100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Otro

Unit 11 Cyber Security and Incident Managment Exam Guide

Puntuación
5.0
(1)
Vendido
7
Páginas
46
Subido en
23-04-2024
Escrito en
2023/2024

Prepare for success in Unit 11: Cybersecurity and Incident Management with our comprehensive exam guide. This document is meticulously crafted to equip learners with essential exam tips, detailed example answers, and insightful activity breakdowns, ensuring thorough comprehension and effective exam performance. Key Features: Exam Tips: Unlock insider strategies and techniques to excel in your Unit 11 exam. From time management to question interpretation, discover valuable tips curated to enhance your performance and confidence on exam day. Example Answers: Gain clarity and mastery of Unit 11 concepts through annotated example answers. These exemplars showcase model responses, providing invaluable guidance on structuring your own answers and addressing exam requirements effectively. Activity Breakdowns: Dive deep into Unit 11 topics with comprehensive breakdowns of key activities. From risk assessment methodologies to incident response protocols, each activity is dissected to facilitate understanding and application in exam scenarios.

Mostrar más Leer menos
Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Nivel de Estudio
Editores
Tema
Curso

Información del documento

Subido en
23 de abril de 2024
Número de páginas
46
Escrito en
2023/2024
Tipo
Otro
Personaje
Desconocido

Temas

Vista previa del contenido

UNIT 11 – CYBER SECURITY
AND INCIDENT
MANAGEMNT
Revision Guide


Abstract
Guide which covers the Unit 11: Cyber Security and Incident Management exam. Both part A
and Part B are covered.




Stuart Hazelden
[Email address]

,Contents
Introduction ............................................................................................................................................ 3
Part A ...................................................................................................................................................... 3
An Overview ........................................................................................................................................ 3
Key points ............................................................................................................................................ 3
Extras................................................................................................................................................... 3
Task File Names ............................................................................................................................... 3
The Scenario........................................................................................................................................ 4
Example Scenario ............................................................................................................................ 4
Activity 1 - Risk assessment of the networked system ......................................................................... 7
Key points ............................................................................................................................................ 7
Template Example ............................................................................................................................... 8
Example of using Risk Matrix .......................................................................................................... 8
Risk assessment template explained. ............................................................................................. 9
Example responses.............................................................................................................................. 9
Example 1 – Poor ............................................................................................................................ 9
Example 2 – Okay ............................................................................................................................ 9
Example 3 – Good ......................................................................................................................... 10
Additional notes ................................................................................................................................ 11
Activity 2 - Cyber security plan for the networked system ................................................................. 12
Key points .......................................................................................................................................... 12
Example Template ............................................................................................................................. 13
Template Explained ....................................................................................................................... 14
Example Responses ........................................................................................................................... 15
Band 3 Response ........................................................................................................................... 15
Band 2 (low end of band) .............................................................................................................. 16
Additional notes ................................................................................................................................ 17
Activity 3 – Management report justifying the solution ..................................................................... 18
Key points .......................................................................................................................................... 18
Example Responses ........................................................................................................................... 19
Example 1 – Band 1 to 2 ................................................................................................................ 19
Example 2 – Band 2 to 3 (High 2 / Low 3) ..................................................................................... 20
Example 3 – Band 3 ....................................................................................................................... 21
Additional notes ................................................................................................................................ 21
Task B .................................................................................................................................................... 22
An overview ...................................................................................................................................... 22

1

, Key points .......................................................................................................................................... 22
Extras................................................................................................................................................. 22
Task file names .............................................................................................................................. 22
The Scenario...................................................................................................................................... 23
Example Scenario .......................................................................................................................... 23
Activity 4 - Forensic incident analysis .................................................................................................. 33
Key points .......................................................................................................................................... 33
Template Example ............................................................................................................................. 33
Example Responses ........................................................................................................................... 35
Example 1 – Band 3 ....................................................................................................................... 35
Example 2 – Band 3 ....................................................................................................................... 36
Example 3 – Conclusion ................................................................................................................ 37
Additional notes ................................................................................................................................ 37
Activity 5: Security report .................................................................................................................... 38
Key points .......................................................................................................................................... 38
Layout overview ................................................................................................................................ 38
Example responses............................................................................................................................ 40
Example 1 ...................................................................................................................................... 40
Example 2 - Band 3 (18/20) ........................................................................................................... 41
Example 3 - Band 1/2 .................................................................................................................... 42
Additional notes ................................................................................................................................ 42
Extras..................................................................................................................................................... 43
Mark schemes ................................................................................................................................... 43




2

, Introduction

This booklet is designed to give an overview of the task which you will be expected to complete and
some which you should consider when undertaking on the exam day(s)



Part A
An Overview

Part A consist of 3 activities which will based around the scenario presented in the exam paper. You
will be expected to produce the following within the 5 hours given:

• Risk assessment
• Cyber Security Plan
• Management report



For the Risk assessment and security plan, you will be provided with templates which you will need
to use to complete the tasks. The 5 hours could be spilt over 2 days; however, this is dependent on
the exam arrangements at the time.



Key points

• 5hrs total time for part A (additional time given for those that qualify)
• 43 marks available (includes marks for technical language)
• Tasks must be saved using the name given, these are provided on each task.
• Each task will need to be saved as a PDF, only do this at the end of the 5hrs.
• DO NOT use any auto save functions.



Extras
Task File Names
• Activity 1 - activity1_riskassessment_[Registration number #]_[surname]_[first letter of first
name]
• Activity 2 - activity2_securityplan_[Registration number #]_[surname]_[first letter of first
name]
• Activity 3 - activity3_managementreport_[Registration number #]_[surname]_[first letter of
first name]




3
$13.27
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Reseñas de compradores verificados

Se muestran los comentarios
1 año hace

5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0
Reseñas confiables sobre Stuvia

Todas las reseñas las realizan usuarios reales de Stuvia después de compras verificadas.

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
stuart_hazelden college
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
11
Miembro desde
2 año
Número de seguidores
5
Documentos
2
Última venta
4 meses hace

5.0

2 reseñas

5
2
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes