Search Header Logo

Cybersecurity Case Study 9

Authored by Munhua Ng

Architecture, Other

University

Used 1+ times

Cybersecurity Case Study 9
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

OPEN ENDED QUESTION

15 mins • Ungraded

Avery is working as a cybersecurity manager in Cove IT Pte Ltd. She. is responsible for ensuring that both security and integrity of her company's information and data is maintained and protected from hackers and intruders at all times.


Avery's department is responsible for educating users on the best practices in cybersecurity to minimise such incidents. As the company is rapidly expanding, Avery has hired an assistant,

· Jimmy, a recent graduate in computer science, to help her in sharing the importance of cybersecurity to new and existing users in the company.


At an onboarding session for new recruits of the company, Avery is required to explain the importance of cybersecurity and its impact to the organisation. Jimmy was introduced to Mary and Jerry at the onboarding session. Mary is hired as a financial manager while Jerry is hired as a logistics manager. Jimmy was tasked to set up the laptops for both Mary and Jerry.


Mary was asked to choose a password for the Windows login of her new laptop and she typed in 'password' as her Windows login password. After this, Jimmy went on to install and set up the financial system for Mary and she was required to choose a password for her login. Mary typed in 'password' as her financial system login password as she finds it a hassle to remember different passwords. Mary wrote her password on a piece of paper and pasted it on the wall of her desk so that she can refer to it if she forgets her password.


Jerry called Jimmy two weeks after the onboarding session for urgent assistance. Jerry explained to Jimmy that his screen is locked and not responsive to any keyboard or mouse entries. Further, there was a message that popped up onscreen requesting a huge sum of

money to be paid in digital currency in order to unlock his computer.


1) Define cybersecurity. (3 marks)

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

15 mins • Ungraded

Avery is working as a cybersecurity manager in Cove IT Pte Ltd. She. is responsible for ensuring that both security and integrity of her company's information and data is maintained and protected from hackers and intruders at all times.

Avery's department is responsible for educating users on the best practices in cybersecurity to minimise such incidents. As the company is rapidly expanding, Avery has hired an assistant,

· Jimmy, a recent graduate in computer science, to help her in sharing the importance of cybersecurity to new and existing users in the company.

At an onboarding session for new recruits of the company, Avery is required to explain the importance of cybersecurity and its impact to the organisation. Jimmy was introduced to Mary and Jerry at the onboarding session. Mary is hired as a financial manager while Jerry is hired as a logistics manager. Jimmy was tasked to set up the laptops for both Mary and Jerry.

Mary was asked to choose a password for the Windows login of her new laptop and she typed in 'password' as her Windows login password. After this, Jimmy went on to install and set up the financial system for Mary and she was required to choose a password for her login. Mary typed in 'password' as her financial system login password as she finds it a hassle to remember different passwords. Mary wrote her password on a piece of paper and pasted it on the wall of her desk so that she can refer to it if she forgets her password.

Jerry called Jimmy two weeks after the onboarding session for urgent assistance. Jerry explained to Jimmy that his screen is locked and not responsive to any keyboard or mouse entries. Further, there was a message that popped up onscreen requesting a huge sum of

money to be paid in digital currency in order to unlock his computer.


2) List THREE ways data can be breached. (3 marks)

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

15 mins • Ungraded

Avery is working as a cybersecurity manager in Cove IT Pte Ltd. She. is responsible for ensuring that both security and integrity of her company's information and data is maintained and protected from hackers and intruders at all times.

Avery's department is responsible for educating users on the best practices in cybersecurity to minimise such incidents. As the company is rapidly expanding, Avery has hired an assistant,

· Jimmy, a recent graduate in computer science, to help her in sharing the importance of cybersecurity to new and existing users in the company.

At an onboarding session for new recruits of the company, Avery is required to explain the importance of cybersecurity and its impact to the organisation. Jimmy was introduced to Mary and Jerry at the onboarding session. Mary is hired as a financial manager while Jerry is hired as a logistics manager. Jimmy was tasked to set up the laptops for both Mary and Jerry.

Mary was asked to choose a password for the Windows login of her new laptop and she typed in 'password' as her Windows login password. After this, Jimmy went on to install and set up the financial system for Mary and she was required to choose a password for her login. Mary typed in 'password' as her financial system login password as she finds it a hassle to remember different passwords. Mary wrote her password on a piece of paper and pasted it on the wall of her desk so that she can refer to it if she forgets her password.

Jerry called Jimmy two weeks after the onboarding session for urgent assistance. Jerry explained to Jimmy that his screen is locked and not responsive to any keyboard or mouse entries. Further, there was a message that popped up onscreen requesting a huge sum of

money to be paid in digital currency in order to unlock his computer.


