CSE1ACF : Cyber Algorithms That Changed The Future Assignment 1
Designing a cybersecurity infrastructure and algorithm
To demonstrate your knowledge of them requirements for c
5. The Assignment
Choose one of the following two scenarios to discuss:
6. Submission of your assignment
Your report should describe your understanding of the needs and requirements for the specific situation that you have chosen. You need to highlight the possible types of attacks and the kinds of impacts to the organisation and the end users.
You then describe your suggested cybersecurity infrastructure for the organisation and any specific algorithms (which is a set of steps and processes) in addressing the cybersecurity needs of the organisation.
You may also wish to discuss how your infrastructure system could protect against vulnerabilities like spam or forgery.
You may consider using diagrams (such as Flow Chart, Process Flow Diagram, and/or other tools that you have learned in the tutorials of this subject) to illustrate the algorithms that you have recommended.
Lastly, you need to comment on your recommendations, as reflections, to highlight any areas that you think your recommendations have done well, and areas that need further development.
To accomplish this project, we have chosen the scenarios to set up the new branch of UNDOC in Bangladesh. As the CSO of this project we will first understand the cybersecurity and requirements related to the setting up of the new offices and we will convey all these related things to UN Secretary-General.
As we know that cyber security is the practice which ensures the integrity, confidentiality and availability of the information. It has ability to defend against and recover from the different kind of failures like power outages and attacks by the adversaries. We also familiar with this thing that human is always the weak entity in any kind of cyber security program. How human is responsible due to these factors like writing code securely, training operation staff end users to spot phishing emails and social engineering attacks that’s why we said that cyber security begins with awareness.
As a CSO we will take care of these cyber security types. These are as follows: -
Trends and challenges: -
The cybersecurity lifecycle are as follows: -
To protect our new UNODC organization we will need to be aware from these key trends these trends are as follows:
Approach and flow of the UNODC cybersecurity network strategy process:
Steps in UNODC Security: -
Our security model to implement in the UNODC offices will follow the “Defence in Depth” and will follow this rule to while designing and implementing the UNODC security model. We will use the layered model approach to implement the UNODC security model. It will contain the tools which perform the data collection, analysis, reporting and generation of alarms.
The security models contain the four key layers. These are as follows:
Steps to creating a secure UNODC network. These are as follows: -
As we know that machine learning provides the powerful use case for the cybersecurity applications and network applications. While, machine learning algorithms divided into two categories supervised and unsupervised. We know that supervised algorithms require labelled training dataset when we once trained the data set, we can able to correctly classify or predict the data given new input. For our implementation of the project we will use the spin-backup which is robust and we know that now these organizations have lot of data inside the cloud environments. So, spin backup will help us to identify the following problems and it will protect the valuable business-critical data. So, Spin-backup uses machine learning for detecting the cybersecurity events in UNODC as follows:
These will be the approach and algorithm implementation of the UNODC office in the Bangla- desh.