Assessment 2 - Cyber Security (Solved)
Assessment 2 - Cyber Security (Solved)
1_v3
Details of Assessment
Term and Year Time allowed
Assessment No 2 of 2 Assessment Weighting 40%
Assessment Type Writing questions
Due Date Room
Details of Subject
Qualification ICT40118 Certificate IV in Information Technology
Subject Name Cyber Security
Details of Unit(s) of competency
Unit Code (s) and
ICTICT424 Address Cyber Security Requirements
Names
Details of Student
Student Name
College Student ID
Details of Assessor
Assessor’s Name
Assessment Outcome
Assessment
Competent Not Yet Competent Marks /40
Result
Feedback to Student
Progressive feedback to students, identifying gaps in competency and comments on positive improvements:
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
____________________________________________________________________
______________________________________________________________________________________
The purpose of this assessment is to assess the student Not Yet Competent
in the following learning outcomes: Competent (C)
(NYC)
Knowledge Evidence
Question 1
What is the difference between a threat and vulnerability? Identify the common Cyber
Security risks and threats. Write your answer in 200-250 words.
Threat: Threat is simply what an affiliation is guarding itself against. Anything that can
abuse a shortcoming, intentionally or coincidentally, and secure, hurt, or annihilate a bit of
leeway.
There are three types of threats which are as follow:
Intentional threats
Unintentional threats
Natural threats
Question 2
What are the two most common Cyber Security controls implemented in an organization?
What are the advantages having such controls in place and explain the disadvantages
should they be not implemented? Write your answer in 200-250 words.
Question 3
One of the consultants working at Devon Accounting was offered a job at a larger accounting
firm. The consultant had access to clientele list, information on network drive and customer
data. Should this information be used in a wrong way, it would have dire consequences to
the company’s image. Privacy and data integrity would be compromised.
Using a threat classification method, conduct a threat and risk assessment. What controls
could the company use to prevent this situation from occurring? Write your answer in 200-
250 words.
Below is the threat and risk assessment of the issue that rose in Devon accounting. This
assessment was conducted by security manager along with 5 team members of this
company.
Control:
Company should follow some technical controls which includes securing the system of
the company by authentication. Data should be encrypted. Cryptographic controls should
also be followed. Another control Denial of service protection should be followed.
Question 4
What are cyber assets and define vulnerable assets? List and explain three security control
mechanisms to protect valuable assets. Write your answer in 200-250 words.
Question 5
In past eras, cybersecurity wasn’t an issue for business owners. But now, the internet
defines many corporate activities. Some businesses operate entirely online, and even the
ones that don't typically include the internet in their operations somehow use it - whether it’s
marketing to customers or keeping accurate records.
If company leaders do not understand the cybersecurity laws that relate to their operations,
they may be subjected to substantial fines. Moreover, substantial costs could result from
having to achieve compliance after regulatory bodies discover shortcomings and order
remedies. But awareness is the first step to avoiding issues.
What are the main legislative and regulatory requirements to Cyber Security inside
Australia? Write your answer in 200-250 words.
The Privacy Act 1988 (Privacy Act) was familiar with advance and secure the privacy of
individuals and to control how Australian Government workplaces and relationship with a
yearly turnover of more than $3 million, and some various affiliations, handle singular
information.
The Privacy Regulation 2013 relates to various plans of the Privacy Act including:
Question 6
Research has shown that the majority of information security attacks stem from human error,
not from malicious intent. What controls can the company put in place to manage the human
errors to minimize the risk of cyber-attacks or data lost? Write your answer in 150-200
words.
Affiliations need to develop an incredible and thorough security framework that will
guarantee tricky data, decrease perils and assurance the reputation of an affiliation
remains impeccable.
The controls to minimize the risks of cyber-attacks or data lost in a company be done in
many ways as mentioned below:
Question 7
What are the Industry standards relevant to cyber security in Australia? Write your answer in
150-200 words.
Standards Australia has propelled another team of industry delegates entrusted with
setting up gauge cybersecurity standards and industry-explicit augmentations. The new
team, which met just because this month, adjusts the modern standards-setting body
with cybersecurity advancement bunch AustCyber and the NSW government in an
exertion that its individuals concurred would "improve the act of cybersecurity across
Australian industry through part explicit activities and specialized direction, more
prominent collaboration among advances, and gaining from worldwide models".
Question 8
One of the tests conducted during cyber security is called Penetration Testing, define the
term. Explain 5 stages of Penetrating Testing and list and elaborate the penetration testing
methods. Write your answer in 200-250 words.
Penetration testing: Penetration testing, furthermore called pen testing or good hacking,
is the demonstration of testing a PC structure, framework or web application to find
security shortcomings that an assailant could mishandle. Penetration testing can be
robotized with programming applications or performed truly.
Five stages of penetration testing are as follow:
1. Reconnaissance: During this stage, the security testing gathering will collect
anyway much information as could sensibly be normal about the goal before
playing out any ambushes.
2. Scanning: Scanning is performed on the target application with a point of
recognizing the shortcomings that can be abused in later stages for gaining
access.
3. Gaining Access: Security testing bunch mishandles the structure to acquire
entrance, by compromising the recognized shortcomings in the past stages.
4. Maintaining Access: Once the access is gotten in the earlier stage, the
gathering needs to figure out how to continue gaining access to the structure.
5. Covering Tracks: Finally, the gathering will figure out how to eradicate the traces
of attack with a point of not getting perceived.
/5
Question 1
/5
Question 2
/5
Question 3
/5
Question 4
/5
Question 5
/5
Question 6
/5
Question 7
/5
Question 8
TOTAL /40