Reference no: EM132845942 , Length: word count:3000
COM713 Cyber Security Application - Solent University
Cyber Security Application Portfolio
Assessment Task
A Portfolio is a way of demonstrating your learning by giving examples from each of the weekly learning sub-modules. These can include written descriptions of a practce, screenshots , terminal outputor ther evidence of knowledge or skills. In other words, your portfolio should contain about 7 to 10 headings corresponding to the concepts in the weekly schedule.
As a motive to writing your portfolio imagine a context, like a company or organisation you work for. For example consider the following scenario (you can pick another if you like as a frameork for your system security portfolio):
Pandemic Watch is a crowsourced medical early-warning organisation supplying analysis of reported disease outbreaks, and giving press reports of fact checked health emergencies for government or NGO use. Data sources may come from GPs, epidemiologists and sensitive (leaked) information from other sources whose anonymity may need protecting. The organisation has many potential threat vectors, enemies, foreign and domestic, online and offline, thus the organisation is a high exposure target for disinformation and manipulation
As a member of the software security and privacy task force you are to audit and make recommendations for the transformation of their systems, policies and processes.
Alternatively you may choose your own fictional organisation with complex digital security needs - but you will need to explain why these risks are real in your analysis
Scope
You are to consider the areas of:
• Data storage, integrity, privacy, compliance.
• Secure communication for both organisational staff and clients
• System hardening, including servers, offices, and mobile devices
• Personnel and operational security
Your portfolio should include an understanding and appreciation of a range techniques related to the principles and technologies of cyber security in practical application. In particular you should demonstrate awareness of:
• Threat and vulnerability modelling, risk prioritisation
• Anticipation of emerging threats
• Access control, authorisation
• Defensive system design principles, in depth and breadth
• Scope, lifecycle, maintenance and sustainability
• Technologies, options for technical implementation
• Encryption for communications and storage
• Policies , monitoring, response plans
• Cost, roles, skills and human resources
• Trade-offs, compromises and push-backs
Presentation
A 3000 word concise technical report will for the basis of your portfolio, and it may include screenshots, terminal logs, tables, lists, flow diagrams, or any other appropriate graphics or formulae summarising key techniques and considerations. Emphasise the practical execution of auditing and hardening tasks and comment on difficulties or lessons learned.
Attachment:- Cyber Security Application.rar