?N?LYTI??L R???RT
November 18, 2018
??S? STUDI?S IN FIN?N??:V?LU? LIN? ?UBLISHING
November 18, 2018

??S? STUDY

The purpose of this assignment is to support the following unit Learning Outcomes (LO) for this unit.

LO 1: Identify the importance of information to organisations and society in general;
LO 2: Describe and apply concepts, principles and techniques relating to
the security of information; and
LO 5: Demonstrate an understanding of the advantages, disadvantages, threats, and
vulnerabilities associated with various IT environments.
Background:
Jonah is the Director of lnno Sensors based in Perth,Western Australia. lnno Sensors
IS an inventive company developing and selling home health monitoring devices forthe elderly.
All supplies are through medical services and not direct to the public. lnnoSensors currently has 70% of the market in WA, with the remaining 25% from another new company, and from those developing mobile apps for smartphones. Jonah spends half of his day on the road in the Perth metro area visiting medical specialists, hospitals, and allied health providers who may wish to purchase and integrate these devices with clinical care they provide to their patients. Consequently, Jonah carries a laptop, smart phone and iPad with him everywhere he goes. The laptop encompasses an Intel i5 CPU,4GB RAM, and is runnin Windows8
Professional with the last Windows update applied towardsthe end of October, 2014. When in the office Jonah connects his laptop to the company network.
Jonah predominantly uses Microsoft Office Professional 2013 for all his business
needs.
Microsoft Access and Microsoft Excel contain the information for all clients within Western Australia, as well as client confidential business and financial information. Jonah is not well informed about information security although he uses computing technology to support his job. As a result Jonah does not use third party firewalls, anti-virus software, encryption, or authentication mechanisms.
While on the road, Jonah occasionally leaves his laptop in the car. He also frequently visits Internet cafes for lunch where he utilises the Internet for up to an hour each day. The confidentiality of information is important as any disclosure could cause significant embarrassment to him and the company, as well as impact client privacy and confidence.
Also, Jonah must provide correct,factual information to all clients hence ensuring the integrity of information is vital. Lastly, should any information not be available when needed, this may result in client staking their businessto the new to market competitor.as Utilising the background
information, draw a concept map or annotated attack tree which
represents the context of Jonah’s work environment and also
demonstrates:
the links between the aims of security (CIA) and the data used by Jonah;
the associated attacks which could breach
each of these aims;
the likelihood (risk) that the attack poses;
the impact each attack may have;
the resultant counter measures which could be applied;
the relative cost of each counte rmeasure; and
the mitigation effect of the countermeasure.
All of the attacks that you(present must be feasible, capable of being undertaken by one person, and require limited financial support. An in-text reference supporting the attack and countermeasure should be included within each of the concepts.
NOTE: You are not writing an essay on each attack and countermeasure, only a brief
(referenced) description. You rwork should be focussed on a diagrammatic representation, and be creative .

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A GOOD DISCOUNT 🙂

Leave a Reply

Your email address will not be published. Required fields are marked *

Manage Orders