ISYS1002 Cybersecurity- 2Web

Java Python ISYS1002 Cybersecurity- Assignment 2

Summary

Title

Assignment 2

Type

Case Study.  Must be completed as individuals

Due Date:

Monday, Week 5, 11:59 pm

Length:

1000 words

Weighting:

40%

Academic Integrity

GenAI may NOT be used for this task.

Submission

Word document Word document submitted to Turnitin.

Unit Learning Outcomes

This assessment task maps to the following ULOs:

ULO1: describe and apply the key principles of cyber security.

ULO2: identify and classify different types of cyber security threats and discuss various mitigation strategies through appropriate techniques.

ULO3: differentiate spheres of security

Rationale:

In today’s digital age, your increasing reliance on digital technology and networking for personal and business matters makes cybersecurity a critical component of national security, economic prosperity, and social well-being. As a cybersecurity professional, understanding the fundamental concepts of cybersecurity, including principles and threat mitigation, is crucial. This knowledge will equip you to develop effective security strategies to protect information and information systems, manage security risks effectively, and ensure your readiness to tackle various cybersecurity challenges.

Task Description:

You are a cybersecurity consultant hired by an organization like your educational institute, a large business, or a government division. Your role involves contributing to their cybersecurity program. The primary focus of this assignment is on identifying and discussing the fundamental principles of cybersecurity, major threats and the level of risks if the organsiation is compromised with those threats realized as attack.

You are required to complete the following tasks:

Task Instructions:

Task 1 – CIA triad and security breach:

a. Use the Business Impact Analysis (BIA) and Weighted Factor Analysis (WFA) methods to identify the most critical/top five assets of your chosen organisation by their importance to risk management.

b. Discuss the CIA Triad and how these security principles relate to the security breach of the five assets identified in step a.

Task 2 - Threat Identification:

a. Assess and discuss the three top threats for each of the five (5) critical assets identified in Task 1 above.

b. Each threat should be supported by evidence - Substantiate your claim with a reference(s) for each threat.

Task 3 - Risk Assessment:

a. Evaluate potential weaknesses Identify and discuss two (2) potential weaknesses (vulnerabilities) of each of the top five assets identified in Task 1 based on three information security components: confidentiality, integrity, and availability.

b. Explain various risk assessment techniques and conduct a qualitative risk assessment for these assets (in Task 1) against the identified threats (in Task 2) and vulnerabilities using likelihood and consequence scales. Use your own and public domain knowledge to help you with the impact assessment. Include references to support your discussion.

c. Discuss the potential impact of these threats of the organisation if they were to materialize, using real-life examples of similar incidents. Make sure to reference your examples.

You are free to make any assumption(s) you wish regarding the existing controls, business profile, etc., which will need to be documented in the appropriate sections of your report.

Your report should be well presented with clear headings, subheadings, section numbers etc.; Information should be presented logically, interestingly, easy to follow and well-supported arguments; cite all reference sources. Note that you are not allowed to cut and paste from online resources. Use your own words and figures. Acknowledge all reference sources.

Task Instructions:

Make assumptions as needed regarding the organization’s existing controls and profile, ensuring you document these assumptions clearly in your report. Your final document should be well-structured, logically presented, and should cite all reference sources used.

Resources:

1.   Modules 1-4 contents

2.   The Report Template provided. This is located in the Assessment 2 folder in the Blackboard unit site.

Referencing Style:

You are expected to adhere to APA7 or Harvard referencing style). Please visit to the SCU Library referencing guides for details.

Submission Format:

A Turnitin link (draft portal) has been set up to provide you with an opportunity to check the originality of your work until your due date. Please make sure you review the report generated by the system and make changes (if necessary!) to minimise the issues of improper citation or potential plagiarism. If you fail to follow this step, your report may not be graded or may incur late feedback.

You can check your Turnitin similarity report as many times as you like (your paper will not be saved) via the draft submission portal. When you have your final report ready, submit to the Turnitin final submission portal (you may only submit to this portal once as your paper will be saved) for marking. Only Microsoft Word documents submitted via the Turnitin portal on Blackboard will be accepted. The report should be around 1000-1500 words (excluding table of contents, tables, figures, and references)

The first page of the report should have your name, student ID, ISYS6002 Assignment 2, and the date you submit your assignment. You must label your submission with your surname and initials and the assessment task's name, eg.,

Gsorwar_ISYS1002_A2_Case study.docx

Gsorwar_ISYS1002_A2_Case Study         

本系统旨在构建一套面向高等院校的综合性教务管理平台,涵盖学生、教师及教务处三个核心角色的业务需求。系统设计着重于实现教学流程的规范化与数据处理的自动化,以提升日常教学管理工作的效率与准确性。 在面向学生的功能模块中,系统提供了课程选修服务,学生可依据培养方案选择相应课程,并生成个人专属的课表。成绩查询功能支持学生查阅个人各科目成绩,同时系统可自动计算并展示该课程的全班最高分、平均分、最低分以及学生在班级内的成绩排名。 教师端功能主要围绕课程与成绩管理展开。教师可发起课程设置申请,提交包括课程编码、课程名称、学分学时、课程概述在内的新课程信息,亦可对已开设课程的信息进行更新或撤销。在课程管理方面,教师具备录入所授课程期末考试成绩的权限,并可导出选修该课程的学生名单。 教务处作为管理中枢,拥有课程审批与教学统筹两大核心职能。课程设置审批模块负责处理教师提交的课程申请,管理员可根据教学计划与资源情况进行审核批复。教学安排模块则负责全局管控,包括管理所有学生的选课最终结果、生成包含学号、姓名、课程及成绩的正式成绩单,并能基于选课与成绩数据,统计各门课程的实际选课人数、最高分、最低分、平均分以及成绩合格的学生数量。 资源来源于网络分享,仅用于学习交流使用,请勿用于商业,如有侵权请联系我删除!
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值