Professional Documents
Culture Documents
1_v3
Details of Assessment
Writing questions
Room
Details of Subject
Cyber Security
Details of Unit(s) of competency
Unit Code (s)
ICTICT424 Address Cyber Security Requirements
and Names
Details of Student
Student ID
Student Declaration: I declare that the work submitted is my
own and has not been copied or plagiarised from any person or Student’s
source. I acknowledge that I understand the requirements to Signature:
complete the assessment tasks. I am also aware of my right to
appeal. The feedback session schedule and reassessment Date:
procedure were explained to me.
Details of Assessor
Assessor’s Name
Assessment Outcome
Assessm
ent Result Competent Not Yet Competent
Marks /40
Feedback to Student
Progressive feedback to students, identifying gaps in competency and comments on positive improvements:
(NYC)
Cyber Security - Assessment Task 1 v.1, Last updated on 19/08/2019 Page 1
T-1.8.1_v3
Knowledge Evidence
Each assessment component is recorded as either Competent (C) or Not Yet Competent (NYC). A student can only
achieve competence when all assessment components listed under “Purpose of the assessment” section are recorded
as competent. Your trainer will give you feedback after the completion of each assessment. A student who is
assessed as NYC (Not Yet Competent) is eligible for re-assessment.
Resources required for this Assessment
Assessment type:
• Written Questions
Applicable conditions:
• This knowledge test is untimed and are conducted as open book tests (this means you are
able to refer to your textbook during the test).
• You must read and respond to all questions.
• You may handwrite/use computers to answer the questions.
• You must complete the task independently.
• As you complete this assessment task you are predominately demonstrating your written
skills and knowledge to your trainer/assessor.
Ransomware Attacks: Hackers can gain access to your computer encrypt your
files and demand a payment in return for your files back.
‘Dronejacking’ places threats in the sky: a drone outfitted with a full hacking
suite that would allow it to land on the roof of a home, business, or critical
infrastructure facility and attempt to hack into the local wireless network.
Security controls play a foundational role in shaping the actions cyber security professionals take to protect an
organization.
1. Antivirus
Antivirus Software is a data security utility which is installed in a computer system with a purpose of
protection from viruses, spyware, malware, rootkits, Trojans, phishing attacks, spam attack, and other online
cyber threats
Advantages
Disadvantages
In case your computer is attacked by a virus, it can affect your computer in the following ways:
Slow down the computer
Damage or delete files
Reformat hard disk
Frequent computer crashes
Data loss
Disadvantages
Losing data is one of the worst things that can happen to an organization. This loss will represent a big step
backwards in all aspects: from the economic one due to the loss of profits, development time, fines and
penalties and the associated direct costs.
Question 3
One of the consultants working at Devon Accounting was offered a job at a larger accounting firm. The
consultant had access to clientele list, information on network drive and customer data. Should this
information be used in a wrong way, it would have dire consequences to the company’s image.
Privacy and data integrity would be compromised.
Using a threat classification method, conduct a threat and risk assessment. What controls could the
company use to prevent this situation from occurring? Write your answer in 200- 250 words.
For companies, data integrity is essential, data privacy measures must be taken to avoid data corruption, so that
the company's image is not damaged due to misuse of company information. In the database, controls must
be implemented to guarantee the integrity of the information, since it is sensitive information that can have
serious consequences.
It is necessary to guarantee the integrity of the data, against unauthorized access or corruption of employees, it is
important to incorporate the use of systems, processes and procedures that keep the data inaccessible to
people who may use it in a harmful or unintentional way.
This is accomplished through a variety of data protection methods, including backup and replication, database
integrity constraints, and validation processes. The company should monitor the user database and look for
suspicious changes or attacks in the databases and remove access.
Risks to data integrity can be easily minimized or eliminated by doing the following:
Limit access to data and change permissions to restrict changes to information by unauthorized parties
Validate data to make sure it is correct both when it is collected and when it is used
Make a backup of your data
Use logs to keep track of when data is added, modified, or deleted
Patch applications and run security updates and scans
Protect devices and accounts with complex, limited time passwords with multi-factor authentication.
Protect systems by limiting application control and limit administrative accounts.
Question 4
What are cyber assets and define vulnerable assets? List and explain three security control mechanisms to protect
valuable assets. Write your answer in 200-250 words.
Cyber assets include hardware, software, data, and peopleware (the people who interact
with them). ... Vulnerabilities are flaws or weaknesses that can be exploited by an
adversary to successfully attack an asset
Cyber asset is any data, device, or other component of the environment that supports information-related
activities. Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical
applications and support systems) and confidential information. Assets should be protected from illicit
access, use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization.
Controls can be implemented through technical means, such as hardware or software, encryption, intrusion
detection mechanisms, two-factor authentication, automatic updates, continuous data leak detection, or
through nontechnical means like security policies and physical mechanisms like locks or keycard access.
Controls should be classified as preventative or detective controls. Preventative controls attempt to stop attacks
like encryption, antivirus, or continuous security monitoring, detective controls try to discover when an
attack has occurred like continuous data exposure detection.
