SBM4304 IS Security and Risk Management
Today's Internet has its roots all the way back in the late 1960s, but it was only used by researchers and the military for almost a quarter of a century. The Internet has opened the door for threat actors to reach around the world Invisibly and Instantaneously to launch attacks on any device connected to it.
Read the case study titled: COVID-19 themed malicious cyber activity that available at
Finns-Unit instructure com/files/102033/downioad?downioad frdz1
Answer the following questions related to the case study:
1. Identify and examine all types of the malicious cyber activities identified by ACSC and summarize them in a table.
2. Identification and categories assets, Including all elements of an organization's system (people, procedures, data and information, software, hardware, and networking)
3. Create a table to identifying and prioritizing threats against each type of asset identified in item (2). You have to demonstrate the way your follow to prioritizing threats with justification.
4. In general, the security defences should be based on five fundamental security principles: layering, limiting, diversity, obscurity, and simplicity. Analyse these principles with the mitigation strategies proposed by the ACSC. In your analysis, you have to clearly demonstrate how each recommended mitigation Is related to fundamental security principle with justification.