ICTCYS407 Gather, Analyse and Interpret Threat Data Assessment 1.
Topic

ICTCYS407 Gather, Analyse and Interpret Threat Data Assessment 1

Subject

Data Analysis and IT

Date

24th Jun 2025

Pages

2

PHPWord

ICTCYS407 Gather, Analyse and Interpret Threat Data

Assessment 1 Knowledge Questions

Q1) Answer the following questions in the answer box below. Be sure to label your answers with 1.1, 1.2, and 1.3.

1.1. Discuss Threat Intelligence Platforms (TIP) using 40-80 words.

1.2. Explain how Threat Intelligence Platforms (TIP) works using 30-60 words.

1.3. Identify four data recognition software tools such as Threat Intelligence Platforms (TIP).

Q2) Answer the following questions in the answer box below. Be sure to label your answers with 2.1, 2.2, 2.3, 2.4.

2.1. What is a data firewall? Answer using 20-40 words. intrusion detection systems (IDS)

2.2. What are Intrusion Detection Systems? Answer using 20-40 words.

2.3. Discuss access control systems using 20-40 words.

2.4. What are SIEM systems? Answer using 20-40 words.

Q3) Answer the following questions regarding basic troubleshooting processes related to cyber security threats using the answer box below. Be sure to label your answers with 3.1, and 3.2.

3.1. Discuss how would you troubleshoot the following cybersecurity issues and threats using 50-100 words each:

Unknown assets on the network

Abuse of user account privileges

3.2. Identify five (5) basic troubleshooting processes related to the management and administration of cyber security threats. (25-50 words)

Q4) Answer the following questions regarding network and cyber security features and principles in the answer box below. Please be sure to label your answers 4.1, and 4.2.

4.1. Research online and identify cybersecurity govern principles (G1 to G5) according to Australian CyberSecurity Centre. (e.g. www.cyber.gov.au Links to an external site.)

4.2. What are the four (4) main purposes and features of cyber security principles.

Q5) Answer the following questions regarding types of attacks in the answer box below. Please label your answers 5.1, 5.2, 5.3, 5.4, 5.5, 5.6.

5.1. What is a denial of service attack (DoS)? Answer using 20-40 words. SQL injection (SQLi).

5.2. What is SQL Injection? Answer using 20-40 words. Scripted attacks.

5.3. Discuss cross-site scripting (XSS) attacks using 20-40 words. attacks against Wi Fi.

5.4. Explain scripted attacks using 20-40 words.

5.5. Research online and identify four (4) hardware attacks.

5.6. What are four (4) common attacks on wifi?

Q6) Answer the following questions regarding legislative requirements applicable to gathering, analysing and interpreting threat data in the answer box below. Please label your answers with 6.1,6.2.

6.1. Research online and identify two (2) legislative requirements applicable to gathering, analysing and interpreting threat data.

6.2. Discuss how General Data Protection Regulation (GDPR) affects Australian businesses using 20-40 words.

Q7) Answer the following questions regarding common cyber security threats and their impacts on business functions in the answer box below. Please label your answer with 7.1, 7.2.

7.1. What are the three (3) threats to information security?

7.2. Discuss the impacts of cyber security on your business functions using 20-40 words.

Q8) Answer the following questions in the answer box below regarding organisational policies and procedures applicable to gathering, analysing and interpreting threat data, including:

documentation established requirements, findings and recommendations

establishing security equipment and data sources

information collection processes

processes in obtaining and analysing results.

Please label your answers 8.1, 8.2, 8.3, 8.4, 8.5.

8.1. Identify two (2) policies and procedures applicable to gathering, analysing and interpreting threat data.

8.2. Discuss cyber security strategy and how it should address the documentation established requirements, findings and recommendations using 50-100 words.

8.3. Research online and identify five (5) steps to stronger data management for establishing and managing security equipment and data sources. Discuss each step using 40-80 words.

8.4. Discuss information collection processes related to cyber security threats using 50-100 words.

8.5. Explain the purpose of conducting cyber security assessments according to organisational policies and procedures. Answer using 40-80 words.