MIS301_Assessment_2 Part A_ Brief_Case Study Report_Identification of Issue_Module 3.2 Page 1 of 7 Context As a cybersecurity specialist, a significant part of your time is spent on identifying...

1 answer below »
Report.


MIS301_Assessment_2 Part A_ Brief_Case Study Report_Identification of Issue_Module 3.2 Page 1 of 7 Context As a cybersecurity specialist, a significant part of your time is spent on identifying vulnerabilities to informational assets in an organisation and making recommendations to mitigate those identified vulnerabilities and threats. In real-world contexts, you may also encounter ethical dilemmas in cybersecurity practices. This assessment, through three parts and submissions, develops your skills in identifying and communicating threats and vulnerabilities to informational assets, making recommendations to the identified threats and vulnerabilities to cybersecurity and understanding the ethical ‘best practices’ to address ethically difficult issues in cybersecurity practice. Instructions: Assessment 2 consists of three parts. All three parts are based on the attached case study and is a group assessment For Part A: ASSESSMENT 2 PART A BRIEF Subject Code and Title MIS301 Cybersecurity Assessment Case Study Report and Presentation: Identification of the issues Individual/Group Group Length Part A: 1500 words (+/- 10%). Learning Outcomes The Subject Learning Outcomes demonstrated by successful completion of the task below include: a) Investigate and analyse the tenets of cybersecurity. b) Identify and communicate a range of threats and vulnerabilities to informational assets. c) Recommend and justify robust solutions to identified threats and vulnerabilities to cybersecurity. d) Develop own professional practice and ethical standards around security issues and implementation of solutions. Submission Due by 11:55pm AEST Sunday of Module 3.2 Weighting 25% Total Marks 100 marks MIS301_Assessment_2 Part A_ Brief_Case Study Report_Identification of Issue_Module 3.2 Page 2 of 7 1. Form groups of 2 to 3 members. Please read the attached MIS301_Assessment 2_Group Work Guide document for information on group formation, registration and administration. 2. Read the attached case study. 3. Based on the case study, you, as a group, are required to submit a 1500-word report to the managers, who do not have a technical background. The report must address the following tasks: a. identifying the informational assets that need to be protected and build a business case for management to justify investment in cybersecurity b. identifying and discussing at least five (5) vulnerabilities that exist in the company’s IT infrastructure and operation c. for each vulnerability, discuss potential threats, possible attacks and the consequence for the business. 4. Your report must be related to the case study and not a general report on cybersecurity. 5. Report structure: a. Title page: Subject code and name, assessment number, report title, assessment due date, word count (actual), student names, student IDs, Torrens email addresses, learning facilitator, and subject coordinator. b. Table of Contents (ToC): It should list the report topics using decimal notation. It needs to include the main headings and subheadings with corresponding page numbers, using a format that makes the hierarchy of topics clear. Because you are including a ToC, the report pages should be numbered in the footer as follows: title page has no page number; and the main text should have Arabic numerals commencing at 1. Create the ToC using Microsoft Word’s ToC auto-generator rather than manually typing out the ToC. Instructions can be found here https://support.office.com/en-gb/article/Create- a-table-of-contents-or-update-a- table-of-contents-eb275189-b93e-4559-8dd9-c279457bfd72#__create_a_table. c. Introduction (90-110 words): It needs to provide a concise overview of the problem you have been asked to research, the main aims/purpose of the report, the objectives to be achieved by writing the report and how you investigated the problem. Provide an outline of the sections of the report. d. Body of the report (use appropriate headings in the body of the report) (1170-1430 words): Ensure that you address the tasks listed above. Do NOT use generic words such as ‘Body, Body of the Report, Tasks’ as section headings. Create meaningful headings and subheadings that reflect the topic and content of your report. e. Conclusion (90-110 words): Restate the purpose of the report and key issues investigated and the related findings based on your research and analysis. f. Reference list g. Appendices if necessary. 6. Before submitting your assessment, check it against the assessment criteria and the marking rubric included in this brief to ensure that you have satisfactorily addressed all the criteria that will be used to mark your submission. 7. Download the Group Participation Matrix from Assessment 2 Part A section. Use this document to review your group members’ performance in this assessment and to specify their specific contribution made to group work. This Group Participation Matrix document needs to be submitted individually through the Assessment 2 Part A submission link. MIS301_Assessment_2 Part A_ Brief_Case Study Report_Identification of Issue_Module 3.2 Page 3 of 7 Referencing It is essential that you use appropriate APA style for citing and referencing research. Please see more information on referencing here https://library.torrens.edu.au/academicskills/apa/tool Submission Instructions Group submission 1. Each team will submit ONE Microsoft Word document (.doc or .docx) via the Assessment link in the main navigation menu in Blackboard. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades. Peer evaluation – Individual Submission 2. Each individual student is to submit a completed Group Participation Matrix document in the Peer Evaluation submission link. Please submit a peer review correctly, as no submission may result in zero grading for this assessment criteria. Academic Integrity Declaration We declare that except where we have referenced, the work we are submitting for this assessment task is our own work. We have read and are aware of Torrens University Australia Academic Integrity Policy and Procedure viewable online at http://www.torrens.edu.au/policies-and-forms We are aware that we need to keep a copy of all submitted material and their drafts, and we will do so accordingly. https://library.torrens.edu.au/academicskills/apa/tool http://www.torrens.edu.au/policies-and-forms MIS301_Assessment_2 Part A_ Case Study Report_Identification of Issue_Module 3.2 Page 4 of 7 Assessment Rubric Assessment attributes Fail (Unacceptable) 0-49% Pass (Functional) 50-64% Credit (Proficient) 65-74% Distinction (Advanced) 75 -84% High Distinction (Exceptional) 85-100% Knowledge and understanding of vulnerability and potential threats 30% Limited understanding of required concepts and knowledge in vulnerability and potential threats in cybersecurity. Key components of the assignment are not addressed. Adequate knowledge or understanding of vulnerability and potential threats in cybersecurity. Some of the key components of the assessment are not addressed. Thorough knowledge or understanding of vulnerability and potential threats in cybersecurity. Supports personal opinion and information substantiated by evidence from the research/course materials. All key components of the assessment are addressed with an adequate capacity to explain and apply relevant key concepts. Highly developed understanding of vulnerability and potential threats in cybersecurity. All of the key components are addressed. Well demonstrated capacity to explain and apply relevant key concepts. A sophisticated understanding of vulnerability and potential threats in cybersecurity. All of the key components are addressed. Demonstrates mastery and application of key concepts. Content, audience and purpose 10% Demonstrates no awareness of context and/or purpose of the assignment. Demonstrates limited awareness of context and/or purpose of the assignment. Demonstrates consistent awareness of context and/or purpose of the assignment. Demonstrates an advanced and integrated understanding of context and/or purpose of the assignment. Consistently demonstrates a systematic and critical understanding of context and purpose of the assignment. MIS301_Assessment_2 Part A_ Case Study Report_Identification of Issue_Module 3.2 Page 5 of 7 Assessment attributes Fail (Unacceptable) 0-49% Pass (Functional) 50-64% Credit (Proficient) 65-74% Distinction (Advanced) 75 -84% High Distinction (Exceptional) 85-100% Evaluation of information selected to support the case study 30% Limited understanding of key concepts required to support the case study. Confuses logic and emotion. Information taken from reliable sources but without a coherent analysis or synthesis. Viewpoints of experts are taken as fact with little questioning. Resembles a recall or summary of key ideas. Often conflates/confuses assertion of personal opinion with information substantiated by evidence from the research/course materials. Analysis and evaluation do not reflect expert judgement, intellectual independence, rigour and adaptability. Supports personal opinion and information substantiated by evidence from the research/course materials. Demonstrates a capacity to explain and apply relevant concepts. Identifies logical flaws. Questions viewpoints of experts. Discriminates between assertion of personal opinion and
Answered 5 days AfterMar 24, 2021MIS301Torrens University Australia

