Question: Please help me to solve this question. Thank you! (https://learn.cisecurity.org/control-download)- cis control 17 (https://www.mci.gov.sg/-/media/mcicorp/doc/report-of-the-coi-into-the-cyber-attack-on-singhealth-10-jan-2019.ashx) Report on Singapore Health Cyber Attack The Public Report of the

Please help me to solve this question. Thank you!

(https://learn.cisecurity.org/control-download)- cis control 17

(https://www.mci.gov.sg/-/media/mcicorp/doc/report-of-the-coi-into-the-cyber-attack-on-singhealth-10-jan-2019.ashx) Report on Singapore Health Cyber Attack

Please help me to solve this question. Thank you!(https://learn.cisecurity.org/control-download)- cis control 17

The Public Report of the Committee of Inquiry into the Cyber Attack on Singapore Health Services Pte Lid's Patient Database in 2018 is a shining example of control failure. Superficially, Singapore Health Services' governance of information security had the appearance of being organised. However, at a granular level, it contained a number of significant flaws which prevented the organisation from achieving its mission, namely to protect the patient database. containing what, in Malaysia, would be regarded as " sensitive personal data ". It is tempting to think of privacy and cyber-security primarily as a technical challenge, but the actions of people also play a critical part in the success or failure of an enterprise. People fulfil important functions at every stage of system design, implementation, operation, use, and oversight. 1. Confining your analysis to CIS Control 17 (https://www.cisecurity.org/controls/) and using that control as your context, identify the deficiencies in Singapore Health Services' security awareness and training, and explain what contribution those deficiencies and the people responsible for them had on the success of the cyber attack. 2. Using CIS Control 17 (and the additional materials referenced in the discussion of that control in the CIS Controls (SANS is particularly useful), draft a security awareness programme targeted at the specific deficiencies you have identified in response to part 1, using annotated cross-references to paragraphs in the report of the Committee of Inquiry, identifying each specific deficiency being targeted

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!