University | London School of Business and Finance (LSBF) |
Subject | Principles of Cyber security |
Case Study Question 1-6
Using Cisco Umbrella, the industry leader in threat detection, your team captures and analyzed billions of queries to identify the biggest cyber threats to businesses today.
You are required to work on the following questions to train and prepare your team to protect Cyber-attacks as part of Cisco Umbrella’s team.
One of the Cyber-attacks is anonymous logins to systems which are considered as one of the major threats. Explain to the team the importance of login and password policies.
In regards to Cyber-attacked, a major threat, the following facts and explanation were presented to my team in regards to the importance of Login and password policies:
Importance of Login
Password Policies
State a protocol of how-to setup the passwords followings good Password standard.
The team were briefed on the essential factors in regards to the protocol on setting up the password and the good standard of the password.
Identify and explain the two (2) ways password can be hacked?
My team were given a clear explanation and identification in regards to how password can be hacked
Identification of 2 ways password can be hacked
Explanation on the 2 ways password can be hacked
Describe to the team about the possible cyber-attacks in banking services with examples.
The team given a clear description on the possibilities of the cyber-attacked in banking service with relevant examples:
Deletion of critical data
Provide 1 paragraph of description with an example
Manipulation of critical data
Provide 1 paragraph of description with an example
Disruption of industry wide critical services
Provide 1 paragraph of description with an example
Fraudulent transactions leveraging central infrastructure
Provide 1 paragraph of description with an example
Theft of critical non-public information
Provide 1 paragraph of description with an example
Deletion of critical data
Manipulation of critical data
Disruption of industry-wide critical services
Fraudulent transactions leveraging central infrastructure
Theft of critical non-public information
Draw a diagram with appropriate labels to illustrate how to implement a secured system for banking services.
Select an appropriate image from Internet which can explain implement a secured system for banking services
As a cyber-attack incident handling professional, you should advise your “Cisco Umbrella team” on forensic techniques and how to handle the situation when incidents happen. Your answer should provide example for incidents that may happen in real time and how forensic experts can handle the cyber-attack.
I have given all the relevant advice to my Cisco Umbrella team and they are:
6.1 Cisco Umbrella team” on forensic techniques
6.2 How to handle the situation when incidents happen
6.3 Using a real example how forensic experts can handle the cyber-attack
Buy Custom Answer of This Assessment & Raise Your Grades
Are you willing to pay someone to do my assignment on Principles of Cyber security Assignment then don't look further. At Singapore Assignment Help we have experienced and knowledgeable writers to understand your requirement and deliver the top rated cybersecurity and intelligence assignment help at a nominal price.
Looking for Plagiarism free Answers for your college/ university Assignments.
- ECE210 Advocacy and Collaborations with Families Assignment: Supporting Young Children Through Grief and Family-Centered Partnerships
- ACC707 Accounting and Finance Assignment: Evaluating Investment Decisions, Budgeting Strategies, and Financial Performance Analysis
- NCO201 Learn to Learn, Learn for Life TMA-01: Developing Self-Directed Learning Through the Journey of Mastering Public Speaking
- PSS219 Public Safety and Security in Singapore Group-Based Assignment: Strengthening National Resilience Through Policy Responses from the 2025 Committee of Supply Debate
- MTH240 Engineering Mathematics I Assignment: Heat Transfer, Chemical Balancing, Circuit Analysis, Signal Processing, and Matrix Theory
- Engaging Youth with IBM Skills Build Assignment: Designing Innovative Strategies for Skill Development and Career Growth
- BUS368 Innovation Management and Digital Transformation Assignment: Managing Innovation in Foldable, Trifold, and Stretchable Display Technologies
- BUS366 Assignment: Process Improvement and Recruitment Optimization Using Lean Six Sigma Methodology
- HBC203 Statistics and Data Analysis for the Social and Behavioural Sciences TMA-01: A Comparative Analysis of Workplace Wellbeing Interventions and Their Impact on Employee Productivity
- BCAF003 Business Accounting Assignment: A Comprehensive Study on Bank Reconciliation, Cash Controls, Inventory Valuation, and Financial Analysis