Answer To: MIS301_Assessment_2 Part A_ Brief_Case Study Report_Identification of Issue_Module 3.2 Page 1 of 7...

Shubham answered on Mar 26 2021
154 Votes
Introduction
    The study describes about the security concerns in Global Mall. The business do not use encryption for keeping the data safe and it do not have proper security system for finding vulnerability in the system. It can cause data breach and leak of sensitive information of the business. It can affect the customer experience beca
use of cyber security negligence. The cyber attack can be used for attacking system of Global Mall and it includes Varity of methods that includes use of malware, phishing and DDoS attacks.
Identification of informational assets
    The design and implementation of the security control include monitoring and designing of security controls. The knowledge statement uses an understanding of techniques that includes monitoring and implementation of security control. The security needs to be aligned for fulfilling business objectives for providing a reasonable reduction in the risk. The security objectives include ensuring the availability of information systems. It is integrated with the information that is stored in the computer system (Kumar, Raj & Jelciana, 2018). It continues discussing implementation and design for monitoring the security control. This will help in ensuring the obligation and trust requirement for information assets with the application of a privacy policy. The business impact analysis is the process that is used for establishing the material adverse events for the business. The use of network security raises the privacy and information risk that includes service provider that is used as remote access. It required ensuring the availability of the information system and the information is stored in the system.
    The policy and procedures provide the framework for capturing the management declaration and it provides with allocated responsibility and roles that are supplemented with guidance. The security is responsible for defining the information risk management for reviewing the security plan. The system access permission system includes the ability with computer resources. The logical control provides the access to programs and information. Access is activated and modified with the use of additional filers for restricting the area.
Five vulnerabilities
Use of the personal device
    The use of personal devices by employees for accessing business information can result in the leak of sensitive information. The employee may not have an effective firewall and software installed on the software that can cause loss of data. The device of the employee is vulnerable to lose, damage, and theft (Schwertner, 2017). The employee may use an outside Wi-Fi connection that is not secure to the user and is vulnerable to attacks. Another issue includes restriction by an employee because may not allow the company to access the personal information from the device. This can result in erasing of all information on the device that can cause loss of both personal and business data. The use of personal devices can decrease the productivity of the company.
No use of encryption technique
    The security of the network may get compromised and it can achieve minimum security need for regulatory checkmark. The infrastructure can become insecure and it requires the development of encryption techniques. Hackers may attack the system and it is the common cause of a security breach (Uchibeke et al. 2018). In the scenario,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here