Prepare for success in Unit 11: Cybersecurity and Incident Management with our comprehensive exam guide. This document is meticulously crafted to equip learners with essential exam tips, detailed example answers, and insightful activity breakdowns, ensuring thorough comprehension and effective exam...
UNIT 11 – CYBER SECURITY
AND INCIDENT
MANAGEMNT
Revision Guide
Abstract
Guide which covers the Unit 11: Cyber Security and Incident Management exam. Both part A
and Part B are covered.
Stuart Hazelden
[Email address]
,Contents
Introduction ............................................................................................................................................ 3
Part A ...................................................................................................................................................... 3
An Overview ........................................................................................................................................ 3
Key points ............................................................................................................................................ 3
Extras................................................................................................................................................... 3
Task File Names ............................................................................................................................... 3
The Scenario........................................................................................................................................ 4
Example Scenario ............................................................................................................................ 4
Activity 1 - Risk assessment of the networked system ......................................................................... 7
Key points ............................................................................................................................................ 7
Template Example ............................................................................................................................... 8
Example of using Risk Matrix .......................................................................................................... 8
Risk assessment template explained. ............................................................................................. 9
Example responses.............................................................................................................................. 9
Example 1 – Poor ............................................................................................................................ 9
Example 2 – Okay ............................................................................................................................ 9
Example 3 – Good ......................................................................................................................... 10
Additional notes ................................................................................................................................ 11
Activity 2 - Cyber security plan for the networked system ................................................................. 12
Key points .......................................................................................................................................... 12
Example Template ............................................................................................................................. 13
Template Explained ....................................................................................................................... 14
Example Responses ........................................................................................................................... 15
Band 3 Response ........................................................................................................................... 15
Band 2 (low end of band) .............................................................................................................. 16
Additional notes ................................................................................................................................ 17
Activity 3 – Management report justifying the solution ..................................................................... 18
Key points .......................................................................................................................................... 18
Example Responses ........................................................................................................................... 19
Example 1 – Band 1 to 2 ................................................................................................................ 19
Example 2 – Band 2 to 3 (High 2 / Low 3) ..................................................................................... 20
Example 3 – Band 3 ....................................................................................................................... 21
Additional notes ................................................................................................................................ 21
Task B .................................................................................................................................................... 22
An overview ...................................................................................................................................... 22
1
, Key points .......................................................................................................................................... 22
Extras................................................................................................................................................. 22
Task file names .............................................................................................................................. 22
The Scenario...................................................................................................................................... 23
Example Scenario .......................................................................................................................... 23
Activity 4 - Forensic incident analysis .................................................................................................. 33
Key points .......................................................................................................................................... 33
Template Example ............................................................................................................................. 33
Example Responses ........................................................................................................................... 35
Example 1 – Band 3 ....................................................................................................................... 35
Example 2 – Band 3 ....................................................................................................................... 36
Example 3 – Conclusion ................................................................................................................ 37
Additional notes ................................................................................................................................ 37
Activity 5: Security report .................................................................................................................... 38
Key points .......................................................................................................................................... 38
Layout overview ................................................................................................................................ 38
Example responses............................................................................................................................ 40
Example 1 ...................................................................................................................................... 40
Example 2 - Band 3 (18/20) ........................................................................................................... 41
Example 3 - Band 1/2 .................................................................................................................... 42
Additional notes ................................................................................................................................ 42
Extras..................................................................................................................................................... 43
Mark schemes ................................................................................................................................... 43
2
, Introduction
This booklet is designed to give an overview of the task which you will be expected to complete and
some which you should consider when undertaking on the exam day(s)
Part A
An Overview
Part A consist of 3 activities which will based around the scenario presented in the exam paper. You
will be expected to produce the following within the 5 hours given:
• Risk assessment
• Cyber Security Plan
• Management report
For the Risk assessment and security plan, you will be provided with templates which you will need
to use to complete the tasks. The 5 hours could be spilt over 2 days; however, this is dependent on
the exam arrangements at the time.
Key points
• 5hrs total time for part A (additional time given for those that qualify)
• 43 marks available (includes marks for technical language)
• Tasks must be saved using the name given, these are provided on each task.
• Each task will need to be saved as a PDF, only do this at the end of the 5hrs.
• DO NOT use any auto save functions.
Extras
Task File Names
• Activity 1 - activity1_riskassessment_[Registration number #]_[surname]_[first letter of first
name]
• Activity 2 - activity2_securityplan_[Registration number #]_[surname]_[first letter of first
name]
• Activity 3 - activity3_managementreport_[Registration number #]_[surname]_[first letter of
first name]
3
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller stuart_hazelden. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £9.16. You're not tied to anything after your purchase.