{"id":17806,"date":"2022-03-21T03:22:00","date_gmt":"2022-03-21T03:22:00","guid":{"rendered":"https:\/\/essaybishops.com\/?p=17806"},"modified":"2024-08-21T03:30:01","modified_gmt":"2024-08-21T03:30:01","slug":"assessment-brief-bis3004-is-security-and-risk-management-2500-words","status":"publish","type":"post","link":"https:\/\/www.colapapers.com\/uk\/assessment-brief-bis3004-is-security-and-risk-management-2500-words\/","title":{"rendered":"Assessment Brief: BIS3004 IS Security and Risk Management 2500 Words"},"content":{"rendered":"<p>Assessment 1: Case Study<\/p>\n<p>Introduction<\/p>\n<p>The Australian government has been working to strengthen the country&#8217;s cybersecurity frameworks and policies in response to a concerning trend of data breaches, particularly within the financial and healthcare sectors. Over the past four years, numerous high- assessment task profile data breaches have impacted many Australian organizations and their customers (see Table 1). As a cybersecurity specialist, I have been tasked with conducting a security risk assessment and preparing a report for the board of directors of one of the affected organizations.<\/p>\n<p>Details of the Attack<\/p>\n<p>In September 2022, telecommunications provider Optus suffered a significant data breach that exposed the personal information of millions of customers (Optus, 2022). The attack exploited a vulnerability in Optus&#8217;s customer database, allowing unauthorized access to sensitive data such as customer names, dates of birth, phone numbers, email addresses, and, in some cases, driver&#8217;s license and passport numbers.<\/p>\n<p>The vulnerability was a known issue, as Optus had previously been warned about it by cybersecurity experts. However, the organization had not implemented adequate controls to mitigate the risk. The breach went undetected for several days before Optus became aware of the incident. During this time, the attackers were able to access and exfiltrate a substantial amount of customer data.<\/p>\n<p>Analysis and Action<\/p>\n<p>Optus discovered the breach on September 22, 2022, but the organization had not maintained a comprehensive risk register, and the vulnerability was not properly documented or assessed. As a result, the risk was not perceived as critical, and mitigation measures were not prioritized. The attackers, believed to be a sophisticated criminal group, were able to access and steal the personal information of approximately 9.8 million current and former Optus customers (Optus, 2022).<\/p>\n<p>In the aftermath of the attack, Optus faced significant reputational damage and financial consequences. The organization was required to notify affected customers, provide credit monitoring services, and work with law enforcement agencies to investigate the breach. Additionally, Optus was subject to regulatory fines and potential legal action from customers whose data had been compromised.<\/p>\n<p>To mitigate further damage, Optus took several actions, including enhancing its security controls, implementing stronger access management protocols, and conducting a comprehensive review of its risk management processes. The organization also offered affected customers various support services, such as identity theft protection and access to credit reporting agencies.<\/p>\n<p>Risk Assessment<\/p>\n<p>Risk Identification<\/p>\n<p>The Optus data breach exposed several key risks, including:<\/p>\n<p>Unauthorized access to customer personal information, including sensitive data such as driver&#8217;s licenses and passports<\/p>\n<p>Potential identity theft and financial fraud affecting millions of customers<\/p>\n<p>Reputational damage and loss of customer trust<\/p>\n<p>Regulatory fines and legal liabilities<\/p>\n<p>Disruption to Optus&#8217;s operations and customer service<\/p>\n<p>Risk Analysis<\/p>\n<p>Using the NIST Cybersecurity Framework (NIST, 2018), the identified risks can be analyzed as follows:<\/p>\n<p>Asset Identification: The primary assets at risk were Optus&#8217;s customer database, containing extensive personal information, and the organization&#8217;s reputation and public trust.<\/p>\n<p>Threat Assessment: The threat actor was a sophisticated criminal group, with the capability and motivation to exploit the known vulnerability in Optus&#8217;s systems.<\/p>\n<p>Vulnerability Analysis: The vulnerability was a well-known issue, and Optus had failed to implement adequate security controls to mitigate the risk.