BN223 Cyber Security PrinciplesPage 6 of total pages Assessment Details and Submission Guidelines Trimester T1, 2021 Unit Code BN223 Unit Title Cyber Security Principles Assessment Type Group...






BN223 Cyber Security PrinciplesPage 6 of total pages Assessment Details and Submission Guidelines Trimester T1, 2021 Unit Code BN223 Unit Title Cyber Security Principles Assessment Type Group Assignment (Maximum 5 Students in a group) Assessment Title Cybersecurity for critical infrastructures Purpose of the assessment (with ULO Mapping) This assignment is designed to assess students’ knowledge and skills related to the following learning outcomes: a. Understand the common types of threat and vulnerabilities to cyber systems and data b. Demonstrate an understanding of the tactical and strategic means of detecting and monitoring anomalous activity c. Understand physical security impacts on the enterprise information infrastructure d. Plan and implement operational assurance programs Weight 25% of Total Assessment Total Marks 100 Word limit See instructions section Due Date Week 11 (03/06/2021) Submission Guidelines · All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. · Demonstration video must include presenters’ video. It must be created using Zoom app. · The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. · Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style for School of Business and School of Information Technology and Engineering respectively. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly in AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct · Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/AcademicintegrityPolicyAndProcedure. For further information, please refer to the Academic Integrity Section in your Unit Description. Assignment Description Tasks: There are two parts to this assignment, i.e. part A and part B. A. Write a group report on one of the following topics listed at Part A. Your tutor will allocate you a group number (maximum five students in a group) and your topic. (65 Marks) B. Demonstration. Make a group video demonstration of three computer security tools. (35 Marks) Part A description: In this part, you are required to select any one of the listed applications and write a group report including the following sections: · History and background of the selected application. · Literature review about your topic. · Present the security challenges in implementing the application in a IoT environment based on the referred research papers. · Current cyber security threats and challenges in critical infrastructures protection. · Address the security issues. · Analyse and review the existing security techniques and identify among them the best technique. · Analyse the challenges and Propose/ Review some solutions that can be taken to overcome these challenges. · Examine the security tools based on your selected topic. · Investigate the relevant computer security tools and techniques that can be used to address the challenges of the above case. · Propose/ Review some solutions that can be taken to overcome these challenges. · Presents an approach allowing to implement, manage and maintain cyber security program for Instrumentation and Control (I&C) systems of your selected application. The list of applications are given below: · Smart home · Wearables · Smart City · Smart grids · Industrial internet · Connected car. ... · Connected Health (Digital health/Telehealth/Telemedicine). · Smart retail. · Smart supply chain · Smart farming Instructions: Prepare your article as below 1. Go to the IEEE website and download the WORD template for the format. https://www.ieee.org/publications_standards/publications/authors/author_templates.html 2. Another link for the template: https://www.ieee.org/publications_standards/publications/journmag/ieee_tj_template_17.pdf 3. Read and familiarise yourself with the instructions carefully. 4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6). (https://www.ieee.org/publications_standards/publications/authors/author_guide_interactive.pdf) 5. Complete the assignment (minimum 6 and maximum 19 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties. · Title (maximum 15 words) · Abstract (200 – 250 words) · Introduction (800 – 2000 words) · Literature Review (1000 – 3000 words) · Main body (1000 – 3000 words) · Conclusion (200 – 300 words) · Future Works (150 – 300 words) · References (minimum 10 references) 6. The article must be a ‘Review’[footnoteRef:1] article, including at least 5 references and not more than 25. [1: See http://www.editage.com/insights/6-article-types-that-journals-publish-a-guide-for-early-career-researchers] 7. Strictly follow the IEEE reference format for in-body citations and the references section. 8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet. 9. Contents must include: · History and background of the topic · Challenges and drawbacks · Examine the security tools based on your selected topic. · Possible options (solutions) and future research areas proposed · Include a minimum of two (2) figures to show the overall concept and summarised overview of the topic from the review of minimum 10 – 15 (but not limited to) papers 10. Remember to strictly follow the template and the instructions above to avoid penalties. Part B description: Make a group video demonstration of three security tools Prepare slides (between 8 – 12 slides) for your video demonstration. As a team of five, create a 5-8 minutes video demo using Zoom application (along with presenters’ video) addressing the following tasks: 1. Analyse and discuss the importance of your selected computer security tools 2. Perform three selected security tools 3. Identify and discuss the strengths and weakness of each computer security tools 4. Which computer security would you recommend? Justify your recommendation. Submission Guidelines · The assignment should be submitted on the Moodle in two separate files: · The report should be submitted as a Word file · The demonstration should be submitted as a video file · Demonstration video must include presenters’ video. It must be created using the Zoom application. · Do not use Wikipedia as a source or a reference. · Make sure you properly reference any diagram/graphics used in the assignment. Marking criteria: Marking criteria for Assignment #2 Section to be included in the report Detailed Description of the Criteria Marks Abstract · A contextual sentence about your motivation behind your research topic. · Your thesis statements. · A descriptive statement about the types of literature used in the review. · Summarise your findings. · Conclusion(s) based upon your finding 5 Introduction and background Introduction about your selected topic: · State the general topic and give some background. · Provide a review of the literature related to the topic. · convince the reader that the research area is significant / important / interesting. · Define the terms and scope of the topic. · Evaluate the current situation (advantages/ disadvantages) and identify the gap. 10 Literature review Literature review of your topic: · Discussing in your review the approaches, limitations, and conclusions of past reviews. · Severe penalties apply for simple listing and describing. It should be a logically support analysis. 10 Main sections: · Information about your selected topic. · A general purpose and all relevant methods are stated using the correct scientific terminology. 10 Results · Examine the performance of three computer security tools based on your selected topic. · Figures and tables created should be created yourself and not copied from elsewhere. For full marks, you should create at least 2 figures and 2 tables. 10 Conclusion · A brief summary of the overall findings in relation to the purpose of the study. · Summary of thesis argument with concluding ideas that impact reader. 10 References section and body citation · Must consider at least five current references from journal/conference papers and books. · Strictly follow the order and instruction by IEEE.
May 19, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here