Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Despite the strictest security protocols and measures, every organization has certain vulnerabilities that can be exploited by hacking attacks. Once these vulnerabilities are identified, cyber
Despite the strictest security protocols and measures, every organization has certain vulnerabilities that can be exploited by hacking attacks. Once these vulnerabilities are identified, cyber security professionals need to be wellequipped to securing them. Occasionally, however, these may not be secured in time. A security consultant also needs to be able to counter the attack with the resources available.
This Assignment requires you think about the multiple ways in which a business or an organizations security vulnerabilities can be exploited, and you will be required to defend against such attempts so as to disrupt a hacking attack and securing the organizations vulnerabilities.
Vulnerability Analysis
You will be required to assess organizational vulnerabilities for your chosen context and develop a defense plan to disrupt the hackers activities.
Select three organization vulnerabilities and compare them in terms of:
i Level of potential exposure
ii Likelihood of this vulnerability being exploited.
iii. Magnitude of potential impacts
Please note that your three selected vulnerabilities should vary in all the abovementioned characteristics.
Security Plan
Based on your chosen vulnerabilities, propose a security plan that can be implemented by your organisation to reduce exposure. Your security plan should include:
Focus on the social and organisation elements of ensuring good security, and the tradeoffs between security and freedom.
Suggest approaches this organisation could take to enhance their cybersecurity, and for each approach discuss
i The resources required to implement this framework
ii Evaluation of the effectiveness vs costs of your proposed security plan
iii. Ability of the proposed framework to cover multiple vulnerabilities
iv Implications on the organisation and their core business
v Tradeoffs between security, privacy and freedom
How does the global environment around hacking improve or complicate your defense plan? Discuss the role of the local and global hacking community. Provide an example of one global organisation that could help you.
Context : Cafe
Location & environment
Inner suburb cafe
On the outskirts of the city, with both residential and commercial buildings
Mid to highdensity area
Technology
Passwordprotected WiFi for staff and patrons
iPads used for taking orders, sending orders wirelessly to kitchen, and transmitting to cashier counters
Externally hosted file sharing for staff Google Drive
Staff HR and POS systems run on the cafe server located on the premises
POS Point of Sales system with integrated:
Payment technologies
Staff rosters
Operating hours
Hourly sales reports
All files are backed up on the cafe server every night
POS system and staff files secured within caf firewall and cloudsynchronised on a nightly basis
People
Permanent fulltime staff: baristas, waiters, manager
maintenance staff who come in every evening after closing pm
All permanent staff require police checks
Maintenance staff require reference checks with their previous employers
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started