1.1: Analyse the core vulnerabilities within a network environment and an online environment
1.2: Explain how the emergence of security thinking and tools can benefit a network environment
2.1: Evaluate the link between network architecture and security engineering concepts
3.1: Evaluate internal risks and exposure
3.2: Evaluate available process and physical defences against malicious network intrusions
4.1: Explain how key security concepts can be applied in a large and distributed organisation
4.2: Assess how key factors are applied to enhance and embed a holistic approach to network and systems resilience
MALWARE – Explain how ransomware was used to
attack any given case study organisation (of your choice). What measures could
have been put in place to prevent or lessen the attack’s impact?
Imagine
that the presentation should be made to a Senior Management Team or C-Suite
Board of Directors meeting.
The
REPORT should include a realistic and fully costed Courses of Action/ recommendations
chapter at the end of the document. The presentation should include audio and
no more than 15 slides.
Guidance
This is a presentation task; you
are permitted to provide video with audio if you so wish. But video images of
yourself are not mandatory.
PLEASE NOTE – we are seeking a
descriptive presentation here, not a tabular risk assessment. (Although, at
least one slide showing a tabular risk assessment calculation will be
acceptable and viewed as ‘good practice’.)
Whatever your current role, you
should be able to imagine applying this presentation into a true, or imaginary,
professional business or governmental environment. This means that you should
be able to back-up your ideas and writing with evidence.
Posted inUncategorized