Cyber Security Project_BSBXCS402_Task1_Student_1st name last name std no

.docx

School

Edith Cowan University *

*We aren’t endorsed by this school

Course

5103

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

12

Uploaded by pinbarahasun

Report
STUDENT –Signed: First / Last name student No. PRODUCT ASSESSMENT TASK Task Number 1 of 2 . Task Name Cyber Security Project National unit/s code BSBXCS402 National unit/s title Promote workplace cyber security awareness and best practices National qualification code ICT50220 National qualification title Diploma of Information Technology Program code C5402 Course code COSC7392C Section A – Assessment Information Assessment duration and/or due date You have a maximum of 7 weeks to complete this assessment. This assessment is released Week 7 * Commences in Week 7 and is to be completed by week 14 . Assessor will inform you with exact date and time for submission through canvas announcements. Task instructions Type of Product (tick which applies) Project Summary and Purpose of Assessment This project is one of two assessment tasks that you need to complete, in order to be deemed competent for this unit. Completing this project allows you to demonstrate your ability to: develop cyber security awareness in a work area by applying an up-to-date knowledge in line with company policies and procedures. be able to support cyber security practice in the workplace by planning, training, and reviewing personnel behaviours on site and when working remotely. document and report suggested improvements to specific individuals and management. Assessment Instructions This is an individual and group based ( Task 2a/b - 4 weeks* ) project to be completed in class and at home over the assessment period of 7 weeks. What? Goal of this project: You have been tasked with auditing this network/equipment to improve security. To complete this task, you will need to submit this document signed and, create a report on your audit. Your report must contain the following: Title Page Table of Contents Identifying and valuing Company assets [ Cyber Security Project ] [ 1 of 2 ] [ 21/05/2021 ] Student product assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT PRODUCT ASSESSMENT TASK TEMPLATE – June 2019_Version 2.0 Page 1 of 12
Identifying and modelling training for Cyber Security threats Implementing and testing training solutions to Cyber Security threats Task 1a Establish current level of awareness in work area relating to cyber security. Read the following scenario: CompanyXYZ is a new start-up (9 months) mostly an Online company which has 3 distinct departments. Their product is educational software sold to tertiary schools. 1. CEO & Office Admin 2. Sales & Marketing 3. IT Support The company has only reported 1 known security breach in the first 6 months of operations. The CEO and IT support have acknowledged the fact that security threats exist and seek your Security expertise to know how to prevent and respond to them. You conduct walk-through and hold meetings with several members of the company and discover the following data: 1. Operations and environment related to CEO (Grace) and Office Admin (Tim) a) CEO Grace uses her own laptop, the shared WIFI connected net printer, VoIP Phone - Uses the same password for everything including their outlook email account, personal email, and social media accounts. b) All CEO data is stored on their laptop. c) Door to IT Office is kept locked (Admin has additional key in their draw) d) Office Admin uses 1 PC station, shared net printer, – keeps their password on a post-it notes on the screen as they have trouble with recall, and they often forget to log off from PC. Emails are often sent from home email Gmail account as they find Outlook a bit too complicated at times to create email for internal staff. Most data are stored on PC and a few USB sticks that the admin takes home. Anti-virus software was updated 6 months ago. e) Office Admin notices a lot of emails that seem suspicious after clicking on internal links but neglects to report on them to IT support because they are so busy. 2. Operations and environment related to Sales & Marketing department (4 members: Kara, Raj, Ryan and Jiang) a) Staff members share 2 laptops between themselves, a shared net printer and use personal [ Cyber Security Project ] [ 1 of 2 ] [ 21/05/2021 ] Student product assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT PRODUCT ASSESSMENT TASK TEMPLATE – June 2019_Version 2.0 Page 2 of 12
