Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Assignment Overview: This assessment requires you to write a report on a given scenario, which investigates existing security issues ( technical and non - technical
Assignment Overview:
This assessment requires you to write a report on a given scenario, which investigates existing security
issues technical and nontechnical and propose countermeasures to overcome the identified
problems. The scenario has been developed after observing various realworld security vulnerabilities
that organisations face, which cyber criminals can leverage.
This assessment will develop your understanding of analysing security issues and applying the
knowledge acquired throughout the semester to provide solutions to these issues. You will also be
required to seek guidance from various security forumsmanuals such as the Australian Government
Information Security ManualThe Australian Signals Directorate ASD Top Mitigation Strategies
Essential Eight several NIST Standards SANS resources, and others. References to these resources
will be provided through weekly modules. You should also apply feedback from your report
assessment to improve your writing skills according to industry standards.
Scenario:
Great Care Hospital GCH is a hospital in Perth, Western Australia, providing diagnostic, treatment,
and rehabilitation for patients suffering from various health issues. GCH extensively relies on the use
of technology and, hence, has a large digital footprint, making its services more accessible for patients
and improving its management of both employees and its services. As part of its operations, GCH
collectsstores sensitive data, which is digitally processed and stored. A few months ago, GCH became
a victim of a double extortion cyber attack where a significantly large number of files carrying
sensitivepersonal health information of patients being treated at GCH were stolen by a cyber criminal
group. The incident triggered a backlash from the community, demanding GCH to undergo a cyber
security audit of its systems, operations, and policies to highlight significant grey areas requiring
immediate action. Resultantly, the chief executive of GCH Tash, has agreed to a security review of its
digital footprints, recommending prevailing cyber security guidelinesstandards GCHs existing setup,
awareness and behaviour are as follows:
a Every employee at GCH uses the organisations computer with administrative privileges to
undertake their daily routine work.
b GCH requires employees to change their passwords every twelve months, consisting of a minimum
of characters with a mandatory requirement of having one special character in the new
password.
c GCH employees are authenticated using passwordbased authentication.
d The data is encrypted using Vigenre cipher to ensure confidentiality.
e GCH uses a webbased application to run its daily operations. The application stores user
passwords in the database using the Secure Hash Algorithm SHA cryptographic hash function.
f The webbased application is running Transport Layer Security TLS version
g The healthcare provider disposes of their storage devices after using them for a few years, with
data being deleted using software with a single pass.
h The employees are allowed to work from home and connect to the GCHs network using the
default Remote Desktop Protocol RDP
CSI Computer Security Vulnerabilities and Countermeasures PAGE
Edith Cowan University
School of Science
i No physical security mechanism exists to safeguard the GCHs IT systems end devices and
servers Any employees can enter the GCHs server room and access the servers, switches,
routers, etc. In addition, due to regular power surges, the site is not conducive to running digital
operations.
j All physical networking and security devices, such as firewalls and intrusion detection systems
IDS are being used without redundancy.
Core Tasks:
Tash has approached you to analyse her organisations current IT setup and practices, along with the
security issues discussed above. She wants you to prepare a concise report addressing the following:
Task : Identify six critical cyber security issues that GCH should address as a priority. In devising the
security solutions, you should address the following requirements:
a Identify the six critical cyber security issues threats and vulnerabilities currently faced by
GCH
b Explain why your chosenidentified six critical cyber security issues should be addressed
immediately. Justify the potential impacts of each identified issue in terms of
Confidentiality, Integrity, and Availability CIA triad.
c Application of security solutions: Explain in detail how you propose to address these six
critical cyber security issues. You need to propose two solutions for each issue.
d Identify your preferredrecommended solution from your two proposed solutions in c
Then, justify why your preferred solution is better than your alternative
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started