Task A - Activity 2 Template: Cyber security plan for the networked system
Activity 1: 69 mins
Activity 2: 172 mins
Activity 3: 54 mins
Proofread: 4 mins
Total: 299 mins
Use the section headings below for each protection measure.
1) Threat(s) addressed by the protection measure
1, Weak password on troubleshooters account, Moderate.
2) Details of action(s) to be taken
Ensure the people that have been trusted with the extra privileges have strong
passwords on their accounts.
3) Reasons for the actions
This will protect the troubleshooter’s accounts from malicious people.
4) Overview of constraints – technical and financial
Technical: The user that gains access to the privileged account can make
changes to the map, causing disruption or giving certain players an unfair
advantage.
Financial: The organisation may be fined because of the lack of cyber security
training for the staff.
5) Overview of legal responsibilities
If the news of an unauthorised user accessing a privileged account becomes
well know, this could have legal consequences for the organisation. They may
be fined due to no teaching the trusted person to make the password for their
account strong.
6) Overview of usability of the system
The staff should be reminded of the password policy to ensure no accounts get
breached.
7) Outline cost-benefit
As long as the accounts are kept secure and the staff are aware of the
cybersecurity rules, it will reduce the possibility for people to steal personal
data off of the users.
8) Test plan
Test plan
Test Test description Expected outcome Possible further
No action following
test
1 Create criteria for what a Won’t allow passwords that are Tell the user what
strong password is, short qualifies as a strong
forcing users to create a password, so they
secure password know what to add to
their password