<\/p>\n<p>Risk Evaluation<\/p>\n<p>Based on the FAIR (Factor Analysis of Information Risk) methodology (FAIR Institute, 2022), the Optus data breach posed a critical risk due to the following factors:<\/p>\n<p>High likelihood of the threat event occurring due to the known vulnerability<\/p>\n<p>Significant potential for loss, including financial, reputational, and regulatory impacts<\/p>\n<p>Lack of effective controls and risk management processes within the organization<\/p>\n<p>Conclusion<\/p>\n<p>The Optus data breach highlights the importance of proactive risk management and the need for organizations to maintain a comprehensive risk register, regularly assess vulnerabilities, and implement robust security controls to protect customer data. As a cybersecurity specialist, I recommend that Optus continue to enhance its security posture, strengthen its risk management framework, and work closely with regulatory authorities and industry partners to prevent similar incidents in the future.<\/p>\n<p>Keywords: data breach, cybersecurity, risk assessment, Optus, NIST Cybersecurity Framework, FAIR<\/p>\n<p>References<\/p>\n<p>FAIR Institute. (2022). FAIR Risk Analysis. Retrieved from https:\/\/www.fairinstitute.org\/fair-risk-analysis<\/p>\n<p>NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity. National Institute of Standards and Technology. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.04162018.pdf<\/p>\n<p>Optus. (2022). Optus Cyber Incident Update. Retrieved from https:\/\/www.optus.com.au\/about\/media-centre\/media-releases\/2022\/09\/optus-cyber-incident-update.<\/p>\n<p>==========<\/p>\n<p>Assessment Brief: BIS3004 IS Security and Risk Management Trimester-2 2024<\/p>\n<p>Assessment Overview<\/p>\n<p>Assessment Task Type Weighting Due Length ULO<br \/>\nAssessment 1: Case Study Write a report to discuss recent types of information security attacks, protection mechanisms, and risk management.<br \/>\nIndividual 30% Week 6 2500 words ULO-2 ULO-3 ULO-4<\/p>\n<p>Assessment 2: Quiz Quizzes assess students\u2019 ability to understand theoretical materials. The quiz will be either multiple choice questions or short questions which are relevant to the lecture materials.<br \/>\nIndividual Invigilated 30% Week 3, 4, 6, 8, 10 700 words ULO-1 ULO-2 ULO-3 ULO-4<\/p>\n<p>Assessment 3: Laboratory Practicum Lab activities and exercises assess students\u2019 ability to understand theoretical materials.<br \/>\nIndividual Invigilated 10% Weekly equiv. 2300 words ULO-1 ULO-2 ULO-3 ULO-4<\/p>\n<p>Assessment 4: Applied Project Discuss and implement IS security protection techniques and implement access control under Linux.<br \/>\nGroup 30% Week 12 2500 words ULO-1 ULO-2 ULO-3 ULO-4<\/p>\n<p>equiv. \u2013 equivalent word count based on the Assessment Load Equivalence Guide. It means this assessment is equivalent to the normally expected time requirement for a written submission containing the specified number of words.<\/p>\n<p>Note for all assessment tasks:<br \/>\n\u2022 Students can generate\/modify\/create text generated by AI. They are then asked to modify the text according to the brief of the assignment.<br \/>\n\u2022 During the preparation and writing of an assignment, students use AI tools, but may not include any AI-generated material in their final report.<br \/>\n\u2022 AI tools are used by students in researching topics and preparing assignments, but all AI-generated content must be acknowledged in the final report as follows:<\/p>\n<p>Format &#8211; Best Help Writing My 99 Papers\u2014owl Essay Samples<br \/>\nI acknowledge the use of [insert the name of the AI system and link] to [describe how it was used]. The prompts used were entered on [enter the date in ddmmyyy:] [list the prompts that were used]<br \/>\nExample Assessment 1: Case Studies (Use case analysis, Risk Identification and Assessment) Due date: Week 6 Group\/individual: Individual Word count \/ Time provided: 2500 Weighting: 30% Unit Learning Outcomes: ULO-2, ULO-3, ULO-4<\/p>\n<p>Justification<br \/>\nThere is a noticeable increase in the occurrence of data intrusions within the financial and healthcare sectors in Australia. The Australian government is currently revising its cybersecurity frameworks and policies to strengthen resilience against nation-state threat actors and thereby disrupt this adverse trend.<\/p>\n<p>In the past 4 years, numerous data breaches have occurred in Australia. Several of them affected many users. Table 1 is a comprehensive compilation of noteworthy instances of data breaches that have transpired in recent years.