Instructions • Please submit via CSE1ICB LMS page Assignment submission section • This assignment is due on Monday 16th May 2022 before 11.59 pm. • You must submit your assignment only as a PDF file....

1 answer below »
Instructions • Please submit via CSE1ICB LMS page Assignment submission section • This assignment is due on Monday 16th May 2022 before 11.59 pm. • You must submit your assignment only as a PDF file. • Please write your full name and student number on the top of the first page. Assignment problem You are an entrepreneur looking to start a new online business. As part of registering your new venture and applying for small business funding, you are required to develop and submit a cybersecurity risk management plan. The purpose of such a plan is to demonstrate how you will protect your intellectual property and financial data, both to satisfy your bank and to create confidence for your future clients. Your plan should be easy to understand, but also dynamic such that you can adapt to changes within the business systems in the coming years. 1. Preparation for risk analysis (20 marks) a. Describe the goals of the business and the focus of the risk assessment (10 marks) b. Describe the scope of its technology environment (use a logical diagram showing the interactions between users and systems) (10 marks) 2. High level threat analysis (20 marks) a. Identify all actors (10 marks) b. Identify all information assets (10 marks) 3. Threat assessment (20 marks) a. Create bow tie diagrams which describe two or three key adverse events that may occur, showing both the potential causes and consequences of each (20 marks) 4. Risk assessment and ratings (30 marks) a. Create or source appropriate qualitative risk assessment tables/matrices that describe likelihood, impact, and overall risk rating (5 marks) b. Articulate at least six information risks derived from your threat assessment in a format that describes all important facets of the risk (actor, asset, threat, vulnerability, impact) (15 marks) c. Give each risk a realistic rating, using your risk assessment tables/matrices (10 marks) Assignment 3: Risk assessment CSE1ICB Introduction to Cybersecurity latrobe.edu.au ASSIGNMENT Assignment guidance Read the CANSO case study on LMS as a guide for risk assessment presentation. You should use approximately 1000 words in total to answer these questions. This assignment is weighed 20% of the overall subject marks. The marking rubric is given below. You should use tables where appropriate to present your information. Tables do not contribute towards your word count. Aside from the supplied CANSO presentation, perform your own research into how to assess and present risks to a business audience. Be sure to reference any material you use to create this assignment. Referencing and citation should use APA format. You should research other information from reputable online resources such as standards’ bodies like NIST, government reports that address risks or independent technology working groups like OWASP. Referencing and citation should use APA format. You should research other sources of information from reputable online resources such as malware research groups, security vendors, security journalists and academic papers if possible.
Answered 10 days AfterMay 06, 2022La Trobe University

Answer To: Instructions • Please submit via CSE1ICB LMS page Assignment submission section • This assignment is...

Amar Kumar answered on May 09 2022
71 Votes
1. Business goal and risk assessment
A.
"Risk appraisal" alludes to the cycle or practice of distinguishing dangers and chance factors that can possibly inflict damage (peril ID). Dissect and survey the gamble presented by that danger (risk examination, and
chance assessment).
Unfamiliar state run administrations participated in reconnaissance and data fighting; lawbreakers; programmers; infection creators; and disappointed laborers and workers for hire working inside an association are likely wellsprings of digital dangers.
Negligent or untalented staff, programming refreshes, upkeep cycles, and hardware disappointments can all bring about unexpected perils that disturb PC frameworks or harm information.
Focused on and non-designated attacks are instances of purposeful dangers. At the point when an association or individual explicitly focuses on an imperative framework, this is known as a designated attack. A non-designated attack happens when the assault's expected objective is obscure, like when an infection, worm, or malware is dispersed on the Internet without a particular objective as a primary concern.

B.
The gamble appraisal procedure is important for an ordinary gamble the board approach, which permits an association to appropriately identify, evaluate, and address risk, as displayed underneath. The chance of being focused on by a specific attack is alluded to as "risk." therefore, a gamble appraisal is directed to distinguish the most basic conceivable security penetrates that should be tended to, and they are assessed with regards to financial impact (outcome) and probability of event (probability). This kind of chance examination can support deciding legitimate security subsidizing and strategy. It is basic to remember this progression for the procedure. Establish the gamble appraisal's setting first.
This involves characterizing the degree and recognizing the resources that may be endangered. The Risk Assessment part of the gamble the executives’ interaction incorporates the disclosure, examination, and assessment of perils. The Communicate and Consult period of the cycle perceives that distinguishing, examining, and checking risk requires the cooperation of inner and outside partners. The controls set up to ensure that the gamble appraisal process keeps on working effectively are remembered for the Monitor and Review part of the cycle.
2. High level threat analysis
A. Threat Actors of Different Types
Experts: Their expectations revolve around keeping track of their waiting time, detecting and exploiting flaws in mechanical systems; in short, experts...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here