Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Assignment Overview: This assessment requires you to write a report on a given scenario, which investigates existing security issues ( technical and non - technical

Assignment Overview:
This assessment requires you to write a report on a given scenario, which investigates existing security
issues (technical and non-technical) and propose countermeasures to overcome the identified
problems. The scenario has been developed after observing various real-world security vulnerabilities
that organisations face, which cyber criminals can leverage.
This assessment will develop your understanding of analysing security issues and applying the
knowledge acquired throughout the semester to provide solutions to these issues. You will also be
required to seek guidance from various security forums/manuals such as the Australian Government
Information Security Manual,The Australian Signals Directorate (ASD) Top 35 Mitigation Strategies/
Essential Eight, several NIST Standards, SANS resources, and others. References to these resources
will be provided through weekly modules. You should also apply feedback from your report
assessment to improve your writing skills according to industry standards.
Scenario:
Great Care Hospital (GCH) is a hospital in Perth, Western Australia, providing diagnostic, treatment,
and rehabilitation for patients suffering from various health issues. GCH extensively relies on the use
of technology and, hence, has a large digital footprint, making its services more accessible for patients
and improving its management of both employees and its services. As part of its operations, GCH
collects/stores sensitive data, which is digitally processed and stored. A few months ago, GCH became
a victim of a double extortion cyber attack where a significantly large number of files carrying
sensitive/personal health information of patients being treated at GCH were stolen by a cyber criminal
group. The incident triggered a backlash from the community, demanding GCH to undergo a cyber
security audit of its systems, operations, and policies to highlight significant grey areas requiring
immediate action. Resultantly, the chief executive of GCH, Tash, has agreed to a security review of its
digital footprints, recommending prevailing cyber security guidelines/standards. GCHs existing setup,
awareness and behaviour are as follows:
a. Every employee at GCH uses the organisations computer with administrative privileges to
undertake their daily routine work.
b. GCH requires employees to change their passwords every twelve months, consisting of a minimum
of 6 characters with a mandatory requirement of having one special character in the new
password.
c. GCH employees are authenticated using password-based authentication.
d. The data is encrypted using Vigenre cipher to ensure confidentiality.
e. GCH uses a web-based application to run its daily operations. The application stores user
passwords in the database using the Secure Hash Algorithm 1(SHA) cryptographic hash function.
f. The web-based application is running Transport Layer Security (TLS) version 1.0.
g. The healthcare provider disposes of their storage devices after using them for a few years, with
data being deleted using software with a single pass.
h. The employees are allowed to work from home and connect to the GCHs network using the
default Remote Desktop Protocol (RDP).
CSI1101, Computer Security Vulnerabilities and Countermeasures PAGE 2
Edith Cowan University
School of Science
i. No physical security mechanism exists to safeguard the GCHs IT systems (end devices and
servers). Any employees can enter the GCHs server room and access the servers, switches,
routers, etc. In addition, due to regular power surges, the site is not conducive to running digital
operations.
j. All physical networking and security devices, such as firewalls and intrusion detection systems
(IDS), are being used without redundancy.
Core Tasks:
Tash has approached you to analyse her organisations current IT setup and practices, along with the
security issues discussed above. She wants you to prepare a concise report addressing the following:
Task 1: Identify six critical cyber security issues that GCH should address as a priority. In devising the
security solutions, you should address the following requirements:
a. Identify the six critical cyber security issues (threats and vulnerabilities) currently faced by
GCH.
b. Explain why your chosen/identified six critical cyber security issues should be addressed
immediately. Justify the potential impact(s) of each identified issue in terms of
Confidentiality, Integrity, and Availability (CIA) triad.
c. Application of security solutions: Explain in detail how you propose to address these six
critical cyber security issues. You need to propose two solutions for each issue.
d. Identify your preferred/recommended solution from your two proposed solutions (in c).
Then, justify why your preferred solution is better than your alternative

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing Fundamentals, Design, and Implementation

Authors: David M. Kroenke, David J. Auer

14th edition

133876705, 9781292107639, 1292107634, 978-0133876703

More Books

Students also viewed these Databases questions