Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

Please help me to solve this question. Thank you! (https://learn.cisecurity.org/control-download)- cis control 17 (https://www.mci.gov.sg/-/media/mcicorp/doc/report-of-the-coi-into-the-cyber-attack-on-singhealth-10-jan-2019.ashx) Report on Singapore Health Cyber Attack The Public Report of the

Please help me to solve this question. Thank you!

(https://learn.cisecurity.org/control-download)- cis control 17

(https://www.mci.gov.sg/-/media/mcicorp/doc/report-of-the-coi-into-the-cyber-attack-on-singhealth-10-jan-2019.ashx) Report on Singapore Health Cyber Attack

image text in transcribed
The Public Report of the Committee of Inquiry into the Cyber Attack on Singapore Health Services Pte Lid's Patient Database in 2018 is a shining example of control failure. Superficially, Singapore Health Services' governance of information security had the appearance of being organised. However, at a granular level, it contained a number of significant flaws which prevented the organisation from achieving its mission, namely to protect the patient database. containing what, in Malaysia, would be regarded as " sensitive personal data ". It is tempting to think of privacy and cyber-security primarily as a technical challenge, but the actions of people also play a critical part in the success or failure of an enterprise. People fulfil important functions at every stage of system design, implementation, operation, use, and oversight. 1. Confining your analysis to CIS Control 17 (https://www.cisecurity.org/controls/) and using that control as your context, identify the deficiencies in Singapore Health Services' security awareness and training, and explain what contribution those deficiencies and the people responsible for them had on the success of the cyber attack. 2. Using CIS Control 17 (and the additional materials referenced in the discussion of that control in the CIS Controls (SANS is particularly useful), draft a security awareness programme targeted at the specific deficiencies you have identified in response to part 1, using annotated cross-references to paragraphs in the report of the Committee of Inquiry, identifying each specific deficiency being targeted

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Business Law and the Legal Environment

Authors: Jeffrey F. Beatty, Susan S. Samuelson, Patricia Sanchez Abril

8th edition

1337404667, 1337404662, 9781337404532, 1337404535, 978-1337736954

Students also viewed these Accounting questions

Question

What is cultural tourism and why is it growing?

Answered: 1 week ago