Question: Please help me to solve this question. Thank you! (https://learn.cisecurity.org/control-download)- cis control 17 (https://www.mci.gov.sg/-/media/mcicorp/doc/report-of-the-coi-into-the-cyber-attack-on-singhealth-10-jan-2019.ashx) Report on Singapore Health Cyber Attack The Public Report of the
Please help me to solve this question. Thank you!
(https://learn.cisecurity.org/control-download)- cis control 17
(https://www.mci.gov.sg/-/media/mcicorp/doc/report-of-the-coi-into-the-cyber-attack-on-singhealth-10-jan-2019.ashx) Report on Singapore Health Cyber Attack

The Public Report of the Committee of Inquiry into the Cyber Attack on Singapore Health Services Pte Lid's Patient Database in 2018 is a shining example of control failure. Superficially, Singapore Health Services' governance of information security had the appearance of being organised. However, at a granular level, it contained a number of significant flaws which prevented the organisation from achieving its mission, namely to protect the patient database. containing what, in Malaysia, would be regarded as " sensitive personal data ". It is tempting to think of privacy and cyber-security primarily as a technical challenge, but the actions of people also play a critical part in the success or failure of an enterprise. People fulfil important functions at every stage of system design, implementation, operation, use, and oversight. 1. Confining your analysis to CIS Control 17 (https://www.cisecurity.org/controls/) and using that control as your context, identify the deficiencies in Singapore Health Services' security awareness and training, and explain what contribution those deficiencies and the people responsible for them had on the success of the cyber attack. 2. Using CIS Control 17 (and the additional materials referenced in the discussion of that control in the CIS Controls (SANS is particularly useful), draft a security awareness programme targeted at the specific deficiencies you have identified in response to part 1, using annotated cross-references to paragraphs in the report of the Committee of Inquiry, identifying each specific deficiency being targeted
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
