Task Description

You are interviewed by Southern Cross University for a position of cybersecurity consultant to work in a university’s cybersecurity program. As part of the interview, you are required to complete the following tasks:

  • Task1: discuss why risk assessment is the most critical step in developing and managing cyber security in the university and identify the limitations of the current risk assessment
  • Task2: develop five questions that allow you to identify the most critical information assets of the Create a WFA template to rank the assets.
  • Task3: identify the top five threats to the university information Support you finding by quoting reputable sources of information.
  • Task4: let’s assume that the university website is one of the most critical information asset of the Discuss how the top five threats could/could not impact the asset. Rank the threats based on their levels of impact on the asset. Support your discussion by quoting reputable sources of information.

 

Assignment-1 guideline

Task 1: The importance of risk assessment

To complete this task, use the following questions to guide your discussion:

  • What is risk assessment?
  • What do you know by performing cybersecurity risk assessment?

 

 

  • What do you think is difficult for you to do/obtain in the risk assessment process?
  • Howrisk assessment results are used to develop and manage cybersecurity and how they can affect the business decision making process?

Task 2: Critical asset identification

To complete this task, use the following questions to guide your thought:

  • What is an information asset?
  • What make an information asset critical?
  • What can be included in WFA to classify the university information assets?

Task 3: Threat identification

To complete this task, use the following guidelines:

  • Clearlyunderstand the difference between important security concepts including threats, hazards, attacks and
  • Searchfor security threat, incident and trend reports and use the results from reputable sources such as government organisations and security
  • Identifyrelevant threats by studying statistics and figures found in the
  • Summarizeeach threat, threat agent, method of delivery and working mechanism

Task 4: Threat assessment

To complete this task, use the following guidelines:

  • Identify potential  weaknesses  (vulnerabilities)  of  the  asset  based  on  three information security components: confidentiality, integrity and
  • Study the working mechanism of each threat to assess the potential impact of the threat on the asset by exploiting the Use your own and public domain knowledge to help you with the impact assessment.

Format and Presentation

You are recommended to present the assignment in a standard report format with the title page that details your name, student-id, unit, course and date/time information. You will also provide a TOC page for the navigation. There is no report template to be used in this assignment so you can design your own template or refer to online resources. However, the report should be well presented with clear headings, titles and subtitles.

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!