Assessment item 2 back to top Research Report task Value: 15% Due Date: 24-Aug-2018 Return Date: 14-Sep-2018 Length: Submission method options: Alternative submission method Task back to top Part A:...

1 answer below »
Check attachment. Read assessment carefully.


Assessment item 2 back to top Research Report task Value: 15% Due Date: 24-Aug-2018 Return Date: 14-Sep-2018 Length: Submission method options: Alternative submission method Task back to top Part A: 10 Marks 1. Search the web for news on computer security breaches that occurred during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues: · What the problem was; · How and why it occurred; · What could have been done to prevent it? Length: Around 900 words (Excluding references) Part B: 10 Marks Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the following issues: · What the problem was; · The scope of the attack; · Operational details of the attack; · What could have been done to prevent the attack? Length: Around 900 words (Excluding references) Rationale back to top This assessment task will assess the following learning outcome/s: · be able to justify security goals and the importance of maintaining the secure computing environment against digital threats. · be able to explain the fundamental concepts of cryptographic algorithms. · be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats. · be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system. Marking criteria and standards back to top Assessment criteria PART A : 10 marks Assessable Components HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 49% - 0 Search the web for news on computer security breaches that occurred during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues: · What the problem was; · How and why it occurred; · What could have been done to prevent it? 1. The comprehensive report addressing all criteria. Evidence of in-depth research.  (Value: 95%)   2. Referenced a wide range of appropriate sources.   Referencing style correctly used.   (Value: 5%) 1. The comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.  (Value: 95%)   2. Referenced a range of appropriate sources.    Referencing style correctly used. Minor errors only.   (Value: 5%)  1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.  (Value: 95%) 2. Referenced a range of appropriate sources. Referencing style correctly used. Some errors and omissions.   (Value: 5%) 1. The partially complete report addressing most of the criteria. Evidence of research. Some omissions.  (Value: 95%)     2. Referenced some appropriate sources. Referencing style mostly correctly used. Some errors and omissions.   (Value: 5%) 1. Major omissions or incorrect answers(Value: 95%)  2. Either no evidence of literature being consulted or cited references irrelevant to the assignment set.    Major errors in referencing style.   (Value: 5%) Possible marks 10.0 – 8.5 8.4-7.5 7.49 – 6.5 6.49 –5.0 4.99 – 0 PART B: 10 marks Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the following issues: · What the problem was; · The scope of the attack; · Operational details of the attack; · What could have been done to prevent the attack? 1. The comprehensive report addressing all criteria. Evidence of in-depth research.  (Value: 95%)    2. Referenced a wide range of appropriate sources.    Referencing style correctly used.  (Value: 5%) 1. The comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.  (Value: 95%) 2. Referenced a range of appropriate sources.    Referencing style correctly used. Minor errors only.  (Value: 5%) 1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.  (Value: 95%) 2. Referenced a range of appropriate sources. Referencing style correctly used. Some errors and omissions.  (Value: 5%) 1. The partially complete report addressing most of the criteria. Evidence of research. Some omissions.  (Value: 95%) 2. Referenced some appropriate sources. Referencing style mostly correctly used. Some errors and omissions.  (Value: 5%) 1. Major omissions or incorrect answers.  (Value: 95%) 2.  Either no evidence of literature being consulted or cited references irrelevant to the assignment set.    Major errors in referencing style.  (Value: 5%) Possible marks 10.0 – 8.5 8.4-7.5 7.49-6.5 6.49-5.0 4.99 - 0 Presentation back to top · Assessment MUST be submitted as ONE MS Word file via Turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments may be marked and feedback may be generated using MS Word-based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting. · Your answers to the questions should be precise but complete and informative. · Each question should be answered individually with the corresponding label to indicate the tasks completed e.g. Task 1 a. · APA reference style must be used throughout the document, with the  Reference list not counted in the page limit. APA referencing guide can be found  in http://student.csu.edu.au/study/referencing-at-csu · A cover page must be included and should contain relevant identifying information (Student name, Student ID#, Subject Code, Subject name, Session and Assessment Number).
Answered Same DayAug 05, 2020

Answer To: Assessment item 2 back to top Research Report task Value: 15% Due Date: 24-Aug-2018 Return...

Kuldeep answered on Aug 10 2020
141 Votes
Running head: Cyber Crime
Cyber Crime
Cyber Crime
Student Name:
Student ID:
Subject Code:
Subject Name:
Session and Assessment number:
Contents
Part A:    3
What the problem was;    3
How and why it occurred;    4
What could have been done to prevent it?    5
Part B    6
What the problem was;    6
The scope of the attack;    7
Operational details of the attack;    7
What could have been done to prevent the attack?    8
References    10
Part A:

What the problem was;
At least 87 million records breached (though likely many more)
Date disclosed: March 17, 2018 
Who can disremember about the data outrage that Facebook shocked in March 2018? There were reports at that time that political data company named Cambridge Analytica collects the personal information of about fifty million of Facebook users through an application setting out the personality, social networking and participation on platform. Although Cambridge Analytica claims that it has merely 30 million users, Facebook has determined that the initial estimation was actually very low (Frenkel & Roose, 2018). In April, the corporation announced its 87 million followers that their information was shared. Unfortunately, as the Facebook app gets a more accurate overview, Cambridge Analytica outrage can only be the tip of an iceberg. On 27 June, security researcher Inti De Ceukelaire announced another application known as Nametests.com which revealed information from more than 120 million users (Houser & Voss, 2018).
The problem began in March when the $ 500 billion company previously recognized that the investigation company Cambridge Analytica, closely related to President Trump's campaign and legal companies, uses data collected by millions of users lacking their permission (Kowolenko&Vouk, 2018).
Facebook is still criticized by investors and commentators, as stock prices decline - the company's market value fell only by $ 50 billion in the first week. The scandal has been exposed as the biggest two-day decline in history. At the same time, lawmakers in the United States and the UK asked Zuckerberg to explain how his company's approach could get answers in the testimony next week.
How and why it occurred;
Last weekend, it was revealed that Cambridge Analytics had illegally collected personal data on 50 million Facebook profiles. It all began in year 2015 when Cambridge psychology lecturer named Alexander Cogan formed an app named "This is your digital life." The app is personality test, defined by Dr. Kogan as "a research application utilized by psychologists."
His company, Global Science Research, and Cambridge Analytica reached an agreement to share this information. About 270,000 Facebook users signed up and received a reward for a personality test that could be stored by the company. But things here are getting riskier: the app also collects information about the user's Facebook friends, and unless they have already signed up for the app, they don't agree to store their private information. This was revealed by Christopher Wylie, a reporter and analyst who worked with Cambridge Analytica. "We used the Facebook to gatherprofiles of millions of people." and develop models to take benefit of our understanding of them and direct their internal demons. This is a foundation for the whole company. "The program depends on the consent of its users on behalf of all friends - or at least those whose privacy settings allow to share with friends' programs - to receive more limited information (Graham-Harrison & Cadwalladr, 2018)". It is reported that this information is used to determine the 2016 pre-election Voter behavior, and the Brexit campaign in the early years of the year. The report shows that more than 50 million people have harvested data without permission.
Facebook faces the pressure to be more transparent about how third-party companies may or may use their user data. Critics say the scandal highlights its continuing problems to understand how others are dealing with its platform. According to reports, since 2015, the social media giant has known that this information has been harvested, but has not taken any measures to protect its users. The network tried to imply that it was deceived, and those participants should not lie about deleting the data. In a series of tweets that have been deleted, Facebook's chief officer, Alex...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here