Category | Assignment | Subject | Computer Science |
---|---|---|---|
University | Cardiff Metropolitan University | Module Title | SEC7000 Information Security |
The student will submit a WRIT1 assignment of 4000 words, which covers three chapters.
Imagine you've been appointed as a security and privacy consultant for a major corporation. This company is on the verge of developing and rolling out surveillance technologies (CCTV, Face Recognition) and contact tracing applications (a centralized system managing all collected data) for the UK government to address the spread of viruses.
Your task is to create a comprehensive report outlining the strategies the company should adopt to integrate Data Protection by Design and Default principles and security standards (ISO, NIST, COBIT, etc.) into the project.
Please consider the following factors as you prepare your recommendations for the project.
By addressing these key aspects, your report will provide a comprehensive guide for the company to implement robust Data Protection by Design and Default in the development and deployment of surveillance and contact tracing applications for the UK government.
Section 1.1.Data Protection by Design and Default (500 words)
Section 1.2. Mapping best practices of (ISO27001, Cyber Essentials, NIST, and COBIT) with GDPR. (1000 words)
Section 1.3. The mechanisms for implementing security and Incident Response and Reporting. (500 words)
Compose a report on a recent information security incident or breach that occurred post-May 2024. The report should encompass a brief overview of the attack, the impact on the organization, specifics regarding the vulnerability exploited in the attack (such as CVE details), the manifestation of the attack (e.g., illustrated scenarios), the tools employed by the attackers, and potential preventive measures that could have mitigated the threat or addressed the vulnerability. Additionally, incorporate considerations for Risk Management/Risk Assessment, referencing the provided template for the attack. Use the sample references as a guide for sourcing relevant information.
Section 2.1.Description of the attack, exposed vulnerability, and loss to the organization. (600 words)
Section 2.2.Critical evaluate the attack, tools used by the attackers and recommended preventive mechanisms. (600 words)
Section 2.3. Implement the Risk Management / Risk Assessment, Evaluate the impact, likelihood, and risk level associated with the incident, and propose risk mitigation strategies using the risk assessment template. (600 words)
Do You Need Assignment of This Question
Order Non Plagiarized AssignmentWrite a reflective report on your practical development of the practical activities via:
Are You Looking for an Answer of This SEC7000 Assignment or Essay
Buy Non Plagiarized AssignmentAre you trying to find someone who can help with my SEC7000 Information Security? Well! You're in the right place. Our podium Workingment provides Assignment Help UK. Our well-researched and talented professors can also provide you with odd assignments. Suppose you're judging whether to Write My Assignment with our professors. No doubt! Our team can help with your assignment. We also provide Free assignment samples for your guidance. Get in touch right now!
Let's Book Your Work with Our Expert and Get High-Quality Content