CYB401: Cyber Security Threat and Risk AssignmentModule Name CYB401: Cyber Security Threat and RiskAssignment Name CYB401: Cyber Security Threat and Risk AssignmentLevel 4Plagiarism and...

1 answer below »
i would like to know the cost of doing the attached assignment


CYB401: Cyber Security Threat and Risk Assignment Module Name CYB401: Cyber Security Threat and Risk Assignment Name CYB401: Cyber Security Threat and Risk Assignment Level 4 Plagiarism and Collusion In submitting the assignment Learner must complete a statement of authenticity confirming that the work submitted for all tasks is their own. The statement should also include the word count. Plagiarism and collusion are treated very seriously. Plagiarism involves presenting work, excerpts, ideas, or passages of another author without appropriate referencing and attribution. Collusion occurs when two or more learners submit work that is so alike in ideas, content, wording and/or structures that the similarity goes beyond what might have been mere coincidence. Referencing A professional approach to work is expected from all learners. Learners must therefore identify and acknowledge ALL sources/methodologies/applications used. The learner must use an appropriate referencing system to achieve this. Marks are not awarded for the use of English; however, the learner must express ideas clearly and ensure that appropriate terminology is used to convey accuracy in meaning. Please use the Harvard Style of Referencing throughout your work. Appendices You may include appendices to support your work. However, appendices must only contain additional supporting information and must be clearly referenced in your assignment. CYB401: 1 You may also include tables, graphs, diagrams, Gantt charts, and flowcharts that support the main report and should be incorporated into the back of the assignment report that is submitted. Any published secondary information such as annual reports and company literature should be referenced in the main text of the assignment, following Harvard Style Referencing, and referenced at the end of the assignment. Confidentiality When Learners choose to include organisational information that deals with sensitive material or issues, they must seek advice and permission from that organisation about its inclusion. Where confidentiality is an issue, Learners are advised to anonymise their assignment report so that it cannot be attributed to that particular organisation. Word Count Policy Learners must comply with the required word count, within a margin of +10%. These rules exclude the index, headings, tables, images, footnotes, appendices, and information contained within references and bibliographies. When an assessment task requires learners to produce presentation slides with supporting notes, the word count applies to the supporting notes only. Submission of Assignments -Before submitting your work check you have: ✓ Completed the tasks or activities as required by the assignment ✓ Labeled or numbered each task or activity ✓ Understood and responded to the command verbs in the Assessment Criteria ✓ Produced the tasks or activities in the required format ✓ Presented your work clearly ✓ Referenced sources you have used and cited from ✓ Put cited material in quotation marks ✓ Checked for any spelling or grammatical errors ✓ Added a footer with page numbers CYB401: 2 Marking and Grades The details of a standard marking rubric can be found at the end of this document. Unless stated elsewhere, learners must answer all questions in this document. Assignment Question Task 1 – 700 words Understand complex business cyber security threats and risks. 1.1: Analyse major cyber breaches and methods of attack that have severely impacted businesses and public organisations. 1.2: Examine how to calculate the business impact of a suspected or actual cyber security breach. Assessment Criteria 1.1: Analyse major cyber breaches and methods of attack that have severely impacted businesses and public organisations. 1.2: Examine how to calculate the business impact of a suspected or actual cyber security breach. Task 2 – 650 words Understand recent megabreaches and explain malware and ransomware attacks. 2.1: Apply threat and risk management concepts and models. 2.2: Explain the terms malware, ransomware and other forms of intentional malicious cyber attacks. Assessment Criteria 2.1: Apply threat and risk management concepts and models. 2.2: Explain the terms malware, ransomware and other forms of intentional malicious cyber attacks. Task 3 – 650 words Understand how threats and malicious hackers are advancing and developing customized intrusion tools. CYB401: 3 3.1: Discuss the development of customised intrusion tools and their use by malicious hackers. 3.2: Analyse how an intrusion occurred to cause a mega data breach. Assessment Criteria 3.1: Discuss the development of customised intrusion tools and their use by malicious hackers. 3.2: Analyse how an intrusion occurred to cause a mega data breach. CYB401: 4 Marking Rubric: Distinguished Excellent Good Proficient Basic Marginal Unacceptable Criteria 80+ 70 60 50 40 30 0 Content (alignment with assessment criteria) Extensive evaluation and synthesis of ideas; includes substantial original thinking Comprehensiv e critical evaluation and synthesis of ideas; includes coherent original thinking Adequate evaluation and synthesis of key ideas beyond basic descriptions; includes original thinking Describes main ideas with evidence of evaluation; includes some original thinking Describes some of the main ideas but omits some concepts; limited evidence of evaluation; confused original thinking Largely incomplete description of main issues; misses key concepts; no original thinking Inadequate information or containing information not relevant to the topic Application of Theory and Literature In-depth, detailed and relevant application of theory; expertly integrates literature to support ideas and concept Clear and relevant application of theory; fully integrates literature to support ideas and concepts Appropriate application of theory; integrates literature to support ideas and concepts Adequate application of theory; uses literature to support ideas and concepts Limited application of theory; refers to literature but may not use it consistently Confused application of theory; does not use literature for support Little or no evidence of application of theory and relevant literature Knowledge and Understanding Extensive depth of understanding and exploration beyond key principles and concepts Comprehensiv e knowledge and depth of understanding key principles and concepts Sound understanding of principles and concepts Basic Knowledge and understandin g of key concepts and principles Limited and superficial knowledge and understanding of key concepts and principles Confused or inadequate knowledge and understanding of key concepts and principles Little or no evidence of knowledge or understanding of key concepts and principles Presentation and Writing Skills Logical, coherent and polished presentation exceeding expectations at this level; free from errors in mechanics and syntax Logical, coherent presentation demonstrating mastery; free from errors in mechanics and syntax Logical structure to presentation; makes few errors in mechanics and syntax which do not prohibit meaning Orderly presentation; minor errors in mechanics and syntax Somewhat weak presentation; errors in mechanics and syntax may interfere with meaning Confused presentation; errors in mechanics and syntax often interfere with meaning Illogical presentation lacking cohesion; contains significant errors that interfere with meaning Referencing Advanced use of in- text citation and references Mastery of in-text citation and referencing Appropriate use of in-text citation and referencing Adequate use of in- text citation and referencing Limited use of in- text citation and referencing Inadequate use of citation and referencing Little or no evidence of appropriate referencing or use of sources Assessor’s Comments CYB401: 5 Directions: Total the boxes and divide by 5 to arrive at the final mark. Example: Distinguished Excellent Good Proficient Basic Marginal Unacceptable Range 80-100 70-79 60-69 50-59 40-49 35-39 0-34 Criteria Score Content 50 Application of Theory and Literature 40 Knowledge and Understanding 50 Presentation/Writing Skills 40 Referencing 40 Total Score 220/5 = 44, Pass CYB401: 6
Answered 2 days AfterNov 28, 2022