smart phone for calls. You note that Kara loves to download movies. b) Sales representatives – travel and remotely connect to the office at airports and cafes that offer free internet when working on their smart phone and IPADs. c) Door to IT Office is not locked which joins to customer lounge– a lot of printed documents left on desktops. d) Anti-virus software & and windows 10 operating system was updated 6 months earlier. e) Guests, customers and staff can access internet using an open Wireless net. 3 . Operations and environment related to IT support (2 members Tom & Kena) a) Each member uses 1 laptop each, Windows 10 and anti-virus software was updated 3 months ago. b) Door to IT Office is not locked when unattended. c) IT staff login to WIFI using a default password. d) Net device is accessed with a generic unencrypted password (Kena’s birthday) Overall- you have perceived the following – messy / busy desks left in that state at the end of the day. Competition to use available laptops in Sales & Marketing. No security guidelines are available – staff learn on the job. Task 1a. Individual task Identify the Cyber Security Threats. * Cut and paste Table into your report : Your task is to Identify security threats to later implement and plan suitable controls. Department/Area No. of Cyber Security Threats Type of Threats Use the letter*(ABC) (A) Access (B) Data breach (C) Thef Identify 1 specific internal ( from within the company ) threat (I) per department. Identify 1 specific external threat ( from outside the company ) (E) per department CEO & Admin Sales& Marketing IT Support [ Cyber Security Project ] [ 1 of 2 ] [ 21/05/2021 ] Student product assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT PRODUCT ASSESSMENT TASK TEMPLATE – June 2019_Version 2.0 Page 3 of 12
Task 1b. Individual task Research Official Sites. The impact and scope of recent cyberattacks have many business and government officials concerned. Review the latest cyber threats and trend affecting Australian Businesses. Include the URL and Report (describe the threat) on the 3 common threats that could affect this company. * Cut and paste Table into your report : Threat Describe the Threat /include your URL Source 1 Ransomware – this occurs when an attacker……. URL: 2 URL: 3 URL: --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------- Task 2a [GROUP Task] Draf and Create a Security Policy – My Share link: ( paste your Onedrive share link here*) Based on the information gathered in Task 1 – work with your assigned partner to draft a security policy for company XYZ. ** Remember to keep your language in as plain and easy to read (Understandable!) as possible! Using the separate supplied word document to share with your partner and Class Teacher in OneDrive : Correctly fill in side panel with your answers to 40 blank lines to complete the draft policy with your partner, where blank lines ____________ usually = 1 word, except follow word count required, e.g. (3) – You MUST Use the Comments section to show collaboration with your partner. Also, complete task 2b and incorporate comments between you and your partner. [ Cyber Security Project ] [ 1 of 2 ] [ 21/05/2021 ] Student product assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT PRODUCT ASSESSMENT TASK TEMPLATE – June 2019_Version 2.0 Page 4 of 12
Task 2b. Also complete [GROUP Task] with your partner using OneDrive document (see Task 2a*) Working with your partner create a list of guidelines for Best Practice for company XYZ’s Email procedures :- Student working together fills table to include at least 5 best practices to ensure secure email use. Best Practice – Do not answer here* 1 2 3 4 5 --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------- [ Cyber Security Project ] [ 1 of 2 ] [ 21/05/2021 ] Student product assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT PRODUCT ASSESSMENT TASK TEMPLATE – June 2019_Version 2.0 Page 5 of 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: 5. Shade in the area given by the integral y dy. | 2² y = V
Q: The switch has been in the position shown for a long time. The switch opens at t = 0. Determine the…
Q: If a mutation in a sodium channel in an Intestinal epithelial cell caused a marked decrease In the…
Q: QS 17-11 (Algo) Computing activity rates for activity-based costing LO P3 A manufacturer uses…
Q: If the number of people classified as unemployed is 5,000 and the number of people classified as…
Q: (14) y = Tan¹ (3); dy =? ax A) 15) 4+x² E) y= B) - 2√4-X² x²+4 Sec²(X); dy = ? Jx Tanx √4x² D) +…
Q: Heat dissipated from an engine in operation can cause hot spots on its surface. If the outer surface…
Q: What would happen if the RET command wasn't included of the routine?
Q: A physical therapist wants to determine the difference in the proportion of men and women who…
Q: Use the given statistics to complete parts (a) and (b). Assume that the populations are normally…
Q: According to the passage, what is the probable effect of growing insectivorous plants in richer…
Q: 3.15 mol of an unknown solid is placed into enough water to make 150.0 mL of solution. The…
Q: The value of the sample correlation coefficients are for these data is approximately -0.879. Answer…
Q: For each quadratic function, answer the following: a. Does the function have a minimum or a maximum…
Q: A coin is tossed 7 times. Find the probability that none are tails. The probability that none are…
Q: a b с d e Prelab Question #6 Homework Unanswered 1 Select an answer and submit. For keyboard…
Q: Give more detail answer Please. Thank You Your current LIS system will no longer be supported by…
Q: Suppose you are considering two possible investment opportunities: a 12-year Treasury bond and a…
Q: Promoter 5' UTR Coding region Transcription start site…
Q: A consumer advocacy group is doing a large study on car rental practices. Among other things, the…
Q: Which of these would most likely increase the supply of soccer balls? * OA. A transportation strike…
Q: A vertical 2-m-high and 5-m-wide double-pane window consists of two sheets of glass separated by a…