+44 7743 307695
Apr 29, 2024


Assessment - Mitigation Plan for Threat Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.
Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Case: ANU data breach: Hackers got inside Australia`s  top university-Initial Case Scenario

Instruction: You need to align threats or vulnerabilities, as much as possible, with controls.
Perform a risk analysis and determine controls to be employed.
Combine the controls into a project of mitigation.
Assign the individuals within the organization who will assume diverse responsibilities in the implementation of cybersecurity controls.
Give advice on the need for ongoing cybersecurity, after your main mitigation steps.

To successfully complete this assessment:
You must use the risk matrix approach covered in classes (Risk = likelihood x consequence)
You should show evidence of gathering data on "likelihood" and "consequence" for each of the threat you have identified. You should briefly explain how this was done.
At least ONE (1) of the risks must be so trivial and/or expensive to control that you decide not to use it (In other words, in this case, you are accepting the risk). At least ONE (1) of the risks, but obviously not all.
Provide cost estimates for the controls including policy or training controls. You can make up these values but try to justify at least ONE (1) of the costs (if possible, use links to justify costs).
You must present a topic assigned to you in class by your learning facilitator as an in-class presentation. The duration of the presentation needs to be between 3 to 5 minutes. Please ensure that you are objective in your presentation.

Report Structure and Format:
The report should have the following heading structure.
Title page
The title page should include subject code and name, assessment number, report title, assessment due date, word count (actual), student name and surname, student ID, Torrens`s email address, learning facilitator name and surname.
Executive Summary
Mainly this section is where you "Summarize" your report. The best time to write the Executive Summary is when you have finished working on your assessment. By then you will be able to "Summarise" your work. It should be written in a simple and easy to read language. IMPORTANT NOTE: Make sure to ONLY provide the summarised version of the report.
In this section introduce your assessment/report to the reader. Think of the purpose and objectives of your assessment and ask this question from yourself that why this assessment is valuable and important? You will need to provide a short description of the case scenario. Overall, the introduction section is about "What the assessment is going to be about?".
Main Discussion
IMPORTANT NOTE: The required discussions for sub-sections 2.1, 2.2, 2.3 and 2.4 are discussed earlier in this assessment brief document (see above).

Threats Analysis (Using Risk Matrix)
Threats and Controls
Mitigation Scheme
In this section, you will wrap up your discussion in a clear and simple way. Overall, the conclusion section reminds the reader what the report/assessment has been about. Indicate and discuss the major findings and/or recommendation of your report.

A minimum of Ten (10) references are required in this assessment. Please be advised that you can use as many references as possible you require in your assessment; however, the minimum number of references is 10 references).

Mitigation Scheme

Provide cost estimations for controls (including policy or training controls), justify at least ONE of the costs.

Recent Post

Order this Assignment now

Total: GBP120

fables template