University : Victoria University UniLearnO is not sponsored or endorsed by this college or university.
Subject Code : BSBRES401
Country : Australia
Assignment Task

 

Assessment Task:
A. Research and analyse the cyber security issues currently facing Australia. Such research and analysis can better inform organisations about their choices for equipment, software, services and procedures with a view to improving their security posture. You are free to make your own choices about how data are best represented in the report and also exactly what you will research and analyse. The requirement is that the criteria for satisfactory performance are met, and that the information is pertinent to the cyber security issues currently facing Australia
B. Analyse the results of an organisations staff survey to better understand the cyber security awareness of its staff. An organisation can use such information to better target training for their staff. You will use the results of the survey to create a graph or graphs that visualises the data.
C. After completing research and analysis as described above, you will record it in a formal report

 

You are currently employed as an information security consultant for LetUsCount. You have been asked to undertake two tasks. The output from those tasks will form the content of a report that you will create.

1. Research and analyse the cyber security issues currently facing Australia. LetUsCount will use this information to better inform their choices for equipment, software, services and procedures that can be used to improve their security posture. There is no specific scenario that needs to be followed for this task. Rather, you are free to make your own choices about how the data is best represented in the report and also exactly what you will research and analyse. The requirement is that the assessment criteria are demonstrated within a report, and that the information is pertinent to the cyber security issues currently facing Australia. Some suggestions are as follows.

  • Find the most common current attack types, comparing it to historical data and predicting future events
  • how phishing or other cyber attacks have changed over time in frequency and/or method
  • Which cyber-attacks are being delivered by which methods (e.g. Email, phone, social networking etc)
  • A comparison of affected age groups or other cohorts such as gender or single males, Versus the location of attacks (e.g. Victoria, NSW, Melbourne etc)
  • Number of reports of specific cyber-attacks compared against money lost in cyber attacks
  • How have wireless attack frequency and/or success has changed through the evolution of protocol changes
  • Common methods of protection and their success or failure
  • What is the proportion of human error to malicious attack, and what is the impact of these. For example, does human error occur frequently but has relatively low consequences?
  • Number of Notifiable Data Breaches over a period of time
  • Which sectors are reporting the most ND breaches
  • Compare failed protections against the success of attacks
  • Compare failed attacks against successful protections

 

2. Analyse the results of a LetUsCount staff survey in Appendix A to better understand the cyber security awareness of its staff. LetUsCount will use this information to better target training for their staff. Suggestions for improving staff cyber security awareness can be gained from the analysis of the staff survey results. You will use the results of the survey to create a graph or graphs that visualises the data. Using the data you will be able to visualise differences in general awareness, differences between the two offices and differences between staff groups. You will discuss this in your report. You are to present your findings and recommendations in a written research report. It is anticipated that you will need to prepare a report that is approximately 1000-1500 words in length to address the aspects of evidence described above. The report should be presented using the following structure. Each bullet pointed item should be a heading on a separate page.

  • Title page
  • Table of contents
  • Summary
  • Introduction, including your objectives
  • Methodology
  • Results
  • Discussion
  • Conclusion and recommendations
  • Appendices, if needed
  • A reference section that provides the various sources used as a reference for this project

 

This BSBRES401 - Cyber Security Assignment has been solved by our Cyber Security Experts at UniLearnO.com. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style. Be it a used or new solution, the quality of the work submitted by our assignment experts remainsunhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : Brett
  • Posted on : February 17th, 2019
  • Downloads : 171

Whatsapp Tap to ChatGet instant assistance