50% Off

IT Security and Risk Management NMIMS Solution June 2024


IT Security and Risk Management NMIMS Solution June 2024



NMIMS Global Access
School for Continuing Education (NGA-SCE)
Course: IT Security and Risk Management
Internal Assignment Applicable for June 2024 Examination
Assignment Marks: 30
 All Questions carry equal marks.
 All Questions are compulsory
 All answers to be explained in not more than 1000 words for question 1 and 2 and for question 3 in not more than 500 words for each subsection. Use relevant examples, illustrations as far as possible.
 All answers to be written individually. Discussion and group work is not advisable.
 Students are free to refer to any books/reference material/website/internet for attempting their assignments, but are not allowed to copy the matter as it is from the source of reference.
 Students should write the assignment in their own words. Copying of assignments from other students is not allowed
 Students should follow the following parameter for answering the assignment questions
1. As a term, people, process, and technology (PPT) refers to the methodology in which the balance of people, process, and technology drives action: People perform a specific type of work for an organization using processes (and often, technology) to streamline and

improve these processes. What do you mean by security awareness for people, process, and technology? (10 Marks)
2. Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. Companies often grant access to information and assets to staff even if it is not relevant to that member of staff’s role. Describe access control methodologies and implementation for purpose of security? Give detailed justifications for your recommendations. (10 Marks).

3. Bangladesh Bank is the central bank of Bangladesh, responsible for managing the country’s monetary and financial stability. In February 2016, cybercriminals launched a sophisticated attack on the bank’s foreign exchange reserves, attempting to steal hundreds of millions of dollars. Incident Details: SWIFT Transactions: The attackers used the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network to initiate fraudulent fund transfers. They sent multiple payment requests to the Federal Reserve Bank of New York, requesting the transfer of approximately $951 million from Bangladesh Bank’s account to various accounts in the Philippines and Sri Lanka. Authentication Bypass: The cybercriminals managed to compromise the bank’s SWIFT terminal and gain access to the SWIFT system using stolen credentials. They were able to manipulate SWIFT messages to make the transactions appear legitimate. Errors Detected: A few of the fraudulent transfer requests contained spelling errors that raised suspicions at the Federal Reserve Bank. This prompted further scrutiny. Prevented Losses: While the attackers successfully transferred $81 million to the Philippines, an alert official at the Federal Reserve Bank noticed the spelling errors in subsequent transfer requests. This raised suspicions and led to the cancellation of several transactions, preventing further losses. Investigation: After the attack was discovered, Bangladesh Bank launched an investigation and sought assistance from law enforcement agencies and cybersecurity experts. Consequences: Bangladesh Bank lost approximately $81 million in the successful transactions. The incident raised concerns about the security of the global financial system and the vulnerabilities in SWIFT’s infrastructure. It also highlighted the importance of cybersecurity for financial institutions worldwide. Attribution: While the cybercriminals responsible for the Bangladesh Bank heist were never conclusively identified, there have been suspicions that North Korean hackers, specifically the Lazarus Group, were involved due to similarities with other attacks attributed to them.

a. In the Bangladesh Bank Cyber Heist case, what were the key vulnerabilities and security lapses that allowed the cybercriminals to compromise the bank’s systems and attempt a fraudulent transfer of funds? Provide specific examples from the case to support your answer. (5 Marks).

b. Discuss the role of international cooperation and information sharing in responding to cyber attacks on financial institutions, as illustrated by the Bangladesh Bank Cyber Heist. What lessons can be drawn from this case regarding the importance of cross-border cooperation in cybersecurity?
(5 Marks).



Additional information

Solution Type

Normal, Customize


There are no reviews yet.

Be the first to review “IT Security and Risk Management NMIMS Solution June 2024”