Task 1; Scenario analysis
The goal of this assessment is to find a real-world cybersecurity breach that occurred within the last two years during COVID-19. Select at least one recent data breach, conduct research, and write an overview of your findings.
Tips: the followi9ng link may be useful in locating a security reach. World’s biggest data breaches & hacks https://www.Informationsisbeautiful.net/visualizations/worlds-biggest-data-breaches-backs/
- You should include the following in your summary report:
- Summarise the breach.
- 08:28Another tips for your summary report. That means summarize the brace. Do not go. It is just summarize a few lines.
- 08:39What’s the name of the database when it is happen, and why it happens. This type of information summarize that at a place,
- Identify, explain and justify the vulnerability of this security breach.
- 08:50then you can, in your report you need to identify, explain, and justify the vulnerability of the secret device.
- 08:59So why this brace happened? What the ball nulligrate was. It is system for all it is human. For ah, what type of vulnerability you need to identify? Because ah, this dress there will be definitely something mentioned there.
- Explain it and justify the vulnerability.
- 09:18This is a somebody not too long and not too short, so that everyone can understand.
- Possible consequences of this security breach.
- Then it’s going to go Possible consequence of the security price that means, uh, what happened? If the security price it is monetary loss or reproduction laws? What type of loss of this secret place either company does, or government, laws or individual laws. So this type of consequence you need to summarize in this
- Explain the control measure
- and last is, explain the control measures.
- 09:50When you say the control measures. That is what type of you are, what the mitigating techniques, what control they should use, so that ah, this type of data price will not happen.
- this is the tips for this report. I don’t go too long. I think one pays, and one and a half days should be fine for this report with 500 words, or if you go more, that should be okay. As long as you’re writing, our content is linked with this area.
- Summarise the breach.
Task B: Research report (50 Marks)
Your task in this assessement is to write a research report
- select a topic
- cybersecurity threat landscape during COVID-19
- malware as a Service (MaaS) during the COIVD-19 pandemic
- cyber-Warfare, attacks and defences in the Australian context
- ToR Network
- Crypto market and Cryptocurrencies
- Dark Web forensics
- The security impact of COVID-19 on social media
- Bay pointe security consulting (BPSC)
- CIA (code injection attack)
- Social engineering
- Data exfiltration
- Network traffic analyssi
*( your are llowed to select a different topic (not in the list) that is related to the subject but, in that case, please let your lecturer/subject coordinator know prior to your assessment)
- select articles relevant to you topic (at least three journals/conference papers)
- conduct a literature review
your report will consist of two parts:
Part 1: Annotated Bibliography
What is an annotated bibliography:
https://owll.massey.ac.nz/assignment-types/annotated-bilbliography.php
sample annotated bibliography:
https://owll.massey.ac.nz/sample-assignments/sample-annotated-bilbliography.php
- you need to write a research report of a selected topic
- 10:51which are relevant to your subject. If you go to the subject site, let me open.
- 10:59Ah,
- 11:06ah! If you click the task, you will find there is a list of topics.
- 11:12So these are the topics
- 11:32that is related to subject. But in that case please let me know. Ah! Prior to your assessment, so that I can record in your name that you are working on this particular topic.
- 11:47Okay, So let’s come to this
- 11:51one.
- 11:53So this is the select a topic. So I hope it is clear to you. That means you first job is to select the topic.
- 12:03Ah, your topic within the list or outside the list. Ah, it will depend upon your ah upon you. That means, if you feel comfortable, then select from the list. If you have any topic
- 12:16which you feel, you are more familiar, it’s also Okay, just what you need. You need to let me know and drop an email.
- 12:25Ah, select articles relevant to your topics. The second.
- 12:31Now, your topic is selected. For example, your topic is run somewhere.
- 12:41Then second task, you need to select article from the literature
- 12:46at least three journals and or conference papers.
- 12:50I would always prefer the journal papers. But if you feel that journal is not available, at least conference with
- 12:59at least three. But if you select more that should be fine,
https://interact2.csu.edu.au/webapps/csu-servicelink-bb5c1o4db3261aa/link?type=msi&course_id=_62933_1&mode=cpview
Marking criteria and standards
Task A :
Assessable components | HD | DI | CR | PS |
Ability to apply learned concepts to real-life scenarios.
30 marks |
A detailed discussion that skillfully applies and extends learned concepts to the real life scenario: For the chosen cyber security breach, the submission presented carefully identifies, discusses and justifies the artefacts of vulnerability, potential consequences and control within the scenario to form a cohesive and well integrated discussion. | A detailed discussion that applies learned concepts to the real life scenario: For the chosen cyber security breach, the submission presented carefully identifies, discusses and justifies the artefacts of vulnerability, potential consequences and control within the scenario to form a cohesive discussion. | A discussion that applies learned concepts to the real life scenario: For the chosen cyber security breach, the submission presented identifies, discusses and justifies the artefacts of vulnerability, potential consequences and control within the scenario to form a cohesive discussion. The occasional mis-application of learned concepts can be observed. | A submission that identifies, discusses and justifies the artefacts of vulnerability, potential consequences and control within the scenario often in isolation without forming a cohesive discussion. Submission is typically misapplies learned concepts. |
Task B :
Assessable Components | HD | DI | CR | PS |
Provide your research report on the chosen topic with supportive literature (at least 3 sources) about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.
Maximum marks:15 |
Demonstrate an ability to survey the literature. A concise summary that is logically structured, integrates and links information into a cohesive and coherent piece of analysis and consistently uses correct to the selected topic, terminologies with sophisticated language. | Demonstrate an ability to survey the literature. A concise summary that is logically structured to create a cohesive and coherent piece of analysis that consistently uses correct forensic terminologies. | Demonstrates an ability to survey the literature. A concise summary that is generally logically structured to create a comprehensive but, mainly descriptive piece of analysis. Some use of correct forensic terminologies. | Demonstrate an ability to survey the literature. A concise summary which is partially structured into loosely linked rudimentary sentences to create a comprehensive, descriptive piece of analysis. Some use of correct forensic terminologies. |
Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important. Maximum marks:10 |
Comprehensive knowledge of the topic and an in-depth explanation of the issues that were not addressed. | Reasonable knowledge of the topic and a comprehensive explanation of the issues that were not addressed; | Provided factual/conceptual knowledge of the topic and an overall explanation of the issues that were not addressed; | Limited knowledge of the topic and a basic explanation of the issues that were not addressed; |
Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions. Maximum marks:10 |
The reflection is an in-depth analysis of the learning experience, the value of the derived learning to self and the enhancement of the student’s appreciation for the issues surrounding the topic. | The reflection is a reasonable analysis of the learning experience, the value of the derived learning to self and the enhancement of the student’s appreciation for the issues surrounding the topic. | The reflection is a reasonable analysis of the learning experience, with some analysis of the value of the derived learning to self. | The reflection attempts a basic analysis of the learning experience, but the value of the derived learning to self is vague. |
Develop recommendations for the safety of IT infrastructure of the workplace
Maximum marks:10 |
Comprehensive knowledge and an in-depth explanation of the recommendation of the issues with supporting evidence. | Reasonable knowledge and an in-depth explanation of the recommendation of the issues with supporting evidence. | Provided factual/conceptual knowledge and an in-depth explanation of the recommendation of the issues with supporting evidence. | Limited knowledge and an in-depth explanation of the recommendation of the issues with supporting evidence. |
Provide references (at least three) using APA 7th referencing system including in-text citations.
Maximum marks: 5 |
Faultless referencing, including reference list and in-text citations.
High quality references. |
Very good referencing, including reference list and in-text citations.
High quality references. |
Good referencing, including reference list and in-text citations.
Good quality references. |
Evidence of rudimentary referencing skills.
A mix of good and poor quality references. |