Answer To: CYB401: Cyber Security Threat and Risk AssignmentModule Name CYB401: Cyber Security Threat and...

Shubham answered on Nov 30 2022
42 Votes
CYBER SECURITY THREAT AND RISK ASSIGNMENT
Task 1
1.1 Analysis of cyber breach and method of attacks
The biggest data breach was CAM4 Data breach that happened in the year 2020. This breach has impacted around 10.88 billion people. In this data breach, confidential information of customers was exposed that includes email address, name, chat transcripts, password hashes, payment logs and IP address. In this breach, mos
t of the email addresses were linked with the cloud storage services. If the hacker tries to launch a phishing attack on users then the hacker can easily get deeper and get access to business information and personal photos. The Yahoo Data Breach happened in the year 2017 was the another biggest data breach that has impacted 3 billion customers. The security answers and questions were compromised and it increases the risk of identity theft. This breach has affected multiple users and users were asked to change password and reenter the unencrypted security answers and questions.
The SQL injection attack has mostly impacted the business and attackers go around the vulnerable website to target the stored data and get access to user financial data and credentials. If the attacker directly targets the website user then hackers may get the access to website users. The SQL injection attack includes injecting malicious code into the website. The malicious code used by attackers is injected and it is run in the browser of the user. It includes the way for injecting malicious code in the website and hackers can easily attack the website. The common ways attackers deploy the cross-site scripting includes use of malicious code into scripts or comments that are run automatically.
Session hijacking is commonly used and the information present on the server is accessed by hackers. In this process, hackers can get the login credentials for accessing the sensitive information (Husák et al. 2018). The session between the remote web server and the computer gives a unique session ID that should stay private. In this attack, hackers captured session ID and posed it at the computer for making a request that provides access to the webs server.
1.2 Calculation of impact of cyber security beach on the business
The calculation of the impact of any cyber security breach is calculated by the number of customer’s data that was put at risk. The cyberattack can put customers away from accessing the website or application. It can also lock out a company's critical database and attackers may demand for ransom for restoring the access. The malware introduced attack may erase, alter or overwrite the database that can cost extensive money, time and other resources. It can cause severe loss to trust of customers, overall reputation and loyalty of the brand (Sarker, 2021). The successful data breach may lead to confidential customer data that are being used for the fraud along with financial activity and identify theft. The Yahoo breach has exposed data of customers and it has defended the business in a big way. The loss of customers includes a drop in sales. Failing trust of investors, critical information theft, decreased valuation of the company and productivity losses. The cost involves the incidence response, vulnerability analysis and escalation.
It includes malicious software that is designed for destroying operations and stealing data. The cost of cyber attack can cripple the business and it can shut down the complete operations that can result in loss of data. It can have the serious effect of a cyberattack that can cause a lack of reputation. The data breach can cause loss of client data including security numbers, credit card diesel and back account information. It can result in loss of trust of clients. It can result in rising the cost for operation of the business (Alshaikh, 2020). The cyber attack can impact both productivity of the organization for the period of time and it can cause crippling losses of revenue. It can also affect the manufacturer’s network with ransomware or malware, rendering the IT systems unusable and it can impact the reputation. The direct loss in sales and revenue that can cause downtime that can create inefficiencies that can...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here