CSIT302 Cybersecurity Week 1 – Tutorial School of Computing and Information Technology This slide is copyrighted. It must not be distributed without permission from UOW 1 Tutorial Conduct • Introduction • Group discussion and presentation (1 hr) • Presentation (1 hr) • Consultation This slide is copyrighted. It must not be distributed without permission from UOW 2 In your assigned group, prepare answer for the following questions. You have 1 hour. Once completed, email zong@uow.edu.au • Q1. Explain what secrecy, confidentiality and privacy mean as the cybersecurity goals. • Q2. Explain what the Multifactor Authentication (MFA) is and provide an example. • Q3. Explain what "Shadow IT" means and why it is problematic. • Q4. Explain the two metrics that evaluate the performance of the Red Team. • Q5. What are the four phases of the NIST IR process? • Q6. Research on WannaCry Campaign in 2017 and prepare an incident response management presentation covering Summary, Impact Assessment, Root cause, Indicators of compromise, Containment plan, Recovery plan, Lessons learnt. This slide is copyrighted. It must not be distributed without permission from UOW 3