Reference no: EM132630408 , Length: word count:1800
COMP7701 Advanced Enterprise Security - Flinders University
Assignment overview:
Cybersecurity has the potential to impact upon us all and on every aspect of business around the world. For any enterprise security mechanism to be effective we must know what we are trying to secure against. This assignment asks you to consider the current trends in enterprise focussed cybersecurity and research emerging threats, exploit mechanisms, vulnerabilities, protections and impact on the information assets of an organisation.
Tasks:
• Read the assigned case and ask any questions to clarify the requirements if needed.
• Perform a literature review to understand the assigned case and gather evidence upon which to develop your report.
• Write a report aimed at an audience of your topic peers to explain the background and technical terms used in the case, inform them of the threats and impact of the assigned case, and convince them that the suggested protective mechanisms are appropriate.
• Prepare and submit a Pdf file of no more than 6 pages including references.
Abstract
This must accurately reflect the content of your report and must present the main findings of your investigation to encourage the reader to read the whole report. Maximum one half page
Body Introduction
Introduce the report, define its scope and state any assumptions. Discuss the background of the topic and/or definitions of terms and technologies as required.
Body Main content
The content text must be logically structured and include appropriate in- text references to support your arguments throughout the entire report. References should predominantly include peer reviewed books, journal articles, and conference papers from the past 5 years.
Body Conclusion or recommendations (as appropriate for your case).
References
A full list of all references, formatted using any standard referencing style. It is recommended that Endnote is used to manage references
Format
This report should be no more than 6 pages (Including references and diagrams) and must include page numbers and your name and FAN on every page.
Case - Data ownership : Russia's ISPs are now required to store both the metadata and content of communications, and hand over encryption keys for any encrypted data. Any cloud data passing through an ISP can become readable by Russia's government and intelligence services. This had the immediate fallout of some popular VPNs closing their Russian nodes, and in at least one known case servers were seized from the VPN provider under this law. Business data outside of the home geographic jurisdiction may be vulnerable to exploit that is beyond the expected risk environment. Find and discuss global case studies on the geographic threats to corporate and personal information and the safeguards that are in place to protect data in transit.