Assessment 3Assessment type: Practical and Written Assessment, Individual assignment (2000 words).Purpose: The purpose of this assignment is to assess the students' understanding on identifying the...

1 answer below »
Assessment 3Assessment type: Practical and Written Assessment, Individual assignment (2000 words).Purpose: The purpose of this assignment is to assess the students' understanding on identifying the risks,vulnerabilities and awareness of current industry and research trends in the field of information security.Students need to exercise operational, analytical, and critical skills in order to reduce the potential securityrisks involved in the given case study. Analyse and evaluate the organizational adoption of securitycontrols. Design solutions for concrete security problems for distributed applications. This assessmentcontributes to learning outcomes a, b, c, d.Value: 35%Due Date: 16 June 2022 by 6:00 pmSubmission requirements details: All work must be submitted on Moodle by the due date.Reference sources must be cited in the text of the report and listed appropriately at the end in a referencelist using Harvard Anglia referencing style.Assessment topic: Risk identification, assessment and treatmentTask details: This Assignment requires you to perform risk identification, assessment and treatment basedon the given case study. Also, it is required to implement ethical hacking (which does not do any maliciousactivity) on your own virtual machine. This is just for demonstration purposes and focusing the riskidentification, assessment and treatment accordingly and you should not implement it on any othercomputers.The assignment' requirements are Kali Linux and the required tools.Case Study for the Assignment: A pharmacy is specialized on selling health products. The pharmacy'smain sales are through their e-commerce website, where customers can issue orders and pay online. Thepharmacy can receive orders through the following lines of salesOnline e-commerce websitePhone callsEmail ordersThen the sales team are responsible on checking those emails and orders, prepare them and the deliverthem to customer. This business got an exponential growth since 2020. This steady growth also broughtchallenges for the pharmacy. They have to secure the sensitive information of their employee:customerand the most important assets are the orders Database. Moreover, their employees receive many emailsand they have to filter the orders emails from other emails, The pharmacy had no dedicated security teamand therefore till now no security policy is in place. Data breaches could have the pharmacy puts itsreputation at risk, and patient expect a high level of protection of their data. It is highly recommended thatthere is a need to impose a certain level of filtering for the network to be secure so as to sustain fromthreats and attacks. To add restrictions on a particular network it is necessary to identify the possiblethreats to the organization. For example, it is necessary to identify the important services that run on thenetwork. In order to get this done, there is a need to perform scanning on the network to identify theservices and ports of the applications. Furthermore, the firewall needs to be configured by adding rules toblock and allow the services based on the requirements of the organization and the security perspectivesof the network.Part A:The pharmacy had no dedicated security team and therefore till now no security policy is in place.Recently, the governing body of this business forms a security team and makes following two goals thatthey would like to achieve in six months -Assessing the current risk of the entire businessTreat the Risk as much as possibleTask 1: Risk IdentificationIn achieving the above two goals, you will do the followings -1.Find at least five assets2.Find at least two threats against each asset3.Identify vulnerabilities for the assetsTask II: Risk AssessmentAt the end of the risk identification process, you should have i) a prioritized list of assets and il) a prioritizedlist of threats facing those assets and iii) Vulnerabilities of assets. At this point, create Threats-Vulnerabilities-Assets (TVA) worksheet. Also, calculate the risk rating of each of the five triplets out of 25.TASK III: Risk TreatmentIn terms of Risk Treatment, for each of the five identified risk, state what basic strategy you will take. Justifyfor each decision. Also, Advise all possible protection mechanism and corresponding place of application.Part B:For better understanding of the above tasks, implement threat on your own virtual machine and considertasks I, II, and III of part A:Tips: You may implement XSS attack or SQL Injection or any other attacks that you can run it on kali linuxyour own systemNOTE: You should not run the attacks on any other systems as you are not allowed to collect auser's personal Information due to the cybercrime.SectionDescriptionMarksSummary on what the report is addressing1. Executive Summary
Include a short description about the case study and2. Introduction on what is security from theorganization's perspective and what is the need for asecurity plan.3. Risk identification4. Risk Assessment5. Risk Treatment6. Screenshot of kali linux7. Conclusion8. References
Answered Same DayJun 15, 2022

Answer To: Assessment 3Assessment type: Practical and Written Assessment, Individual assignment (2000...

Amar Kumar answered on Jun 16 2022
81 Votes
Executive summary
There has been a critical flood in online protection examination to help digital applications and keep away from the key security risks that these applications face. The reason for this examination is to find and investigate normal network safety weaknesses. An exhaustive planning research was finished to achieve this point, and 69 principal studies were found and evaluated altogether. Following a carefu
l assessment of the examination, we decided the most basic security defects and their recurrence of event. Information was likewise accumulated and broke down to show the distribution scene, country of distribution, significant designated framework, and applications, in addition to other things. The discoveries recommend that the security methods talked about so far are just worried about security by and large, and that the arrangements proposed in these examination require extra experimental approval and genuine application.
Introduction
There has been a huge flood in network protection exploration to help digital applications and keep away from the key security risks that these applications defy. The reason for this examination is to find and dissect normal network safety weaknesses. A complete planning research was finished to accomplish this point, and 69 primary examinations were found and surveyed altogether. Following an intensive assessment of the exploration, we decided the most basic security defects and their recurrence of event. Information was additionally amassed and investigated to show the distribution setting, country of distribution, significant designated framework, and applications, in addition to other things. The discoveries recommend that the security strategies examined hitherto are just worried about security as a general rule, and that the arrangements proposed in these exploration require extra experimental approval and genuine application. Network protection is significant. It involves defending data by identifying, forestalling, and responding to digital assaults, which has turned into an issue of overall consideration and worry lately.
Different firms' guarded strategies for safeguarding their the internet are lacking to protect their digital surroundings from consistently expanding security weaknesses (Humayun, M., Niazi, M., Jhanjhi, N.Z., Alshayeb, M. and Mahmood, S., 2020). Thus, one of the major logical difficulties has provoked the curiosity of scientists and specialists throughout the past 10 years. A few examination endeavors have been made in different digital spaces, each with its own arrangement of qualities and eccentricities, to address different security breaks [1]. Different methodologies and devices for the location and moderation of network protection dangers have been proposed in the writing (Aldawood, H. and Skinner, G., 2019.). Be that as it may, prior to pushing ahead with additional exploration around here, incorporating the current work is vital. This examination concentrate on plans to fill this hole by giving a thorough and definite scene of digital protection weaknesses and arrangements.
Risk Identification
Recognize your resources
What information, frameworks, or different resources could you respect to be the "royal gems" of your organization? Which resources, for instance, could greatestly affect your organization if their privacy, honesty, or accessibility were risked? It's straightforward why information like government managed retirement numbers and protected innovation ought to be kept hidden. Be that as it may, shouldn't something be said about dependability?( Gunduz, M.Z. and Das, R., 2020). For instance, on the off chance that an organization is dependent upon the Sarbanes-Oxley (SOX) administrative structure, a small information respectability issue in monetary detailing could bring about a huge bill. On the other hand, on the off chance that an organization gives a web-based music real time feature and the accessibility of music documents is hurt, supporters might be lost.
Distinguish the accompanying weaknesses
After you've recognized the dangers, the subsequent stage is to search for defects in your bigger organization security climate that could open you to those assaults.
It's not generally simple...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here