- P3 Describe the types of training and development used by a selected business: BTEC Business Extended Diploma Pearson Course Work, UK
- Describe how a selected business identifies training needs: BTEC Business Extended Diploma Pearson Course Work, UK
- Discuss your chosen business, background information and why you have chosen that business: BTEC Business Extended Diploma Pearson Course Work, UK
- Activity 7: Risk management in an organisation should be both sensible and proportionate to the level of risk involved: NEBOSH IDIP ID1 Research Paper Course Work, OU, UK
- Activity 6: Reviewing health and safety performance Critique your chosen organisation’s health and safety: NEBOSH IDIP ID1 Research Paper Course Work, OU, UK
- Activity 5: Management of contractors Review how your chosen organisation selects contractors and manages them while they are on site: NEBOSH IDIP ID1 Research Paper Course Work, OU, UK
- Activity 2: Preparing a brief research report on approaches to worker consultation: NEBOSH IDIP ID1 Research Paper Course Work, OU, UK
- Create an organisational risk profile for your chosen organisation: NEBOSH IDIP ID1 Research Paper Course Work, OU, UK
- Explain the differences between learning requirements and continuous professional development: Leadership and Management Assignment, UL, UK
- What steps, component parts and enabling tools would you use to develop a therapy: Advanced therapeutic medicinal products Course Work, TUM, UK
- CS3DS19: Construct a KNIME workflow to understand the data characteristics and quality, report: Data Science Algorithms and Tools Course Work, UOW, UK
- Explain how principles of support are implemented in health and social care practice: Diploma In Health And Social Care Level 5 Course Work, UK
- The UK Manufacturing UK LTD is facing an array of issues that require a sound understanding: Management Decision Making Assignment, USM, UK
- Identify sources of information and guidance about how to support a child or young person: child care diploma level 3 Course Work, OU, UK
- Explain why it is important to take full account of a child or young person’s level of understanding: Child care diploma level 3 Course Work, OU, UK
- Understand how to support children and young people who have experienced harm or abuse: child care diploma level 3 Course Work, OU, UK
- The purpose of this assignment is for you to demonstrate your understanding: Understand the Market in which an organisation operates Course Work, UK
- Facebook continues to face major ethical and legal challenges. What challenges Facebook brand is facing today: Marketing Course Work, UOL, UK
- Explain the work and service Cambridge Analytica provided Trump’s campaign: Marketing Course Work, UOL, UK
- Write up and return a report on what you have done and what you have found out. Aim – why was this investigation carried out?: IFP CHEMISTRY Lab Assignment, UK
Demonstrate an understanding of the fundamental concepts and theories of Cybersecurity: Cyber Security Course Work, UOWL, UK
University | University of West London (UoWL) |
Subject | Cyber Security |
Learning Outcomes,
- Demonstrate an understanding of the fundamental concepts and theories of Cybersecurity.
- Demonstrate evidence of critical thinking, analysis, synthesis, and evaluation in the design and formulation of Cybersecurity solutions.
- Select relevant Cybersecurity tools and techniques, and show how they can be effectively
Task 1:
Network Diagram (addressing LO1): With reference to the network description in the scenario, you are required to draw a network diagram following the approach covered in the week 6 seminar. You must label all devices with reference to the following: operating system version, I Tech’s domain name is mapped to IP address 134.83.62.1); and role of the device (e.g., web server, workstation, network switch). You can create subnets for each space (e.g., Office, Server room, etc.) using all the IP addresses in the range 134.83.62.1-134.83.62.254 in order to keep spaces separate.
During a Red Team exercise, it is discovered that the Windows server which hosts the public-facing website and the internal document storage runs an outdated version of the Microsoft SharePoint 2019 server which has a known software vulnerability (see https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41344). This vulnerability can be exploited by an attacker who accesses the document storage service from a remote location to deploy and execute unauthorized code to the Windows server.
This enables attackers to create Windows user accounts on the infected machines and to access the infected machines through Remote Access software such as TeamViewer, Go2Assist, and LogMeIn. In addition to the vulnerability discovered during the Red Team exercise, the National Cyber Security Centre has recently issued an advisory that UK businesses are actively being targeted by crypto-jacking attacks.
Cryptojacking is the act of taking over infected machines to utilize idle CPUs for mining cryptocurrencies such as Bitcoin and Ethereum. In this type of attack, corporate employees are sent phishing e-mails
Do You Need Assignment of This Question
Task 2
Threat Reporting and Attack Vector Mapping (addressing LO1 and LO2): Taking into account the Red Team exercise findings and the NCSC advisory, you are required to identify potential threats to the assets in the network. You must identify and justify at least one threat based on the findings of the Red Team exercise and at least one threat based on the NCSC advisory. In addition, you must identify the attack vectors that should be employed if a threat agent gives rise to these threats, describe how these attack vectors can pose a threat to an asset, and map these vectors to the MITRE ATT&CK framework. Specifically, you should match the attack vectors to the Tactics and Techniques in the ATT&CK framework
Task 3
Risk Assessment (addressing LO2): Having identified the required number of threats, you are required to conduct a risk assessment for the Brunel Tech start-up network. You must use the risk register that is provided in the coursework template and explain the Confidentiality, Integrity, and Availability implications for Brunel Tech
Task 4
Risk Controls (addressing LO3): Using the risk register that you have compiled in your response to Task 3, you are required to select the appropriate controls to mitigate the risks that you have identified and give the reasons for your chosen controls. At least one control must be selected for each of the risks that you have specified and you must specify the Cybersecurity tools that implement the risk controls that you have chosen
Buy Answer of This Assessment & Raise Your Grades
Hire a top-notch coursework writing service at StudentsAssignmentHelp.co.uk. our coursework writers are experienced and knowledgeable to design step-by-step coursework solutions on cyber security assignments at the lowest price.