Unit 11 Cyber Security and Incident Managment Exam Guide
99 keer bekeken 3 keer verkocht
Vak
Unit 11 - Cyber Security and Incident Management
Instelling
PEARSON (PEARSON)
Prepare for success in Unit 11: Cybersecurity and Incident Management with our comprehensive exam guide. This document is meticulously crafted to equip learners with essential exam tips, detailed example answers, and insightful activity breakdowns, ensuring thorough comprehension and effective exam...
UNIT 11 – CYBER SECURITY
AND INCIDENT
MANAGEMNT
Revision Guide
Abstract
Guide which covers the Unit 11: Cyber Security and Incident Management exam. Both part A
and Part B are covered.
Stuart Hazelden
[Email address]
,Contents
Introduction ............................................................................................................................................ 3
Part A ...................................................................................................................................................... 3
An Overview ........................................................................................................................................ 3
Key points ............................................................................................................................................ 3
Extras................................................................................................................................................... 3
Task File Names ............................................................................................................................... 3
The Scenario........................................................................................................................................ 4
Example Scenario ............................................................................................................................ 4
Activity 1 - Risk assessment of the networked system ......................................................................... 7
Key points ............................................................................................................................................ 7
Template Example ............................................................................................................................... 8
Example of using Risk Matrix .......................................................................................................... 8
Risk assessment template explained. ............................................................................................. 9
Example responses.............................................................................................................................. 9
Example 1 – Poor ............................................................................................................................ 9
Example 2 – Okay ............................................................................................................................ 9
Example 3 – Good ......................................................................................................................... 10
Additional notes ................................................................................................................................ 11
Activity 2 - Cyber security plan for the networked system ................................................................. 12
Key points .......................................................................................................................................... 12
Example Template ............................................................................................................................. 13
Template Explained ....................................................................................................................... 14
Example Responses ........................................................................................................................... 15
Band 3 Response ........................................................................................................................... 15
Band 2 (low end of band) .............................................................................................................. 16
Additional notes ................................................................................................................................ 17
Activity 3 – Management report justifying the solution ..................................................................... 18
Key points .......................................................................................................................................... 18
Example Responses ........................................................................................................................... 19
Example 1 – Band 1 to 2 ................................................................................................................ 19
Example 2 – Band 2 to 3 (High 2 / Low 3) ..................................................................................... 20
Example 3 – Band 3 ....................................................................................................................... 21
Additional notes ................................................................................................................................ 21
Task B .................................................................................................................................................... 22
An overview ...................................................................................................................................... 22
1
, Key points .......................................................................................................................................... 22
Extras................................................................................................................................................. 22
Task file names .............................................................................................................................. 22
The Scenario...................................................................................................................................... 23
Example Scenario .......................................................................................................................... 23
Activity 4 - Forensic incident analysis .................................................................................................. 33
Key points .......................................................................................................................................... 33
Template Example ............................................................................................................................. 33
Example Responses ........................................................................................................................... 35
Example 1 – Band 3 ....................................................................................................................... 35
Example 2 – Band 3 ....................................................................................................................... 36
Example 3 – Conclusion ................................................................................................................ 37
Additional notes ................................................................................................................................ 37
Activity 5: Security report .................................................................................................................... 38
Key points .......................................................................................................................................... 38
Layout overview ................................................................................................................................ 38
Example responses............................................................................................................................ 40
Example 1 ...................................................................................................................................... 40
Example 2 - Band 3 (18/20) ........................................................................................................... 41
Example 3 - Band 1/2 .................................................................................................................... 42
Additional notes ................................................................................................................................ 42
Extras..................................................................................................................................................... 43
Mark schemes ................................................................................................................................... 43
2
, Introduction
This booklet is designed to give an overview of the task which you will be expected to complete and
some which you should consider when undertaking on the exam day(s)
Part A
An Overview
Part A consist of 3 activities which will based around the scenario presented in the exam paper. You
will be expected to produce the following within the 5 hours given:
• Risk assessment
• Cyber Security Plan
• Management report
For the Risk assessment and security plan, you will be provided with templates which you will need
to use to complete the tasks. The 5 hours could be spilt over 2 days; however, this is dependent on
the exam arrangements at the time.
Key points
• 5hrs total time for part A (additional time given for those that qualify)
• 43 marks available (includes marks for technical language)
• Tasks must be saved using the name given, these are provided on each task.
• Each task will need to be saved as a PDF, only do this at the end of the 5hrs.
• DO NOT use any auto save functions.
Extras
Task File Names
• Activity 1 - activity1_riskassessment_[Registration number #]_[surname]_[first letter of first
name]
• Activity 2 - activity2_securityplan_[Registration number #]_[surname]_[first letter of first
name]
• Activity 3 - activity3_managementreport_[Registration number #]_[surname]_[first letter of
first name]
3
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
√ Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper stuart_hazelden. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €11,31. Je zit daarna nergens aan vast.