$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

SIT763 Cyber Security Management

tag 3 Downloads5 Pages / 1,022 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


This task requires you to demonstrate the ability to conduct an investigation of security management issues in corporate organisations based on a real-life case study as outlined in the background information provided below and write a report.

In your report, you will be required to follow prescribed procedures to evaluate risk levels and the potential impact of threats and vulnerabilities for a real-life  organisation.

You will be assessed on your ability to analyse the security requirements and objectives of the organisation as well as the efficacy of the risk management strategies that they’ve implemented.

Background Information

It is 2017. News has just broken of the WannaCry ransomware attack. The ransomware attack infected more than 230,000 computers in over 150 countries and  affected major corporations, such as Telefónica in Spain, the British National Health Service (NHS), FedEx, Deutsche Bahn, Honda, etc. The attack works by infecting the victim’s computers and encrypting their files. To decrypt the information, victims would need pay a ransom within 7 days, hence the name of the attack. It is known that small to medium enterprises were affected as well.

Based on the findings of the enquiry, your task is to write a report that includes the following:

1. A security risk assessment that evaluates risks, threats and vulnerabilities of organisations to ransomware attacks.

2. A business requirement analysis that assesses the impact of a ransomware attack to your organisation.

3. Assess security risks, threats and vulnerabilities to the organisation and implement appropriate information security protection mechanisms by analysing requirements, plans and IT security policies.



Security Risk Assessment

Security Risks, Threats and Vulnerabilities

The assessment of security risks would be based on the identification, assessment and implementation of the key controls of security within the various applications used by the industry. With the carrying out of the risk assessment within the organisation, it would be beneficial for performing a risk assessment [1]. This form of risk assessment would be able to support the managers in making an informed allocation of resources, tooling and decisions based on implementation of security controls.

Based on the WannaCry ransomware attacks, it would be extremely necessary to assess the risk models. This would be extremely necessary for securing the assets of the organisation and thus be able to secure the important and private data that would be related to their clients. The concerned organisation should be able to carry out generalized assessments during the consideration of time or budget related constraints [2]. The steps of a successful security risk assessment model are:

  1. Identification– This step should be able to consider the critical assets based on the technological infrastructure [3]. The sensitive that would be created, stored or transmitted based on these assets should be diagnosed properly.
  2. Assessment– This step would be essential for administering an approach based on the assessment of the identification of the security risks based on critical assets of the organisation. After a careful form of evaluation and assessment, it would be helpful for determining the ways in which they would be effective and efficiently allocation of time and resources towards the mitigation of risks [4]. The assessment based approach or methodology should be useful for analysing the correlation between threats, assets, vulnerabilities and controls of mitigating the risks.
  3. Mitigation– An approach based on mitigation and enforcement of security controls based on each kind of risks should be introduced within the security assessment risk model.
  4. Prevention– The implementation of processes and tools in order to minimize the amount of vulnerabilities and threats from occurring within the resources of firm would be essential.

The inclusion of these kind of steps within the security risk assessment would be beneficial for assessing the different kinds of security risks, vulnerabilities and threats. These would be in association with the ransomware attacks that includes WannaCry.


Business Requirement Analysis

In the recent times, the impact of ransomware would be on a high rise. This is due to the reason that cybercriminals have developed new means to harm the businesses. Some of the multiple steps that would be needed to be taken by the business in order to prevent them from the stroke of ransomware are:

  • Ensuring that a proper form of antivirus would be installed within the business systems. The software should be kept updated across each of the endpoints within the business processes [5]. ‘Advanced Threat Protection’ module should be employed within the business suite that would comprise of a suite of business protection rules based on protecting against ransomware.
  • Establishment of security awareness campaigns that would stress against the avoidance of clicking on some kind of attachments and links should be included [6]. Phishing could be considered as an entrance vector based on ransomware.
  • Backup of Data– The backing up of data within the cloud platform should be considered as the most important option based on securing the data of the clients and the business data. This would be helpful for detecting any form of ransomware attack ion the business systems [7]. It would be imperative in order to remove the external storage device once a backup of the files have been taken. This method would be necessary for preventing the infection of the computer.
  • GPO Restrictions – This could be defined as an easy and affordable method based on the restriction of malwares and ransomware from getting involved on the computing systems. The GPO would be able to provide a granular control over the various execution of files [8]. Hence, the addition of rules that would block the activity of execution of files would be executable.
  • Patching – This process would exploit the third party softwares that includes Flash, Java and Adobe would prevent such kind of attacks from getting successful.


Based on the discussion, it could be concluded that the inclusion of a proper form of security risk assessment would be beneficial for the business. This kind of assessment would be extremely beneficial for the business to secure their internal servers and workstations from getting affected to the worst kind of ransomware attacks such as WannaCry. The discussion provides the different steps of risk assessment that would be beneficial and should be followed by the organisation. The report also discusses about the business requirement analysis and the key form of business requirements that would be needed to be put into proper place based on the growing risks from security aspects. Hence, the following of the certain kind of steps would be extremely beneficial for the security of the organisational assets. This would be extremely helpful in the creation of a healthy work environment and would also enhance the prosperity of the entire organisation.



