Assessment task:
Blockchain Zeroday Worldwide Dataists Case Study IT Report Writing Assessment Answer

Assessment Task Instructions 

At the beginning of this assessment, groups will be formed to brainstorm ideas for what risks are the most important to be considered for the organisation Blockchain Zeroday Worldwide Dataists (BZWD) that was described during the Security Infrastructure Design assignment from earlier in the course. The emphasis of the brainstorming activity will be  human focussed risks. The groups will then present the key points that they discussed to help the class with brainstorming. Students will then individually perform an audit in accordance with the specifications that will loosely follow the NIST Risk Management Framework on BZWD using the information about the organisation that is provided as well as assuming that the security infrastructure designed in the previous assignment has been implemented.

In the audit, certain criteria should be covered to achieve satisfactorily in for all the assessment criteria.

 

Your report will need to cover a number of requirements:

•    Develop Risk assessment on a particular information system; i.e Firewall 
•    Categorize proposed risks into low medium, high or catastrophic based on likelihood and impact of the risk 
•    Propose security controls that will help mitigate risks discovered during the risk assessment.
•    Propose a user plan which includes how different level of employees at BZWD can interact with the chosen system to safely follow the security controls. I.E All employees will use 2FA authentication, only management and above will be able to access the internal network from outside the office. Only IT admin can access system logs etc.
•    Identify and come up with an implementation plan for best practices in cyber hygiene for the chosen information system
•    Explain at a high level what the chosen system is to management. For example, the VPN system is to allow secure access to restricted information from outside the office.
•    List interconnected systems to the chosen system if there are any
•    If the chosen system fell vulnerability to high or critical risk. Propose a high-level recovery plan to mitigate further risk and to regain the functionality of the system.
•    Develop strategies to promote the planned security controls to the organisation to minimise the risk that the controls are ignored or bypassed

Covering the following topics:
•    Undertake cybersecurity infrastructure risk assessment of an organisation’s system
•    Store audit data and reports according to the organisation’s policies
•    Implement best practice in cyber hygiene
•    Select a group of modern cybersecurity threats and attacks are examined in detail
•    Risk assessment on human operations is conducted as part of a team and interactions with the system are categorised
•    Risk plans are matched to risk categories
•    Resources required by risk categories to minimise business operation are determined
•    Effective controls to manage risk are devised and implemented
•    Policies and procedures to cover user access of the system are developed
•    High-risk categories are regularly monitored
•    System breakdowns are categorised and recorded
•    Security plan and procedures to include in management system are developed
•    The security recovery plan is developed
•    System controls to reduce risks in human interaction with the system are implemented
•    Controls that manage risks are reviewed and monitored
•    Risk analysis process based on security benchmarks from vendors is reviewed
•    Strategies to promote security policy awareness amongst the organisation are planned and implemented
•    Best practices in cyber hygiene are identified

 

This IT Assessment has been solved by our IT experts at UniLearnO. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Eureka! You've stumped our genius minds (for now)! This exciting new question has our experts buzzing with curiosity. We can't wait to craft a fresh solution just for you!

  • Uploaded By : Mitchell Lee
  • Posted on : December 03rd, 2018

Whatsapp Tap to ChatGet instant assistance