Uploaded by bryan tan

Week1 tutorial 2022-noans

advertisement
CSIT302 Cybersecurity
Week 1 – Tutorial
School of Computing and Information Technology
This slide is copyrighted. It must not be distributed without
permission from UOW
1
Tutorial Conduct
• Introduction
• Group discussion and presentation (1 hr)
• Presentation (1 hr)
• Consultation
This slide is copyrighted. It must not be distributed without
permission from UOW
2
In your assigned group, prepare answer for the following
questions. You have 1 hour. Once completed, email
zong@uow.edu.au
• Q1. Explain what secrecy, confidentiality and privacy mean as the
cybersecurity goals.
• Q2. Explain what the Multifactor Authentication (MFA) is and provide an
example.
• Q3. Explain what "Shadow IT" means and why it is problematic.
• Q4. Explain the two metrics that evaluate the performance of the Red
Team.
• Q5. What are the four phases of the NIST IR process?
• Q6. Research on WannaCry Campaign in 2017 and prepare an incident
response management presentation covering Summary, Impact
Assessment, Root cause, Indicators of compromise, Containment plan,
Recovery plan, Lessons learnt.
This slide is copyrighted. It must not be distributed without
permission from UOW
3
Download