T.R. Peltier, Information security fundamentals. CRC Press, 2013.

S. Mohurle and M. Patil, A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 2017.

Y. Cherdantseva, P. Burnap, A. Blyth, P. Eden, K. Jones, H. Soulsby, and K. Stoddart, A review of cyber security risk assessment methods for SCADA systems. Computers & security, 56, pp.1-27, 2016.

T. Sommestad, M. Ekstedt, and H. Holm, The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures. IEEE Systems Journal, 7(3), pp.363-373, 2013.

K. Wiegers, and J. Beatty, Software requirements. Pearson Education, 2013.

J.W. Rittinghouse and J.F. Ransome, Cloud computing: implementation, management, and security. CRC press, 2016.

D.D. Wu, S.H. Chen, and D.L. Olson, Business intelligence in risk management: Some recent progresses. Information Sciences, 256, pp.1-7, 2014.

N. Brender and I. Markov, Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International journal of information management, 33(5), pp.726-733, 2013.


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Cyber Security Management. Retrieved from

"Cyber Security Management." My Assignment Help, 2020,

My Assignment Help (2020) Cyber Security Management [Online]. Available from:
[Accessed 26 May 2020].

My Assignment Help. 'Cyber Security Management' (My Assignment Help, 2020) <> accessed 26 May 2020.

My Assignment Help. Cyber Security Management [Internet]. My Assignment Help. 2020 [cited 26 May 2020]. Available from: helps in writing all types of discussions for any essay topics and any subjects. With a group of over 4000+ PhD experts we have most insightful resource for writing any discussion. So the next time you are wondering how to write a discussion essay, get essay help from us. We segregate the topics of discussions into general and specific, link explanation, description, theory and findings to literature in the best possible way, using the best possible narration. Over periods of time our team has mastered the art of writing great essay. So our work gets accolades from teachers and secures grades. Connect with us today if you have any discussion writing woes.

Latest It Write Up Samples

CO4512 Information Security Management

Download : 0 | Pages : 12
  • Course Code: CO4512
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction There are different ISO standards that are used as a baseline for the security of the information in an organization. The ISO standards is used for avoiding breaches in the network, reassuring the customers, gaining an edge and access new market opportunities. It is internationally recognized and applied for management of the safety practices and used as a systematic approach for increasing reliability and enforcement of th...

Read More arrow

COIS13013 Business Intelligence

Download : 0 | Pages : 10

Answer: Part A The company, which has been chosen in this case, is “Cloud-Pty Limited”. It is actually a cloud-based software development company that is based in Brisbane, Australia. The organisation is deciding to start newer and better responsive cloud-based software applications in the required market. Not very long ago, the dynamic and competitive advantage has formulated some very wrong decisions of investment. At present the ...

Read More arrow

ITECH1001 Communications And Technology

Download : 0 | Pages : 5
  • Course Code: ITECH1001
  • University: Federation University
  • Country: Australia

Answer: [1] Journal Title of article:  A Forecast of the Adoption of Wearable Technology Author: Page, Tom URL (if available):  Date accessed:  18 Apr, 2018 Journal Title: International Journal of Technology Diffusion  Year of publication:  2015 Page Numbers: 12-29 Volume no: 6 Issue no: 2 Summary of article This article describes about the en...

Read More arrow

COIT20248 Information Systems Analysis And Design 2

Download : 0 | Pages : 10

Answer: Introduction  The report mainly focusses on the information system development for the “UNICEF Child Care” organization so that the problems that the organization is facing due to the utilization of manual system can be mitigated easily. The new system will provide the facility of depositing fees online and after the payment, a thanking email for the payment will be generated automatically. The data as well as informa...

Read More arrow

BUS5BIM Business Information Systems Management

Download : 0 | Pages : 2
  • Course Code: BUS5BIM
  • University: La Trobe University
  • Country: Australia

Answer: Business identification and IT goals This particular report is focused on the development of a coffee vending machine and its internal processes to be followed for its successful implementation. The aim of the system is to increase the efficiency of the process whenever a user will request for coffee by inserting coin into it..  In order to reduce the errors in the coffee vending machine advanced level of set up are acquired to b...

Read More arrow

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

647 Order Completed

98% Response Time

Adlina Han

Masters in Marketing with Specialization in Branding

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2830 Order Completed

97% Response Time

Leroy Bicknell

MBA in Marketing

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1692 Order Completed

98% Response Time

Alfred Dodd

PhD in Computer and Information Science with specialization in Database

Wellington, New Zealand

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

Very well done. I\'m really happy with 5he result. I will be back for another assignment.


User Id: 406321 - 26 May 2020


student rating student rating student rating student rating student rating

Expert did an awesome job. Assignment was organized, in-depth and filled with a wealth of information. Although, I had to correct a few errors, they did not cause a distration from the content while reading. Great Job!


User Id: 413864 - 26 May 2020


student rating student rating student rating student rating student rating

pretty pleased with this assignment even though i had to add extra information and few edits grammatically


User Id: 416694 - 26 May 2020


student rating student rating student rating student rating student rating

The tutor make the assignments best without plagiarism and on time. I like the work they did for students . All the assignments are best . Thankyou


User Id: 417750 - 26 May 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?