<\/p>\n<p>Table 1: Major Data Breach Incidents in Australia<\/p>\n<p>Company Name\tDate of Impact<br \/>\nLatitude\tMarch 2023<br \/>\nMedibank\tDecember 2022<br \/>\nOptus\tSeptember 2022<br \/>\nEastern Health\tMarch 2021<br \/>\nNorthern Territory Government\tFebruary 2021<br \/>\nCanva\tMay 2019<br \/>\nAustralian Parliament House\tFebruary 2019<br \/>\nTools<br \/>\nI acknowledge the use of ChatGPT https:\/\/chat.openai.com to create content to plan and brainstorm ideas for my assessment. The prompts used were entered on 18 March 2023:<br \/>\n\u2022 What are some key challenges in running an online business?<\/p>\n<p>Approach Analysis<br \/>\nYou are required to choose one of the data breaches from the list above in Table 1 and create a report on it. Your report must include the following information.<\/p>\n<p>Detail of the Attack:<br \/>\nThis section of your report should include the elements below.<br \/>\n\u2022 What was the attack? What vulnerability was exploited?<br \/>\n\u2022 Was the vulnerability already known? When did it happen?<br \/>\n\u2022 Were there any controls implemented against the vulnerability and yet it was exploited?<\/p>\n<p>Analysis and Action:<br \/>\nThis section of your report should include the elements below.<br \/>\n\u2022 When and how did the target figure out about the attack?<br \/>\n\u2022 For how long, the risk was not actioned?<br \/>\n\u2022 Did the organisation have a risk assessment policy and procedure?<br \/>\n\u2022 Did the organisation maintain a risk register?<br \/>\n\u2022 Was the vulnerability included in the risk register?<br \/>\n\u2022 How was the risk perceived (critical\/non-critical\/high\/medium\/low)?<br \/>\n\u2022 What the attacker(s) did, stole, and wanted?<br \/>\n\u2022 Did the organisation pay anything because of the attack?<br \/>\n\u2022 What action did they adopt to avoid further damage?<\/p>\n<p>Risk assessment<br \/>\na. Risk Identification<br \/>\nb. Risk Analysis<br \/>\nc. Risk Evaluation<\/p>\n<p>Risk Identification and Assessment<br \/>\nIn this section, you need to identify risks and conduct an analysis of the selected use case. Regarding the selected scenario, reasonable assumptions can be made if they are adequately documented and supported. To perform risk identification and analysis, you can choose either of the following tools or a combination of them.<br \/>\n\u2022 Factors Analysis in Information Risk (FAIR)<br \/>\n\u2022 NIST Privacy Risk Assessment Methodology (PRAM)<br \/>\n\u2022 NIST CyberSecurity Framework (CSF)<\/p>\n<p>Assessment Description<br \/>\nAssume you have been recruited as a cybersecurity specialist by the client organisation (the use case you chose). You are responsible for conducting a security risk assessment and preparing this report for the board members. In most organisations, board members have minimal levels of computer literacy and risk-related knowledge. Include the following information in your report preparation:<\/p>\n<p>Introduction<br \/>\nDetails of the attack<br \/>\nAnalysis and action<br \/>\nRisk Assessment<br \/>\na. Risk Identification<br \/>\nb. Risk Analysis<br \/>\nc. Risk Evaluation<br \/>\nConclusion<br \/>\nReferences<br \/>\nNote: Your responses to the above questions must be supported by APA-style citations and references.<\/p>\n<p>Additional Information<br \/>\nWhen conducting research, you may find the following URLs or research tools useful:<br \/>\n\u2713 https:\/\/ieeexplore.ieee.org\/Xplore\/home.jsp<br \/>\n\u2713 https:\/\/dl.acm.org\/<br \/>\n\u2713 https:\/\/scholar.google.com\/<\/p>\n<p>Marking Criteria and Rubric: The assessment will be marked out of 100 and will be weighted 30% of the total unit mark.<\/p>\n<p>Marking Criteria<br \/>\nNot satisfactory (0-49%) of the criterion mark<br \/>\nSatisfactory (50-64%) of the criterion mark<br \/>\nGood (65-74%) of the criterion mark<br \/>\nVery Good (75-84%) of the criterion mark<br \/>\nExcellent (85-100%) of the criterion mark<\/p>\n<p>Introduction (10 marks)<br \/>\nThe introduction lacks clarity, and an engaging hook, and is disorganised, lacks originality.<br \/>\nThe introduction is generally clear, includes a moderately engaging opener, presents a well-articulated statement, about the topic, provides some pertinent context, is adequately organised, and lacks significant originality.<br \/>\nThe introduction is clear, contains an engaging hook, presents a well-articulated statement, about the topic, provides relevant context, and is well-organized.<br \/>\nThe introduction is well written with a clear discussion about the case analysis, Risk Identification, and Assessment.