Reference no: EM132954331 , Length: word count:4200
CIS4012 Hacking the Human - Teesside University
Assignment - Analysis and discussion of ‘Wholesome Growing' socially engineered hacking scenario.
Learning outcome 1: Distinguish between different human behaviours relevant to online activities
Learning outcome 2: Appraise the ethical issues that underpin human behaviour modification issues in an organisation
Learning outcome 3: Propose human behaviour interventions to mitigate against a cybersecurity threat targeting humans
Learning outcome 4: Appraise social engineering threats to individuals and organisations
Learning outcome 5: Compose cybersecurity solutions to address the needs of an organisation that takes into account the ‘human factor'
Learning outcome 6: Evaluate different cybersecurity threats to an organisation from the perspective of human behaviour analysis
The ICA will take the form of a case study of a fictional company but that is based on real-world incidents (see Appendix 1 for the scenario) involving a cybersecurity breach(s) that originated through a social engineering attack vector or vectors. You are required to write a report of between 4000-5000 words that will analyse the attack, propose solutions and discuss the ethical issues around the case study.
Part 1
You MUST analyse this case study using one of the frameworks, taxonomies or ontological approaches we have looked at in the module. You are not confined to using one of these approaches, but you can identify an alternative approach through your own reading and research, but you must make it clear in the introduction to your report which approach you are utilizing for your analysis.
Your analysis could include, for example, the following:
a) What is the attack vector?
b) What channel(s) was used
c) Who is the operator or actor who originated the attack?
d) What approach(es) did they use?
e) What human weakness or attribute were they targeting?
What you actually include in your analysis of the breach(s) will depend largely on the analysis approach you choose to use. You should include a brief paragraph at the end of this section that discusses and evaluates the analysis approach you chose (i.e. How easy was the approach to apply? Do you think it identified all the important elements of the attack(s)? Would you use the same approach again? etc)
Part 2
After you have analysed the breach(s) you should propose appropriate solutions that would help mitigate against similar issues occurring again in the future for the "organisation" at the heart of the case study. Your proposals should align with your findings from the analysis and should be supported by research and reading done in this area. Your recommendations should reflect the complexity of the research findings in this area (e.g. one type of training approach might not be appropriate for everyone in an organisation)
Part 3
In this section you should discuss the ethical and morality issues of using human behaviour analysis and modification techniques within an organisation. Again, your discussion should be supported by appropriate reading and research in this area.
The Report
Your report should be written in the 3rd person and be neatly presented with correctly numbered sections and sub-sections plus a front page and table of contents. I expect to see a high standard of written English commensurate with master's level work, with few spelling and proof-reading errors. If you feel you need help with your report writing skills I suggest that you use the Learning and Research Support delivered through the Library.
You should use the University's standard Harvard approach to referencing as laid out in the book Cite them Right by Pears and Shield. This is best accessed as electronic resource via the University Library website.
Support
You will be given the opportunity to work on aspects of the assignment in the practical classes in the second half of the module and you are advised to use this time to seek formative feedback on your work to-date. In respect of reading draft work the following conditions will apply:
1. A deadline will be set after which draft work will not be reviewed: this deadline is 9am Thursday 7th January 2021
2. We will look at one draft of a report only and comment on this for instances of obvious errors, omissions or inaccuracies (i.e. issues that may result in the report failing), you cannot keep submitting drafts for review.
3. We cannot and will not give an indicative grade (University Regulations do not allow us to do this)
4. Nor will we tell you what you need to keep adding to your work in order to get a distinction!
5. In addition, we will look at parts (e.g. paragraphs) of work in the practical sessions in response to specific questions on clarification of issues/points etc. There is no restriction on this & indeed we would encourage you to do this.
Information Security education
Nudging
Information security training
Information security policies
add security recommendations covering these points, dont just describe them add real information....
Attachment:- Hacking the Human.rar