This task requires you to demonstrate the ability to conduct an investigation of security management issues in corporate organisations based on a real-life case study as outlined in the background information provided below and write a report.
In your report, you will be required to follow prescribed procedures to evaluate risk levels and the potential impact of threats and vulnerabilities for a real-life organisation.
You will be assessed on your ability to analyse the security requirements and objectives of the organisation as well as the efficacy of the risk management strategies that they’ve implemented.
It is 2017. News has just broken of the WannaCry ransomware attack. The ransomware attack infected more than 230,000 computers in over 150 countries and affected major corporations, such as Telefónica in Spain, the British National Health Service (NHS), FedEx, Deutsche Bahn, Honda, etc. The attack works by infecting the victim’s computers and encrypting their files. To decrypt the information, victims would need pay a ransom within 7 days, hence the name of the attack. It is known that small to medium enterprises were affected as well.
Based on the findings of the enquiry, your task is to write a report that includes the following:
1. A security risk assessment that evaluates risks, threats and vulnerabilities of organisations to ransomware attacks.
2. A business requirement analysis that assesses the impact of a ransomware attack to your organisation.
3. Assess security risks, threats and vulnerabilities to the organisation and implement appropriate information security protection mechanisms by analysing requirements, plans and IT security policies.
The assessment of security risks would be based on the identification, assessment and implementation of the key controls of security within the various applications used by the industry. With the carrying out of the risk assessment within the organisation, it would be beneficial for performing a risk assessment . This form of risk assessment would be able to support the managers in making an informed allocation of resources, tooling and decisions based on implementation of security controls.
Based on the WannaCry ransomware attacks, it would be extremely necessary to assess the risk models. This would be extremely necessary for securing the assets of the organisation and thus be able to secure the important and private data that would be related to their clients. The concerned organisation should be able to carry out generalized assessments during the consideration of time or budget related constraints . The steps of a successful security risk assessment model are:
The inclusion of these kind of steps within the security risk assessment would be beneficial for assessing the different kinds of security risks, vulnerabilities and threats. These would be in association with the ransomware attacks that includes WannaCry.
In the recent times, the impact of ransomware would be on a high rise. This is due to the reason that cybercriminals have developed new means to harm the businesses. Some of the multiple steps that would be needed to be taken by the business in order to prevent them from the stroke of ransomware are:
Based on the discussion, it could be concluded that the inclusion of a proper form of security risk assessment would be beneficial for the business. This kind of assessment would be extremely beneficial for the business to secure their internal servers and workstations from getting affected to the worst kind of ransomware attacks such as WannaCry. The discussion provides the different steps of risk assessment that would be beneficial and should be followed by the organisation. The report also discusses about the business requirement analysis and the key form of business requirements that would be needed to be put into proper place based on the growing risks from security aspects. Hence, the following of the certain kind of steps would be extremely beneficial for the security of the organisational assets. This would be extremely helpful in the creation of a healthy work environment and would also enhance the prosperity of the entire organisation.
T.R. Peltier, Information security fundamentals. CRC Press, 2013.
S. Mohurle and M. Patil, A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 2017.
Y. Cherdantseva, P. Burnap, A. Blyth, P. Eden, K. Jones, H. Soulsby, and K. Stoddart, A review of cyber security risk assessment methods for SCADA systems. Computers & security, 56, pp.1-27, 2016.
T. Sommestad, M. Ekstedt, and H. Holm, The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures. IEEE Systems Journal, 7(3), pp.363-373, 2013.
K. Wiegers, and J. Beatty, Software requirements. Pearson Education, 2013.
J.W. Rittinghouse and J.F. Ransome, Cloud computing: implementation, management, and security. CRC press, 2016.
D.D. Wu, S.H. Chen, and D.L. Olson, Business intelligence in risk management: Some recent progresses. Information Sciences, 256, pp.1-7, 2014.
N. Brender and I. Markov, Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International journal of information management, 33(5), pp.726-733, 2013.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2020). Cyber Security Management. Retrieved from https://myassignmenthelp.com/free-samples/sit763-cyber-security-management.
"Cyber Security Management." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/sit763-cyber-security-management.
My Assignment Help (2020) Cyber Security Management [Online]. Available from: https://myassignmenthelp.com/free-samples/sit763-cyber-security-management
[Accessed 26 May 2020].
My Assignment Help. 'Cyber Security Management' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/sit763-cyber-security-management> accessed 26 May 2020.
My Assignment Help. Cyber Security Management [Internet]. My Assignment Help. 2020 [cited 26 May 2020]. Available from: https://myassignmenthelp.com/free-samples/sit763-cyber-security-management.
Myassignmenthelp.com helps in writing all types of discussions for any essay topics and any subjects. With a group of over 4000+ PhD experts we have most insightful resource for writing any discussion. So the next time you are wondering how to write a discussion essay, get essay help from us. We segregate the topics of discussions into general and specific, link explanation, description, theory and findings to literature in the best possible way, using the best possible narration. Over periods of time our team has mastered the art of writing great essay. So our work gets accolades from teachers and secures grades. Connect with us today if you have any discussion writing woes.
Answer: Introduction There are different ISO standards that are used as a baseline for the security of the information in an organization. The ISO standards is used for avoiding breaches in the network, reassuring the customers, gaining an edge and access new market opportunities. It is internationally recognized and applied for management of the safety practices and used as a systematic approach for increasing reliability and enforcement of th...Read More
Answer: Part A The company, which has been chosen in this case, is “Cloud-Pty Limited”. It is actually a cloud-based software development company that is based in Brisbane, Australia. The organisation is deciding to start newer and better responsive cloud-based software applications in the required market. Not very long ago, the dynamic and competitive advantage has formulated some very wrong decisions of investment. At present the ...Read More
Answer:  Journal Title of article: A Forecast of the Adoption of Wearable Technology Author: Page, Tom URL (if available): http://irep.ntu.ac.uk/id/eprint/32219/1/9768_Page.pdf Date accessed: 18 Apr, 2018 Journal Title: International Journal of Technology Diffusion Year of publication: 2015 Page Numbers: 12-29 Volume no: 6 Issue no: 2 Summary of article This article describes about the en...Read More
Answer: Introduction The report mainly focusses on the information system development for the “UNICEF Child Care” organization so that the problems that the organization is facing due to the utilization of manual system can be mitigated easily. The new system will provide the facility of depositing fees online and after the payment, a thanking email for the payment will be generated automatically. The data as well as informa...Read More
Answer: Business identification and IT goals This particular report is focused on the development of a coffee vending machine and its internal processes to be followed for its successful implementation. The aim of the system is to increase the efficiency of the process whenever a user will request for coffee by inserting coin into it.. In order to reduce the errors in the coffee vending machine advanced level of set up are acquired to b...Read More
Just share Requriment and get customize Solution.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Very well done. I\'m really happy with 5he result. I will be back for another assignment.
Expert did an awesome job. Assignment was organized, in-depth and filled with a wealth of information. Although, I had to correct a few errors, they did not cause a distration from the content while reading. Great Job!
pretty pleased with this assignment even though i had to add extra information and few edits grammatically
The tutor make the assignments best without plagiarism and on time. I like the work they did for students . All the assignments are best . Thankyou