3) List TWO impacts that cyber threats may have on organisations. (4 marks)

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

15 mins • Ungraded

Avery is working as a cybersecurity manager in Cove IT Pte Ltd. She. is responsible for ensuring that both security and integrity of her company's information and data is maintained and protected from hackers and intruders at all times.

Avery's department is responsible for educating users on the best practices in cybersecurity to minimise such incidents. As the company is rapidly expanding, Avery has hired an assistant,

· Jimmy, a recent graduate in computer science, to help her in sharing the importance of cybersecurity to new and existing users in the company.

At an onboarding session for new recruits of the company, Avery is required to explain the importance of cybersecurity and its impact to the organisation. Jimmy was introduced to Mary and Jerry at the onboarding session. Mary is hired as a financial manager while Jerry is hired as a logistics manager. Jimmy was tasked to set up the laptops for both Mary and Jerry.

Mary was asked to choose a password for the Windows login of her new laptop and she typed in 'password' as her Windows login password. After this, Jimmy went on to install and set up the financial system for Mary and she was required to choose a password for her login. Mary typed in 'password' as her financial system login password as she finds it a hassle to remember different passwords. Mary wrote her password on a piece of paper and pasted it on the wall of her desk so that she can refer to it if she forgets her password.

Jerry called Jimmy two weeks after the onboarding session for urgent assistance. Jerry explained to Jimmy that his screen is locked and not responsive to any keyboard or mouse entries. Further, there was a message that popped up onscreen requesting a huge sum of

money to be paid in digital currency in order to unlock his computer.


4) Suggest THREE guidelines Mary should follow to improve her password security. (6 marks)

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

15 mins • Ungraded

Avery is working as a cybersecurity manager in Cove IT Pte Ltd. She. is responsible for ensuring that both security and integrity of her company's information and data is maintained and protected from hackers and intruders at all times.

Avery's department is responsible for educating users on the best practices in cybersecurity to minimise such incidents. As the company is rapidly expanding, Avery has hired an assistant,

· Jimmy, a recent graduate in computer science, to help her in sharing the importance of cybersecurity to new and existing users in the company.

At an onboarding session for new recruits of the company, Avery is required to explain the importance of cybersecurity and its impact to the organisation. Jimmy was introduced to Mary and Jerry at the onboarding session. Mary is hired as a financial manager while Jerry is hired as a logistics manager. Jimmy was tasked to set up the laptops for both Mary and Jerry.

Mary was asked to choose a password for the Windows login of her new laptop and she typed in 'password' as her Windows login password. After this, Jimmy went on to install and set up the financial system for Mary and she was required to choose a password for her login. Mary typed in 'password' as her financial system login password as she finds it a hassle to remember different passwords. Mary wrote her password on a piece of paper and pasted it on the wall of her desk so that she can refer to it if she forgets her password.

Jerry called Jimmy two weeks after the onboarding session for urgent assistance. Jerry explained to Jimmy that his screen is locked and not responsive to any keyboard or mouse entries. Further, there was a message that popped up onscreen requesting a huge sum of

money to be paid in digital currency in order to unlock his computer.


5) Name the type of malware that Jerry had encountered. (2 marks)

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

15 mins • Ungraded

Avery is working as a cybersecurity manager in Cove IT Pte Ltd. She. is responsible for ensuring that both security and integrity of her company's information and data is maintained and protected from hackers and intruders at all times.

Avery's department is responsible for educating users on the best practices in cybersecurity to minimise such incidents. As the company is rapidly expanding, Avery has hired an assistant,

· Jimmy, a recent graduate in computer science, to help her in sharing the importance of cybersecurity to new and existing users in the company.

At an onboarding session for new recruits of the company, Avery is required to explain the importance of cybersecurity and its impact to the organisation. Jimmy was introduced to Mary and Jerry at the onboarding session. Mary is hired as a financial manager while Jerry is hired as a logistics manager. Jimmy was tasked to set up the laptops for both Mary and Jerry.

Mary was asked to choose a password for the Windows login of her new laptop and she typed in 'password' as her Windows login password. After this, Jimmy went on to install and set up the financial system for Mary and she was required to choose a password for her login. Mary typed in 'password' as her financial system login password as she finds it a hassle to remember different passwords. Mary wrote her password on a piece of paper and pasted it on the wall of her desk so that she can refer to it if she forgets her password.

Jerry called Jimmy two weeks after the onboarding session for urgent assistance. Jerry explained to Jimmy that his screen is locked and not responsive to any keyboard or mouse entries. Further, there was a message that popped up onscreen requesting a huge sum of

money to be paid in digital currency in order to unlock his computer.


6) Name the type of software that should be installed to reduce the risk of malware as faced by Jerry. (2 marks)

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?