Vulnerability Analysis and Execution Plan

FIND A SOLUTION AT Academic Writers Bay

In this assignment, you will be provided with three context briefs, from which you will be required to select any one business or organisation for your analysis and complete the tasks below (A and B). As much as possible, focus on the details provided in the brief. Where information is not provided but integral to your analysis, make reasonable assumptions (which should be clearly stated and explained). At the end of this assignment, you will be required to submit:
Vulnerability Analysis and Execution Plan (75%) (Total 2000 Words)
Video  message (Two-minute) (25%)
1. Vulnerability Analysis and Execution Plan
This assignment will involve a detailed analysis of your chosen organisation’s security vulnerabilities and the development of a possible hacking execution plan. The suggested research and content division for the two components is as follows:
Vulnerability Analysis (50%)
Execution Plan (25%)
Vulnerability Analysis (50%)
Identify three possible ways to breach the security of the organisation, and for each identified breach method, please:
Identify the type of data you will attempt to obtain
Discuss the potential target with respect to approach points
Elaborate on your motivation behind the hack (i.e. from a hacker’s perspective)
List the impacts of your chosen security breach on the organisation (i.e. financial costs, brand distortion, impact on employees)
Identify a hacker or hacking group that could possibly be associated with this form of attack
Describe an example of where a similar approach has been used in a similar context 
Execution Plan (25%)
Select one of the possible options from the Vulnerability Analysis (above) and develop an execution plan. Your implementation plan should detail:
The resources required for this attack and how you will obtain them (e.g. tools, money, time, people)
Methodology for the attack, both technical and non-technical
The timeline for the planned attack and a step-by-step approach
Discuss the impacts of your hacking attack on the organisation
Video (or audio) message (25%)
2. Video / Voice message (25%)
Record a two-minute video / voice  message to your target organisation. This message will be intended to let the organisation know about your hack. Include the following topics of discussion in your message:
Why you have hacked the organisation
What information you have obtained about the organisation
How you will be utilising or exploiting this information to create the maximum level of impact
Context 1: School
Location and environment
Inner suburb school
On the outskirts of the city, with both residential and commercial buildings
Mid to high-density area
Technology
Password-protected Wi-Fi for students and staff
3 computer labs with 10 computers and network-connected printers
Use of personal iPads and laptop computers is allowed for students
Use of externally hosted learning management system, which also manages grades and enrolment
Externally hosted email for students (Gmail)
Externally hosted file sharing (Google Drive)
Staff files are secured within the school firewall and cloud-synchronised on a nightly basis
All files are backed up on the school server every night
Staff HR system runs on the school server (located on the premises)
People
1000 student, from grade 10 to 12
48 teachers, 9 maintenance staff, 12 casual staff
All permanent staff require police checks
Students have given email address with their student ID and the school domain
Other people engaged with the school include parents, community organisations, government staff and vendors 
Context 2: Cafe
Location and environment
Inner suburb cafe
On the outskirts of the city, with both residential and commercial buildings
Mid to high-density area
Technology
Password-protected Wi-Fi for staff and patrons
iPads used for taking orders, sending orders wirelessly to the kitchen, and transmitting to cashier counters
Externally hosted file sharing for staff (Google Drive)
Staff HR and POS systems run on the cafe server (located on the premises)
POS (Point of Sales) system with integrated:
Payment technologies
Staff rosters
Operating hours
Hourly sales reports

READ ALSO...   Competitive equilibrium

All files are backed up on the cafe server every night
POS system and staff files secured within the café firewall and cloud-synchronised on a nightly basis
People
Permanent full-time staff: 3 baristas, 5 waiters, 1 manager
2 maintenance staff who come in every evening after closing (8 pm)
All permanent staff require police checks
Maintenance staff require reference checks with their previous employer(s)
Context 3: Hospital
Location and environment
Inner suburb hospital
On the outskirts of the city, with both residential and commercial buildings
Mid to high-density area
Technology
Password-protected Wi-Fi for visitors/patients
Visitors and patients can request for a password from any receptionist

READ ALSO...   Global economies Governmental entity New patrol officer Business organization Business Review Quantitative vs Qualitative Method...

Hospital staff use a different network, also password-protected
Internally hosted email for staff
Nurses and doctors are given a hospital iPad, receptionists use desktops
Externally hosted software system to manage electronic medical and health records (EMR, EHR)
Billing system
Prescriptions
Scanned documents
Medication tracking

Staff HR system runs on the hospital server (located on the premises)
Staff files are secured within the hospital firewall and cloud-synchronised on a nightly basis
All files are backed up on the hospital server every night
Cloud files include those from 3 other hospitals in the chain, in surrounding suburbs
People
Permanent full-time staff: 200 doctors, 500 nurses, 20 receptionists
Casual: 35 maintenance staff
Operate on the roster, 5 each day

READ ALSO...   Radio and Optical Communication Systemsconsist of industry standard policiesconsist of industry standard policies

Permanent staff have thorough police and background checks with references
Staff have given email address with their staff ID and the hospital domain
Other people engaged with the hospital include community organisations, government staff and student volunteers

Order from Academic Writers Bay
Best Custom Essay Writing Services

QUALITY: 100% ORIGINAL PAPERNO PLAGIARISM – CUSTOM PAPER