Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Question 1 You are a security consultant who is providing advice to the Head of ITS ( Information Technology Services ) at ABE - S
Question
You are a security consultant who is providing advice to the Head of ITS Information Technology Services at ABES a private tertiary education institution ABES have started offering online programmes, in addition to their on campus ones, and want to revise their InfoSec programme to ensure it meets their current information security needs and requirements.
As part of your work, you will need to perform an initial assessment of the efficiency of the security controls that ABES may have already put in place. To prepare for the assessment, you start with creating a checklist of the controls you expect to find. The checklist draws on the classifications provided in Ulven and Wangens article cited below and in particular, on Table
Ulven, J B & Wangen, G A Systematic Review of Cybersecurity Risks in Higher Education. Future Internet,
Your task:
Prepare a wellresearched checklist of the expected security controls. The checklist must meet the requirements below.
Requirements:
Identify the most common operational, managerial, and technical controls that you would expect to be in place, for any two of the security incidents: Social engineering and targeted attacksInsider attacksDoSDDoSAccount hijackcompromised userTable Vulnerability, threat, asset, and consequence analysis of the top threat events.
For each expected control, explain which vulnerability it may help address and how it will mitigate the threat For the specific vulnerabilities and threats associated with each of the incidents, refer to Table the second and the third column
For each selected incident, you are expected to identify the two most expected controls in each group. If you feel it is necessary to add more controls, add a line to the table.
It is important to provide a clear explanation of what vulnerability the control is trying to address and how having the control in place may help mitigate the risk posed by the threat.
Question
a Explain the concept of Information Security Culture. Use two examples to illustrate the concept. Discuss two strategies which can be used to influence the information security culture of an organisation.
b Provide four examples of how privacy legislation typically protects private information.
c Security control effectiveness and impact are two categories of information security performance measurements. Give two examples of a measurement from each category.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started