Question 5
In past eras, cybersecurity wasn’t an issue for business owners. But now, the internet defines many
corporate activities. Some businesses operate entirely online, and even the ones that don't typically
include the internet in their operations somehow use it - whether it’s marketing to customers or
keeping accurate records.
If company leaders do not understand the cybersecurity laws that relate to their operations, they may
be subjected to substantial fines. Moreover, substantial costs could result from having to achieve
compliance after regulatory bodies discover shortcomings and order remedies. But awareness is the
first step to avoiding issues.
What are the main legislative and regulatory requirements to Cyber Security inside Australia? Write
your answer in 200-250 words.
AUSTRALIA’S CYBER SECURITY STRATEGY 2020
Vision
A more secure online world for Australians, their businesses and the essential services upon
which we all depend.
Approach
This vision will be delivered through complementary actions by governments, businesses and the community.
Strong foundations
This Strategy builds on the 2016 Cyber Security Strategy, to advance and protect Australia’s interests online.
Highlights
This includes:
— Protecting and actively defending the critical infrastructure that all Australians rely on, including cyber
security obligations for owners and operators.
— New ways to investigate and shut down cyber crime, including on the dark web.
— Stronger defences for Government networks and data.
— Greater collaboration to build Australia’s cyber skills pipeline.
— Increased situational awareness and improved sharing of threat information.
— Stronger partnerships with industry through the Joint Cyber Security Centre program.
— Advice for small and medium enterprises to increase their cyber resilience.
— Clear guidance for businesses and consumers about securing Internet of Things devices.
— 24/7 cyber security advice hotline for SMEs and families.
— Improved community awareness of cyber security threats.
Question 6
Research has shown that the majority of information security attacks stem from human error, not from
malicious intent. What controls can the company put in place to manage the human errors to
minimize the risk of cyber-attacks or data lost? Write your answer in 150-200 words.
Employees occasionally make mistakes without realizing how dangerous they can be to the organization’s
cybersecurity.
The most common and dangerous mistakes employees make when handling data are:
Update your corporate security policy. This should clearly outline how to handle critical data and passwords,
who can access them, which security and monitoring software to use, etc.
Educate your employees. Make your employees aware of potential threats and explain how dangerous and
expensive the consequences of their mistakes can be.
Use the principle of least privilege. The easiest and most reliable way to secure data access is to deny all
access by default. Allow privileged access only when needed on a case-by-case basis.
Monitor your employees. User activity monitoring tools are needed to detect malicious activity and secure
your system from data leaks and malicious attacks.
Using strong password. It has to establish clear rules about using strong passwords and define
procedures for properly handling, storing, and sharing passwords
Question 7
What are the Industry standards relevant to cyber security in Australia? Write your answer in 150-200
words.
Cyber security is more than just an information technology problem. It is a broader business and
societal issue that needs to be managed by economies all around the world.
In response, the International Organization for Standardization (ISO) and International
Electrotechnical Commission (IEC) developed the ISO/IEC 27000 series, Information security
management systems standards.
Fundamentally, these standards are designed to assist any entity, regardless of size, keep
information systems and data secure.
Cyber security standards aim to support and protect expanding digital economies across the Pacific.
Standards Australia has released a report focused on cyber security in the Pacific region. Pacific
Islands Cyber Security Standards Cooperation Agenda sets out recommendations on how to
strengthen cyber security in the Pacific Islands with the use of standards.
This scope of work is delivered in support of Australia’s International Cyber Engagement Strategy
and aimed at encouraging innovative cyber security solutions.
Cyber security standards can protect business data, which in turn helps build confidence in clients,
customers and partners.
Question 8
One of the tests conducted during cyber security is called Penetration Testing, define the term.
Explain 5 stages of Penetrating Testing and list and elaborate the penetration testing methods. Write
your answer in 200-250 words.
Penetration test, also known as a pen test, is a simulated cyber-attack against your
computer system to check for exploitable vulnerabilities.
Stages:
2. Scanning
The next step is to understand how the target application will respond to various intrusion
attempts. This is typically done using:
Static analysis – Inspecting an application’s code to estimate the way it behaves while
running.
Dynamic analysis – Inspecting an application’s code in a running state.
3. Gaining Access
This stage uses web application attacks, such as cross-site scripting, SQL injection and
backdoors, to uncover a target’s vulnerabilities. Testers then try and exploit these
vulnerabilities, typically by escalating privileges, stealing data, intercepting traffic, etc., to
understand the damage they can cause.
4. Maintaining access
The goal is to see if the vulnerability can be used to achieve a persistent presence in the
exploited system— long enough for a bad actor to gain in-depth access. The idea is to
imitate advanced persistent threats, which often remain in a system for months in order to
steal an organization’s most sensitive data.
5. Analysis
The results of the penetration test are then compiled into a report detailing:
/5
Question 2
/5
Question 3
/5
Question 4
/5
Question 5
/5
Question 6
/5
Question 7
/5
Question 8
TOTAL /40