Get CYB600 Enterprise Security Management Assignment Help

Get CYB600 Enterprise Security Management Assignment

Assessment Information and Rubric

Subject CodeCYB600
Subject NameEnterprise Security Management
Assessment Number and TitleAssessment 3 – Enterprise Risk Analysis and Treatment
Assessment TypeCase Study
Length / Duration1500 words
Weighting %40%
Total Marks40
SubmissionTurnitin
Due DateWeek 12, Sunday 11:59 pm
ModeIndividual
FormatReport

There are lots of other guidelines which you have to know for your knowledge and one of them is STT500 Statistics for Decision Making Assignment Help.

Assessment Description and Instructions

In this assessment, students will work on a security management project individually. The objective is to gain experience working on a security management project as an expert and be able to analyse the performance of solutions.

Description of the Case

SportX company is specialized on selling sports products. The company’s main sales are through their e-commerce website, where customers can issue orders and pay online. SportX company can receive orders through the following lines of sales

  1. Online e-commerce website
  2. Phone calls
  3. Email orders

Then the sales team are responsible on checking those emails and orders, prepare them and the deliver them to customer.

Technical Specification.

  1. Currently SportX have two branches – one headquarter and one site branches
  2. HQ contains the following –
    1. Email server
    1. Web Server that hosts the e-commerce site.
  3. Databases Server that include the following databases
    1. Employee Database
  • Customer Database
    • Product Database
    • Orders Database
  • Figure 1 shows the entire topology.

SportX’s business got an exponential growth from the beginning of 2018. This steady growth also brought challenges for SportX They have to secure the sensitive information of their employee, customer and the most important assets are the orders Database. Moreover, their employees receive many emails and they have to filter the orders emails from other emails.

SportX had no dedicated security team and therefore till now no security policy is in place. Recently, the governing body of SportX forms a security team and makes following two goals that they would like to achieve in six months –

  • Assessing the current risk of the entire organization
  • Treat the Risk as much as possible

In achieving the above two goals, in this assignment you should do the followings –

1. Find at least five assets

List five most valuable assets of SportX

Create a weighted factor analysis worksheet (WFAW). In WFAW, use at least four criteria.

2. Find at least two threats against each asset

Identify and list two threats for each asset.

3. Idenitfiy vulnerabilities for the assets

Identify and list the vulnerability of each asset. One vulnerability against each asset.

4. Calculate Risk

At the end of the risk identification process, you should have i) a prioritized list of assets and ii) a prioritized list of threats facing those assets and iii) Vulnerabilities of assets. At this point, create Threats-Vulnerabilities-Assets (TVA) worksheet.

Each TVA triplet represents risk. Choose any five triplets and identify the impact and likelihood of each risk.

Calculate the risk rating of each of the five triplets out of 25. Consider that your assumptions and data are 95% accurate.

5. Provide treatment strategy for each risk

For each of the five identified risk, state what basic strategy you will take. Justify for each decision.

6. Make the HQ’s network secure by design

7. Finally, provide plausible protection mechanism

Advise all possible protection mechanism and corresponding place of application.

We have also others websites which provide assignment writing service and one of them is Diploma Assignment Help.

CYB600 Enterprise Security Management, Assessment 3 – Enterprise Security Analysis and Plan, 40%

Marking CriteriaF (Fail)     0-49%P (Pass)     50-64%C (Credit)     65-74%D (Distinction)     75-84%HD (High Distinction) 85-100%
    Asset Identification 10%    Failed to identify any assets    Identified <3 assets with limited criteria  Identified at least 3 assets with clear criteria    Identified 5 assets with clear criteria    Identified 5+ assets with well- defined criteria
    Weighted Factor Analysis 10%    Failed to create WFAW    Created WFAW with <3 criteria    Created WFAW with 3 criteria    Created WFAW with 4 well-defined criteria    Thoroughly created WFAW with 4+ well- defined criteria
      Threat Identification 10%      Failed to identify significant threats    Identified 1 significant threat for some assets with limited explanation    Identified 1 significant threat for each asset with clear explanation    Identified 2 significant threats for each asset with some supporting evidence    Identified 2 significant threats for each asset with supporting evidence
      Vulnerability Identification 20%      Failed to identify vulnerabilities    Identified some vulnerabilities with limited explanation    Identified 1 vulnerability for each asset with clear explanation    Identified 1 vulnerability for each asset with some supporting evidence    Identified 1 significant vulnerability for each asset with supporting evidence
          Risk Calculation 20%    Identified and analyzed <3 relevant risk triplets with inaccurate ratings based on less than 70% accurate assumptions and data    Identified and analyzed 3 relevant risk triplets with somewhat accurate ratings based on 70% accurate assumptions and data    Identified and analyzed 4 relevant risk triplets with accurate ratings based on 80% accurate assumptions and data    Identified and analyzed 5 relevant risk triplets with accurate ratings based on 90% accurate assumptions and data    Identified and analyzed 5 relevant risk triplets with accurate ratings based on 95% accurate assumptions and data
    Treatment Strategy 10%    Failed to provide any strategies    Provided strategies for only a few identified risks    Provided strategies for some identified risks based on    Provided clear strategies for each of the 5 identified risks    Provided clear and justified strategies for each of the 5
Marking CriteriaF (Fail)     0-49%P (Pass)     50-64%C (Credit)     65-74%D (Distinction)     75-84%HD (High Distinction) 85-100%
  based on weak best practices and supporting evidencesome best practices and limited supporting evidencebased on some best practices and supporting evidenceidentified risks based on best practices and supporting evidence
      Network Security 10%    Failed to create a secure design for HQ’s network    Created a basic design for HQ’s network with limited security measures    Created a design for HQ’s network with some security measures    Created a clear and effective secure design for HQ’s network    Created a comprehensive and effective secure design for HQ’s network
      Protection Mechanism 10%      Failed to provide any protection mechanisms    Provided protection mechanisms with weak corresponding application    Provided protection mechanisms with limited corresponding application    Provided protection mechanisms with some corresponding application    Provided plausible protection mechanisms with corresponding application