Skip to main content

This assignment is developmental

1
School of Business and Tourism

Unit Cybersecurity
Unit code CMP71001

 

Assignment 2 Security consultation report and guideline.
Due Date Sunday 23:59:59 of the last study week.
Learning
Outcomes 3 – 6
Graduate
Attributes 3, 4 & 5
Weight 30% of overall unit assessment
Suggestion This assignment is developmental and cumulative. You are strongly advised to start
doing this assignment from
Week-6 in your study. Leaving your starting date to
the week before the due date is a very poor strategy for success in the unit.
A marking scheme will be posted on MySCU to help you direct your efforts
successfully.
Marks

Task Description
You are hired by Southern Cross University as a cybersecurity consultant to work on a
security program to address the contemporary and emerging risks from the cyber threats
the university is facing. Your tasks are the following:
Task 1: the university is currently using a password based authentication system
to control the user access to the university’s information system. However, the
Bring Your Own Device (BYOD) policy recently implemented by the university
has raised some security concerns. As a security consultant, assess the risk from
the BYOD policy to the university’s information system.
Task 2: After the assessing the risk from the BYOD policy, you suggest the
university to replace the current password-based authentication scheme with a
Certificate-Based Authentication. To justify your suggestion, write a technical
report to explain the working principle of the Certificate-Based Authentication
mechanism and discuss why the university should use the mechanism in this case
by comparing it with the password-based authentication mechanism. Use figure
when necessary to support your answers.

Task 3: You have identify Spamming is among the top cybersecurity threats facing
by the university. Use the Spam Act 2003 and available online resources to develop

a guideline for the university students and staff to combat with the threat. The
guideline will include the following:
o Definition of spam and its distinctive characteristics.
2
o At least three (3) real examples of spams showing the spam characteristics.
o An instruction to the users of how to recognise and safely handle a spam.
o An instruction to the IT administrator of how to minimize the spam threat.
Assignment-2 guideline
Task 1: BOYD risk assessment
To complete this task, use the following guidelines:

Identify the most critical components of the university’s information system – the
critical information assets.

Identify what threats the BYOD policy may bring to the identified critical assets.
Identify potential vulnerabilities of each asset against the identified threats.

Assess the risk to the university’s information system using either quantitative or
qualitative risk assessment approach and document the risk assessment process.

Task 2: Certificate-based Authentication
To complete this task, use the following guidelines:

Perform necessary research to understand the working principle, pros and cons of
the Certificate-based Authentication mechanism. Document all reference sources.

 

Write a technical report to explain the working principle of the Certificate-based
Authentication mechanism. Compare the certificate-based authentication against

the password-based authentication and highlight the features you think are useful
for combating the threats from the BYOD policy.

Note that you are not allowed to cut and paste from online resources. Use your
own words and figures. Acknowledge all reference sources.

Task 3: Anti-spam guideline
To complete this task, use the following guidelines:

Read and understand Spam Act 2003. The Spam Act 2003 document is available
at: https://ift.tt/2t1uw0g. The Act will help you to

define what type of electronic messages should be treated as spams, what are the
distinctive characteristics of a spam and what act is considered as spamming?
Search for 3 representative examples of spams or use your own spams as examples.

Use samples from reputable online resources to help you with the development of
spam handling instructions. The instructions should be clear, concise and precise.

Assignment-2 Marking Rubric
A spreadsheet that will be used for the marking of your site is provided (co-located with
this assignment specification) on MySCU to itemise exactly what tutors will be looking at
in relation to marking your assignment. It contains a detailed breakdown of the marking
criteria for this assignment.
I strongly suggest you peruse this spreadsheet.
3
Submission Format
When you have completed the assignment, you are required to submit your assignment in
the PDF/DOC format. The file will be named using the following convention:
filename =
FirstInitialYourLastName_CMP71001_A2.pdf
(i.e. FJones_CMP71001_A2.pdf)
Note to
IBS students: Please check with your local lecturer/tutor the submission
requirements for your assignments. Typically, they will be different from on-shore students
of Southern Cross University.
Original work
It is a University requirement that a student’s work complies with the Academic Policy,
Chapter 4.20 on Student Academic Integrity. It is a student’s responsibility to be familiar
with the Policy.
Failure to comply with the Policy can have
severe consequences in the form of University
sanctions. For information on this Policy please refer to Chapter 4.20 on Student Academic
Integrity at the following website:
https://ift.tt/2N1MBEW
As part of a University initiative to support the development of academic integrity,
assessments may be checked for plagiarism, including through an electronic system, either
internally or by a plagiarism checking service, and be held for future checking and
matching purposes.
Retain duplicate copy
Before submitting the assignment, you are advised to retain electronic copies of original
work. In the event of any uncertainty regarding the submission of assessment items, you
may be requested to reproduce a final copy.
School Extension Policy
In general, I will NOT give extension unless where there are exceptional circumstances.
Students wanting an extension must make a request at least 24 hours before the assessment
item is due and the request must be received in writing by the unit assessor or designated
academic. Extensions within 24 hours of submission or following the submission deadline
will not be granted (unless supported by a doctor’s certificate or where there are exceptional
circumstances – this will be at unit assessor’s discretion and will be considered on a case
by case basis). Extensions will be for a maximum of 48 hours (longer extensions supported
by a doctor’s certificate or alike to be considered on a case by case basis).
A penalty of 5% of the total available grade will accrue for each 24-hour period that an
assessment item is submitted late. Therefore, an assessment item worth 20 marks will have
1 marks deducted for every 24-hour period and at the end of 20 days will receive 0 marks.
Students who fail to submit following the guidelines in this Unit Information Guide will be
deemed to have not submitted the assessment item and the above penalty will be applied

4
until the specified submission guidelines are followed.
Marks and Feedback
All assessment materials submitted during the semester will normally be marked and
returned within two weeks of the required date of submission (provided that the assessment
materials have been submitted by the due date).
Marks will be made available to each student via the MySCU Grade book.

The post This assignment is developmental appeared first on My Assignment Tutor.



Logo GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom

Do violent video games encourage players to become violent in real life?

 Write an outline for Speech 3, the persuasive belief speech, following the outline guidelines and formatting requirements (Do violent video games encourage players to become violent in real life?).  1000-1200 WORDS https://virtualspeech.com/blog/persuasive-speech-outline-structure-delivery Topics: https://blog.prepscholar.com/good-persuasive-speech-topics Do violent video games encourage players to become violent in real life? https://www.youtube.com/watch?v=YKKWOx43pIY WE HAVE DONE THIS ASSIGNMENT BEFORE, WE CAN ALSO DO IT FOR YOU GET SOLUTION FOR THIS ASSIGNMENT,  Get Impressive Scores in Your Class CLICK HERE TO MAKE YOUR ORDER   on Do violent video games encourage players to become violent in real life? Are You looking for Assignment and Homework Writing help?  We Provide High-Quality Academic Papers at Affordable Rates. No Plagiarism. TO BE RE-WRITTEN FROM THE SCRATCH