<br \/>\nThe introduction is exceptionally clear, contains a highly engaging hook, presents a well-articulated topic, provides pertinent context, is flawlessly organised, and demonstrates originality.<\/p>\n<p>Details of the Attack (15)<br \/>\nThe report lacks clarity and detail, providing little to no information about the details of the attack and its various aspects.<br \/>\nThe report provides a basic overview of the details of the attack, covering some of the necessary details but lacking depth in one or more areas, such as what vulnerability was exploited.<br \/>\nGenerally, good discussion about the details of the attacks, including clear identification, a thorough explanation of the attack.<br \/>\nVery clear discussion about the details of the attack. The answer is supported with reference and in-text citations.<br \/>\nIn-depth and very clear discussion about the details of the attack. Accurate answers are supported with reference and in-text citations.<\/p>\n<p>Analysis and action (10)<br \/>\nPoor discussion with irrelevant information.<br \/>\nA brief discussion about the analysis and action. The analysis provides a basic impact assessment but lacks comprehensive details.<br \/>\nGenerally good discussion regarding the analysis and action. The impact assessment is reasonable but may lack some depth.<br \/>\nVery clear discussion about the analysis and action. The answer is supported with references and in-text citations.<br \/>\nIn-depth and very clear discussion about the analysis and action. The report provides a complete strategy of how the target found out about the attack and the way they dealt with it with accurate answers supported with references and in-text citations.<\/p>\n<p>Risk Identification (15)<br \/>\nPoor discussion with irrelevant information.<br \/>\nA brief discussion about risk identification. Displayed a basic understanding of the threat landscape but it lacks depth. One of the provided tools was not utilised correctly.<br \/>\nGenerally good discussion about risk identification. Shows a good grasp of the threat landscape but may overlook using one of the given tools.<br \/>\nVery clear discussion regarding risk identification. Properly use one of the given tools. The answer is supported by the reference and in-text citation.<br \/>\nUsing one of the provided tools demonstrates an exceptional understanding of the threat landscape with accurate responses supported by references and in-text citations.<\/p>\n<p>Risk Analysis (15)<br \/>\nPoor risk assessment. No assets were mentioned, nor were any threats evaluated.<br \/>\nA brief discussion about risk analysis. Few threats are evaluated.<br \/>\nSome relevant assets were identified, but important ones are missing. Some threats were assessed but lacked detail or accuracy.<br \/>\nMost relevant assets are identified with minor omissions or inaccuracies. Well-documented threats with minor omissions or inconsistencies. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Assessment 1: Case Study Introduction The Australian government has been working to strengthen the country&#8217;s cybersecurity frameworks and policies in response to a concerning trend\u2026<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[298,1369,2127,868,358,2018,3349],"tags":[],"class_list":["post-17806","post","type-post","status-publish","format-standard","hentry","category-assessment-brief-assignment-help","category-assessment-brief-writing-help-uk","category-computer-and-information-assignment-help","category-cyber-security-assignment-help","category-it-computer-science-assignment-help","category-insurance-assignment-help","category-uk"],"_links":{"self":[{"href":"https:\/\/www.colapapers.com\/uk\/wp-json\/wp\/v2\/posts\/17806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.colapapers.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.colapapers.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.colapapers.com\/uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.colapapers.com\/uk\/wp-json\/wp\/v2\/comments?post=17806"}],"version-history":[{"count":1,"href":"https:\/\/www.colapapers.com\/uk\/wp-json\/wp\/v2\/posts\/17806\/revisions"}],"predecessor-version":[{"id":17807,"href":"https:\/\/www.colapapers.com\/uk\/wp-json\/wp\/v2\/posts\/17806\/revisions\/17807"}],"wp:attachment":[{"href":"https:\/\/www.colapapers.com\/uk\/wp-json\/wp\/v2\/media?parent=17806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.colapapers.com\/uk\/wp-json\/wp\/v2\/categories?post=17806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.colapapers.com\/uk\/wp-json\/wp\/v2\/tags?post=17806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}