UEL-CN-7014 Security Management, University of East London

Post New Homework

Security Management

A list of selected real-world cyber security incidents is included below*.

Colonial Pipeline, May 2021

Nine Entertainment, March 2021

Marriot International, March 2020

Twitter, July 2020

Electronic Arts (E.A.), June 2021

Choose ONE of the above incidents and write a report analysing the cyber security incident. Your report must include the following information:
A brief overview of the incident
An explanation of who was affected by the incident
The nature and type of cyber attack
The severity of the cyber attack
Threat actors and their motivates (if any)

Any identified Indicators of Compromise (IOCs)
The elements of security that were compromised (i.e. the C.I.A. Triad)

The systems, data or users affected

The vulnerability or vulnerabilities exploited (if known)
Actions taken to control and prevent further damage
Lessons learned

Your report should follow the structure below:

Title/Section page
Introduction
Incident overview
Incident analysis
Lessons learned
Conclusion

References

You should aim for around 2000-2500 words for Part 1A

Based on all the available information from the incident in Part 1A, describe or outline a possible Cyber Kill Chain. You may wish to include any diagrams or illustrations to support your answer.

This should be a maximum of 350 words

Carrying out your own research on the Fastly Content Delivery Network (CDN) internet outage in June 2021.
Briefly explain the incident (maximum 100 words)
Discuss the incident response and disaster strategies that companies affected by this event should implement. (maximum 200 words)
Create a 'Business Continuity' Information Security policy document for the event (maximum 2 pages)

Answer the following questions about Security Management topics

Discuss the benefits of ISO/IEC 27001 certification.

Discuss and explain how an audit or what type of audit should be used for the chosen incident in Part 1A.
Outline a Risk Management process for the incident in Part 2.

The submission will be a ONE PDF file structured in the following sections:
Title Page
Include: the date, assignment name, module name and code, student first and last names and student ID number
Part 1A - Cyber Attacks

Part 1B - Cyber Kill Chain

Part 2 - Disaster Recovery and Business Continuity

Part 3 - Security Management Questions

References
All references must be in the appropriate Harvard referencing style

You must use a sufficient number of suitable scholarly references

Attachment:- Security Management.rar

Post New Homework
Captcha

Looking tutor’s service for getting help in UK studies or college assignments? Order Now