IT Security and Risk Management December 2023


General: Editable Content, 70 % unique ( Relevant): The above solutions are General sample. Use it as a reference. You have to change it except Headings or Subheadings  before Uploading. The above solution is fully Solved. word Limit around 900/answer. Kindly call for More Information at 8448433923.

Direct Upload : Order Via WhatsApp Only at 8448433923.

Those students who do not want to change anything then go for Unique Assignment. It is Also Called Guaranteed Assignment.

Note : Buy Unique Content Via WhatsApp/Call only at 8448433923.

200 % Unique Assignment : It Can be Uploaded Directly

Prices : 900 to 1000

Important: After payment if you get any issue in downloading the content then kindly contact at 848433923 with order Number and Payment details. Trust Once and get the service till completion of your course.


Assignment Sample Solution: IT Security and Risk Management December 2023

NMIM$ Global Access

School for Continuing Education (NGA-SCE)

Course: IT Security and Risk Management December 2023

Internal Assignment Applicable for December2023 Examination

1. As a term, people, process, and technology (PPT) refers to the methodology in which the balance of people, process, and technology drives action: People perform a specific type of work for an organization using processes (and often, technology) to streamline and improve these processes. What do you mean by security awareness for people, process, and technology? (10 Marks)

2. Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. Companies often grant access to information and assets to staff even if it is not relevant to that member of staff’s role.

Describe access control methodologies and implementation for purpose of security? Give detailed justifications for your recommendations. (10 Marks)

Unique Assignment: Call/WhatsApp at 8448433923 to book the order.

3. Bangladesh Bank is the central bank of Bangladesh, responsible for managing the country’s monetary and financial stability. In February 2016, cybercriminals launched a sophisticated attack on the bank’s foreign exchange reserves, attempting to steal hundreds of millions of dollars.

Incident Details:
SWIFT Transactions: The attackers used the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network to initiate fraudulent fund transfers. They sent multiple payment requests to the Federal Reserve Bank of New York, requesting the transfer of approximately $951 million from Bangladesh Bank’s account to various accounts in the Philippines and Sri Lanka.

Authentication Bypass: The cybercriminals managed to compromise the bank’s SWIFT terminal and gain access to the SWIFT system using stolen credentials. They were able to manipulate SWIFT messages to make the transactions appear legitimate.

Errors Detected: A few of the fraudulent transfer requests contained spelling errors that raised suspicions at the Federal Reserve Bank. This prompted further scrutiny.

Prevented Losses: While the attackers successfully transferred $81 million to the Philippines, an alert official at the Federal Reserve Bank noticed the spelling errors in subsequent transfer requests. This raised suspicions and led to the cancellation of several transactions, preventing further losses.

Investigation: After the attack was discovered, Bangladesh Bank launched an investigation and sought assistance from law enforcement agencies and cybersecurity experts.
Bangladesh Bank lost approximately $81 million in the successful transactions. The incident raised concerns about the security of the global financial system and the vulnerabilities in SWIFT’s infrastructure. It also highlighted the importance of cybersecurity for financial institutions worldwide.

Attribution: While the cybercriminals responsible for the Bangladesh Bank heist were never conclusively identified, there have been suspicions that North Korean hackers, specifically the Lazarus Group, were involved due to similarities with other attacks attributed to them.

a. In the Bangladesh Bank Cyber Heist case, what were the key vulnerabilities and security lapses that allowed the cybercriminals to compromise the bank’s systems and attempt a fraudulent transfer of funds? Provide specific examples from the case to support your answer. (5 Marks)

b. Discuss the role of international cooperation and information sharing in responding to cyber attacks on financial institutions, as illustrated by the Bangladesh Bank Cyber Heist. What lessons can be drawn from this case regarding the importance of cross-border cooperation in cybersecurity? (5 Marks)


Rules and Regulation

General or Editable Assignment: Needs to be change it in your own Wording. After Modification, check plagiarism via some tools on google. After Checking, upload your assignment. Kindly call or WhatsApp to know how and where can you change it. We don’t take guarantee if you don’t change your Content before uploading.

Note: Changes are Mandatory in General Assignment as it is general sample. Use it as a reference.

Unique Assignment: Assignment will be Uploaded directly; more than 80% marks are guaranteed. Plagiarism free. No Copy case. 100 % Guaranteed Assignment.

Buying Process:

General Assignment : Buy Online

Unique Assignment: Call/WhatsApp at 8448433923 to book the order.


There are no reviews yet.

Be the first to review “IT Security and Risk Management December 2023”
%d bloggers like this: