices, data, and the processes are accepted as assets. Information assets are may be URL’s, and Meta data of the organization (qgcio.qld.gov.au, 2018). Critical information assets management is a task for protection and controlling the information assets of an organization. There are an information life cycles of a system. It is having rights for allowing changes over time in the system processes (Barkly, 2018).    

Every organization is dividing their informational assets in three groups, which are following:

  • Public
  • Internal
  • Restricted

All are separate according to the priority bases. These are depending on the risk assessment report of the organization (BWISE, 2018).     

Informational Assets

Criteria 1: Impact to revenue  

Criteria 2: Impact to Profitability

Criteria 3:Public Image impact

Weighted Score

Criteria Weight (1-100) must total 100

30

40

30

EDI Document set -1

EDI Document set -2

EDI Document set -3

Customers order via SSL

Customer service request via email

EDI: Electronic data exchange

SSL: Secure Socket Layer

TASK - 3

These are the threats for an organization:

  • Deliberate software attack
  • Technical hardware failure or errors
  • Acts of human error or failure
  • Technological obsolescence
  • Deliberate acts of theft

In case of information technology, threats are having different types, such as malwares. Cyber criminals are affect the system working or data of the organization through different processes. Few examples of threats are:

Malware: these are the malicious softwares, which are having a code. That code is damaging personal computers and other devices. It could be computer virus, worms, spyware, and Trojan horse. Hazards are the anything that poses threats to break the security of a computer system or damage them. It is may be defective hardware, corrupted system files, and hackers. Cyber-attacks are something like robbery of data or denied access to the computer system. Hackers are change data of a system or change the access of system. Sometime they demand ransom for providing access to the system (Sanchez, 2010).

Task 2: Developing Questions to Identify Critical Assets and Ranking Them

Incidents are the affected computers form the computer virus. They are totally corrupted from the malware and it will be an incidents. Security threats are so important for the organization. In case of the security attacks of an organization, there cyber security team is also responsible for the cyber-attacks. There are so any standards in different countries for cyber security. Government of Australia is making new policies and laws for the cyber security. They are helpful for the organizations for preventions of cyber-attacks. There is a way to avoid those cyber-attacks. Different organizations are providing cyber security facilities to the different companies. Mainly small businesses are affected from the cyber-attacks, because of less security (Fruhlinger, 2018).       

In above diagram, showing the results for the cyber-attack incidents in different countries between year 2015-2017. There are different ways to hack the system processes using the malwares. However, they are going through the unauthorized channels ( Bradford, 2018).  

TASK - 4

Confidentiality of information is a protecting the information of the organization from outside of the world. It means that information cannot share with the unauthorized parties. In this case, different things are considered in the information, such as bank account statements, personal information, credit card numbers, trade secrets, and government records ( Chia, 2012).   

Integrity of information means protecting information from hackers and unauthorized persons inside the system as well as outside. It means right information should transfer to the next party. It is also playing a major role for data integrity of an organization.  

Availability means, authorized person can access the information, when they require it. They are so many incidents in which an unauthorized person accesses the system and they made changes in the data, which is so costly for the organization (Kassa, 2017).   

There are so many methods for risk assessment of an organization. Especially in the Information technology based organization. There are so many risks from the cyber-attack, so, there should be a risk matrix for handling the different risk for the system. There are few priorities for different threats, hazards, and vulnerabilities of the system.

Threats

Ranks

 Deliberate software attack

1

Technical hardware failure or errors

3

Acts of human error or failure

2

Technological obsolescence

5

Deliberate acts of theft

4

References

Bradford, L., 2018. What You Need To Know About Cybersecurity In 2018. [Online]
Available at: https://www.forbes.com/sites/laurencebradford/2018/03/30/why-people-should-learn-about-cybersecurity-in-2018/#7c88f6fe5d00
[Accessed 11 December 2018].

Chia, T., 2012. Confidentiality, Integrity, Availability: The three components of the CIA Triad. [Online]
Available at: https://security.blogoverflow.com/2012/08/confidentiality-integrity-availability-the-three-components-of-the-cia-triad/
[Accessed 11 December 2018].

ACSC, 2017. Australian Cyber Security Centre. [Online]
Available at: https://www.acsc.gov.au/publications/ACSC_Threat_Report_2017.pdf
[Accessed 12 December 2018].

Arlitsch, K. & Edelman, A., 2014. Staying safe: Cyber security for people and organizations. Journal of Library Administration, 54(1), pp. 46-56.

Barkly, 2018. 5 Cybersecurity Statistics Every Small Business Should Know in 2018. [Online]
Available at: https://blog.barkly.com/small-business-cybersecurity-statistics-2018

BWISE, 2018. nist cyber security framework. [Online]
Available at: https://www.bwise.com/solutions/frameworks/nist-framework

Fruhlinger, J., 2018. Top cybersecurity facts, figures and statistics for 2018. [Online]
Available at: https://www.csoonline.com/article/3153707/security/top-cybersecurity-facts-figures-and-statistics.html
[Accessed 11 december 2018].

Kassa, S. G., 2017. IT Asset Valuation, Risk Assessment and Control Implementation Model. [Online]
Available at: https://www.isaca.org/Journal/archives/2017/Volume-3/Pages/it-asset-valuation-risk-assessment-and-control-implementation-model.aspx
[Accessed 11 December 2018].

qgcio.qld.gov.au, 2018. Information Asset (Definition). [Online]
Available at: https://www.qgcio.qld.gov.au/publications/qgcio-glossary/information-asset-definition
[Accessed 11 December 2018].

Rouse, M., 2013. information asset. [Online]
Available at: https://whatis.techtarget.com/definition/information-assets
[Accessed 12 December 2018].

Sanchez, M., 2010. The 10 most common security threats explained. [Online]
Available at: https://blogs.cisco.com/smallbusiness/the-10-most-common-security-threats-explained
[Accessed 12 Devember 2018].

Symantec, 2018. 10 cyber security facts and statistics for 2018. [Online]
Available at: https://us.norton.com/internetsecurity-emerging-threats-10-facts-about-todays-cybersecurity-landscape-that-you-should-know.html
[Accessed 11 December 2018].

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Tasks For Cybersecurity Consultant Role In An Organization Essay.. Retrieved from https://myassignmenthelp.com/free-samples/cmp71001-cybersecurity/cyber-attacks.html.

"Tasks For Cybersecurity Consultant Role In An Organization Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/cmp71001-cybersecurity/cyber-attacks.html.

My Assignment Help (2021) Tasks For Cybersecurity Consultant Role In An Organization Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/cmp71001-cybersecurity/cyber-attacks.html
[Accessed 25 April 2024].

My Assignment Help. 'Tasks For Cybersecurity Consultant Role In An Organization Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/cmp71001-cybersecurity/cyber-attacks.html> accessed 25 April 2024.

My Assignment Help. Tasks For Cybersecurity Consultant Role In An Organization Essay. [Internet]. My Assignment Help. 2021 [cited 25 April 2024]. Available from: https://myassignmenthelp.com/free-samples/cmp71001-cybersecurity/cyber-attacks.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close