Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You currently work in the IT department of a loyalty services provider called BuyGood. Many other businesses sign up for BuyGoods loyalty program as a

You currently work in the IT department of a loyalty services provider called BuyGood. Many other businesses sign up for BuyGoods loyalty program as a way to gain better insights into their customers shopping behaviours. These businesses encourage their customers to use BuyGood regularly in return for incentives such as discounts on their purchases and occasional free items. In return, BuyGood provides these businesses with insights about shopping trends, behaviours, and forecasts. For various reasons, BuyGood has not had a strategic position about its cybersecurity and therefore, has not hired dedicated cybersecurity personnel and/or created a cybersecurity department responsible for protecting against cybersecurity incidents. T In light of some recent cybersecurity breaches in Australia and overseas, BuyGood realises that it needs to improve its cybersecurity position. Your manager knows you are very interested in all things cybersecurity, and as a graduate of UNSW, she knows you have all the right credentials to advise BuyGood about their way forward with cybersecurity. She has suggested that you be appointed as their cybersecurity advisor. You have been asked to provide a briefing paper to your manager to enable her to update senior executives of BuyGood about their cybersecurity position and what they should do to protect their operations. Your manager needs to update the board in three hours so your answers must be

Using a diagram, explain the networking technologies used by BuyGood. This must also identify the various layers of TCP/IP protocol and how data travels within that network. Your answer must:

a. Identify and briefly describe each of the layers of the TCP/IP protocol , providing examples of how it is implemented within the BuyGood network

b. Provide ONE (1) example from BuyGoods network about how TCP/IP can be used by a threat actor.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing Cases An Active Learning Approach

Authors: Mark S. Beasley, Frank A. Buckless, Steven M. Glover, Douglas F. Prawitt

2nd Edition

9781266566899

Students also viewed these General Management questions