Assignment title: Management
TASKS IN DETAIL PROVIDE THE FOLLOWING IN YOUR REPORT: 1Provide a detailed analysis of your chosen scenario, looking at these aspects (5 marks): Analytical analysis of the scenario from Boston Dynamics perspective, explain these aspects: What steps would be involved in a hacker conducting an attack such as this? How common is this attack? Research and cite 1 link as well as a summary of a relevant news case from the past? What is the Risk and Impact of this attack scenario occurring? (use a table) Research, cite and list 2 consequences that can occur as a result of this attack? Research and cite 2 suitable countermeasures to stop this scenario occurring (either new or from your previous report which you researched) 2.With regards to staff (corporate, robot and IT department), provide an analysis of Boston Dynamics from a privilege, restriction and workspace perspective (5 marks): Why and what 3 digital privileges should each department place on staff based upon their duties Why and what 3 physical access restrictions should each department place on staff based upon their duties Choose 1 of the alternative workspace facilities for business recovery which we looked at in class, and explain why it would be best appropriate for Boston Dynamics 3You are going to provide a plan to Boston Dynamics on an IT security training program for its staff. As a result identify the following items which should be implemented to Boston Dynamics to avoid your original chosen scenario from occurring (5 marks): What will be the 3 main goals be of your tailored training and awareness program? What will you focus on for Boston Dynamics? List 1 training option staff that should be included as part of the program and why List 1 security education technique that should be included in the program and why List and provide reasons for 2 delivery methods for this security program 4 Information security policy, ethics and legal aspects. You will be providing an Information Security Policy, list (5 marks): What 2 main foundational key policies will you include? Describe them Explain 2 ways you will ensure your policies will be legally applicable and enforceable?