Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Computer Security ( CSI 1 1 0 1 ) Computer Security Vulnerabilities and Countermeasures Assignment Overview: This assessment requires you to write a report on
Computer Security CSI
Computer Security Vulnerabilities and Countermeasures
Assignment Overview:
This assessment requires you to write a report on a given scenario, which investigates existing security
issues technical and nontechnical and propose countermeasures to overcome the identified
problems. The scenario has been developed after observing various realworld security vulnerabilities
that organisations face, which cyber criminals can leverage.
This assessment will develop your understanding of analysing security issues and applying the
knowledge acquired throughout the semester to provide solutions to these issues. You will also be
required to seek guidance from various security forumsmanuals such as the 'Australian Government
Information Security Manual', 'The Australian Signals Directorate ASD Top Mitigation Strategies'
'Essential Eight', several 'NIST Standards', SANS resources, and others. References to these resources
will be provided through weekly modules. You should also apply feedback from your report
assessment to improve your writing skills according to industry standards.
Scenario:
Great Care Hospital GCH is a hospital in Perth, Western Australia, providing diagnostic, treatment,
and rehabilitation for patients suffering from various health issues. extensively relies on the use
of technology and, hence, has a large digital footprint, making its services more accessible for patients
and improving its management of both employees and its services. As part of its operations, GCH
collectsstores sensitive data, which is digitally processed and stored. A few months ago, GCH became
a victim of a double extortion cyber attack where a significantly large number of files carrying
sensitivepersonal health information of patients being treated at were stolen by a cyber criminal
group. The incident triggered a backlash from the community, demanding to undergo a cyber
security audit of its systems, operations, and policies to highlight significant grey areas requiring
immediate action. Resultantly, the chief executive of GCH Tash, has agreed to a security review of its
digital footprints, recommending prevailing cyber security guidelinesstandards GCHs existing setup,
awareness and behaviour are as follows:
a Every employee at uses the organisation's computer with administrative privileges to
undertake their daily routine work.
b GCH requires employees to change their passwords every twelve months, consisting of a minimum
of characters with a mandatory requirement of having one special character in the new
password.
c GCH employees are authenticated using passwordbased authentication.
d The data is encrypted using Vigenre cipher to ensure confidentiality.
e GCH uses a webbased application to run its daily operations. The application stores user
passwords in the database using the Secure Hash Algorithm SHA cryptographic hash function.
f The webbased application is running Transport Layer Security TLS version
g The healthcare provider disposes of their storage devices after using them for a few years, with
data being deleted using software with a single pass.
h The employees are allowed to work from home and connect to the GCHs network using the
default Remote Desktop Protocol RDP
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started