Assessment 2: Case Study – Part 2
Length: 1400-2000 words
Assessment 2 is the second of three assessments that focus on a single case study of a specific security incident. In this case study you will act as an IT Security Consultant for your customer – CricTech Pty Ltd. Using the information provided in the referent document “ITI581 Case Study Information.pdf” provide answers to the tasks listed below for Assessment 2. Use the document entitled “Assessment 2 Template.docx” to submit your answers in the required format.
Assessment 2 Task
Re-familiarise yourself with the information provided in the case study information PDF, and your previous submission for Assessment 1: Case Study Part 1, to help you formulate an answer to the following task.
Assessment Task
- Evaluate the information you have been provided, both about the CricTech technical environment and the Ransomware attack, and propose, with justification, tools, processes, methods or procedures you think should be used to validate the security issues that exist within the technical environment you identified in Assessment 1. (30 Marks)
Marking Criteria (Rubric)
Criteria | HD | DI | CR | PS | FL |
Evaluate the information provided in the case study and, using this evaluation, describe and justify the different methods, tools, processes or procedures that can be used to identify security issues in the technical environment. (100%) | Students have provided a clear and comprehensive evaluation of the case study information and clearly identified, described and justified 6+ security tools, methods, processes or procedures that will provide a comprehensive understanding of the current security issues within the technical environment to an outstanding standard; student demonstrates a superior grasp of cybersecurity
concepts; |
Students have provided a clear and very good evaluation of the case study information and clearly identified, described and justified 5-6 security tools, methods, processes or procedures that will provide a very good understanding of the current security issues within the technical environment to a very good standard; student demonstrates a very good grasp of cybersecurity concepts; | Students have provided a clear and good evaluation of the case study information and clearly identified, described and justified 3-4 security tools, methods, processes or procedures that will provide a good understanding of the current security issues within the technical environment to a good standard; student demonstrates a good grasp of cybersecurity concepts; | Students have provided a clear, adequate evaluation of the case study information and identified, described and justified 3-4 security tools, methods, processes or procedures that will provide an adequate understanding of the current security issues within the technical environment to an adequate standard; student demonstrates an adequate grasp of cybersecurity concepts; | Students have provided little useful evaluation of the case study information and identified, described and justified <3 security tools, methods, processes or procedures that will provide little understanding of the current security issues within the technical environment; student demonstrates an inadequate grasp of cybersecurity concepts; |