Assessment item 2 back to top Research Report task Value: 15% Due Date: 24-Aug-2018 Return Date: 14-Sep-2018 Length: Submission method options: Alternative submission method Task back to top Part A:...

1 answer below »
see the instructions properly



Assessment item 2 back to top Research Report task Value: 15% Due Date: 24-Aug-2018 Return Date: 14-Sep-2018 Length: Submission method options: Alternative submission method Task back to top Part A: 10 Marks 1. Search the web for news on computer security breaches that occurred during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues: · What the problem was; · How and why it occurred; · What could have been done to prevent it? Length: Around 900 words (Excluding references) Part B: 10 Marks Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the following issues: · What the problem was; · The scope of the attack; · Operational details of the attack; · What could have been done to prevent the attack? Length: Around 900 words (Excluding references) Rationale back to top This assessment task will assess the following learning outcome/s: · be able to justify security goals and the importance of maintaining the secure computing environment against digital threats. · be able to explain the fundamental concepts of cryptographic algorithms. · be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats. · be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system. Marking criteria and standards back to top Assessment criteria PART A : 10 marks Assessable Components HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 49% - 0 Search the web for news on computer security breaches that occurred during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues: · What the problem was; · How and why it occurred; · What could have been done to prevent it? 1. The comprehensive report addressing all criteria. Evidence of in-depth research.  (Value: 95%)   2. Referenced a wide range of appropriate sources.   Referencing style correctly used.   (Value: 5%) 1. The comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.  (Value: 95%)   2. Referenced a range of appropriate sources.    Referencing style correctly used. Minor errors only.   (Value: 5%)  1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.  (Value: 95%) 2. Referenced a range of appropriate sources. Referencing style correctly used. Some errors and omissions.   (Value: 5%) 1. The partially complete report addressing most of the criteria. Evidence of research. Some omissions.  (Value: 95%)     2. Referenced some appropriate sources. Referencing style mostly correctly used. Some errors and omissions.   (Value: 5%) 1. Major omissions or incorrect answers(Value: 95%)  2. Either no evidence of literature being consulted or cited references irrelevant to the assignment set.    Major errors in referencing style.   (Value: 5%) Possible marks 10.0 – 8.5 8.4-7.5 7.49 – 6.5 6.49 –5.0 4.99 – 0 PART B: 10 marks Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the following issues: · What the problem was; · The scope of the attack; · Operational details of the attack; · What could have been done to prevent the attack? 1. The comprehensive report addressing all criteria. Evidence of in-depth research.  (Value: 95%)    2. Referenced a wide range of appropriate sources.    Referencing style correctly used.  (Value: 5%) 1. The comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.  (Value: 95%) 2. Referenced a range of appropriate sources.    Referencing style correctly used. Minor errors only.  (Value: 5%) 1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.  (Value: 95%) 2. Referenced a range of appropriate sources. Referencing style correctly used. Some errors and omissions.  (Value: 5%) 1. The partially complete report addressing most of the criteria. Evidence of research. Some omissions.  (Value: 95%) 2. Referenced some appropriate sources. Referencing style mostly correctly used. Some errors and omissions.  (Value: 5%) 1. Major omissions or incorrect answers.  (Value: 95%) 2.  Either no evidence of literature being consulted or cited references irrelevant to the assignment set.    Major errors in referencing style.  (Value: 5%) Possible marks 10.0 – 8.5 8.4-7.5 7.49-6.5 6.49-5.0 4.99 - 0 Presentation back to top · Assessment MUST be submitted as ONE MS Word file via Turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments may be marked and feedback may be generated using MS Word-based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting. · Your answers to the questions should be precise but complete and informative. · Each question should be answered individually with the corresponding label to indicate the tasks completed e.g. Task 1 a. · APA reference style must be used throughout the document, with the  Reference list not counted in the page limit. APA referencing guide can be found  in http://student.csu.edu.au/study/referencing-at-csu · A cover page must be included and should contain relevant identifying information (Student name, Student ID#, Subject Code, Subject name, Session and Assessment Number).
Answered Same DayAug 07, 2020

Answer To: Assessment item 2 back to top Research Report task Value: 15% Due Date: 24-Aug-2018 Return...

Ankit answered on Aug 16 2020
147 Votes
1
                Student_Id
                Student_Name
                Computer security breaches
                WannaCry and the Petya cyber-attacks
Table of Contents
Computer security breaches that occurred during January-August 2018    3
Introduction    3
Problem    3
How and why it occurred    4-5
What could have been done to prevent it?    5
Conclusion    5-6
The WannaCry and the Petya cyber-attacks     6
Intr
oduction    6
Problem    6
Scope of attack    7
Operational details of the attack    7
What could have been done to prevent it?    8
Conclusion    8-9
Computer security breaches that occurred during January-August 2018
Introduction
Now days there are growing number of security breaches which affect the network system. A security breaches is any vulnerability that outcomes in unapproved access of information that allows the hacker to take control of system or network. Many firms such as IT organizations, government organizations etc. are at the risk of breaches. Security breaches can be classified as internal and external to firm.
Security is must for every firm and if there is not good security then it may give rise to security breaches. It is the basic responsibility of firm to make a system which will be secure for their users. There are various types of attacks such as unauthenticated emails, spyware/Trojans/Virus/Worms etc. which may occur due to poor security as hacker gain unauthorized access to the system easily.
In this report we will focus on security breaches that occur in June 2018 for Reddit's system. The report focuses on actual problem, how and why it occurred. The report also shows what is done to prevent it.
Problem
The problem is Reddit database get hacked by hacker to misuse it.
Reddit's frameworks were accessed in June, the webpage reported in a blog entry. The employees of Reddit were attempting to login to their frameworks through instant messages sent by means of filling userid and password but the messages were blocked. Utilizing the employee individuals' records the attackers could take email ids of present Reddit users and their database. Reddit hasn't conceded what number of email ids was endangered. The stress for users is that email ids may be misused and it will be conceivable to connect mysterious records to genuine persons. [Wired]
How and why it occurred
A attacker ruined into a couple of Reddit's frameworks and figured out how to get to some client information, including present email ids and a 2007 database backup containing past lively things and encrypted passwords.
Reddit's system suffers serious attack on June 19. The hacker traded off a couple of their staff records with their cloud and source code hosting vendors. The hackers have already their basic access points for code and framework on the side of rigid verification that is based on two factor validation (2FA). They discovered that SMS-based confirmation is not reliable as they trust blindly and the fundamental attack on system was by means of SMS message. They direct this out toward urge everybody here to migrate to new technique i.e. token-based 2FA.
The hacker did not get write up access to Reddit frameworks but they were successfully in gaining read only access to a few frameworks that contained backup information, source code and different logs. They failed in editing Reddit data. They have made steps since the occasion to additionally secure and turn all generation privileged insights and API keys, and to upgrade their logging and database frameworks.
The data that is accessed by hacker via cloud on june 19, 2018 attack consists of following:
a) Reddit record from 2007 database which also consist of login credentials and email ids
Things...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here