Here are some hints on how to go about doing the write-up after
you have read and analysed the above case study. You may refer to
your lecture slides for basis of using various frameworks and using
the concepts learnt and then subsequently structure your write-up.
The expected format of write-up is Problem Statement, Analysis,
Findings, Proposed Solutions and Recommendations as outlined below.
Problem statement must contain: - Type of cybersecurity attack -
Who the attacker was? Type of attacker - What extent of attack was
carried out - Summary of the attack and problem itself Analysis
must contain: - Impact analysis – financial, humanitarian,
reputational damage - Use of various models, frameworks, diagrams,
flow charts etc as learnt in the lectures - Security standards,
relevant concepts - Methodology of analysis - Web/online research
(if any) and the approach being used for analysis Findings,
proposed solutions, and recommendation must contain the following:
To further assist you with this write-up, you could imagine that
your project group is an internal Cyber Incident Response Team
(CIRT) employed at the Florida water treatment facility and your
role is to respond to future advance cyber intrusions. In light of
this, the CIRT should focus on the following cyber response
capabilities: - Incident response capabilities – Developing a
customized internal Incident Response capability for the company to
investigate advanced cyber incidents. - Investigative capabilities
– Identifying technical and human resources to deploy to respond to
both an internal or external cyber crime incidents and carry out
necessary cybersecurity audits. 9 - Containment plan – Development
of a consistent approach to contain an advanced cyber threat. -
Various computer network security policies that need to be adopted
by the company in order to mitigate the current challenges and
secure its unique operational characteristics. These policies can
be determined as a document that outlines the rules, laws and
practices for computer network access. The treatment facility needs
to maintain strong security for all their computer networks. It
mainly provides a baseline from which the facility needs to
configure and audit their overall computer network access. Devise
relevant IT rules and IT security policies for the facility on the
following: Password policy Network login policy Remote access
policy Internet connection policy External contractors &
staff access policy Network/IT asset management control policy
IT Resource user policy Anti-virus and malware policy Data
backup policy System update policy
Here are some hints on how to go about doing the write-up after you have read and analysed the above case study. You may
-
- Posts: 43759
- Joined: Sat Aug 07, 2021 7:38 am