Determine the threat types that might impact your system

Assignment Help Other Subject
Reference no: EM132941503

MIS607 Cybersecurity - Threat Model Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.
Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary

You are required write a 1500 words Threat modelling report in response to a case scenario by identifying the threat types and key factors involved. This assessment is intended to build your fundamental understanding of these key threats so that you will be able to respond/mitigate those factors in Assessment 3. In doing so, this assessment will formatively develop the knowledge required for you to complete Assessment 3 successfully.

Context

Security threat modelling, or threat modelling is a process of assessing and documenting a system's security risks. Threat modelling is a repeatable process that helps you find and mitigate all of the threats to your products/services. It contributes to the risk management process because threats to software and infrastructure are risks to the user and environment deploying the software. As a professional, your role will require you to understand the most at-risk components and create awareness among the staff of such high-risk components and how to manage them. Having a working understanding of these concepts will enable you to uncover threats to the system before the system is committed to code.

Task Instructions
1. Carefully read the attached the case scenario to understand the concepts being discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the threat model report.

3. Draw a use DFDs (Data Flow Diagrams):
• Include processes, data stores, data flows
• Include trust boundaries (Add trust boundaries that intersect data flows)
• Iterate over processes, data stores, and see where they need to be broken down
• Enumerate assumptions, dependencies
• Number everything (if manual)

• Determine the threat types that might impact your system
• STRIDE/Element: Identifying threats to the system.
• Understanding the threats (threat, property, definition)

4. The report should consist of the following structure:

A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
a) Your area of research and its context
b) The key concepts of cybersecurity you will be addressing and why you are drawing the threat model
c) What the reader can expect to find in the body of the report

The body of the report) will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the threat model report, drawing DFD and presenting the diagram by means of subheadings in the body of the report.

The conclusion will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA style for citing and referencing research.

Attachment:- Assessment Brief -Case Study.rar

Attachment:- Case Scenario.rar

Reference no: EM132941503

Questions Cloud

Would firm be better off starting the project now : Your firm is considering a project, Would your firm be better off starting the project now or waiting to start the project in a year? Explain clearly.
Industries about managing change : What can healthcare leaders learn from other industries about managing change? As a hospital CEO yourself, how would you apply this learning and set about manag
Describe the impact of internationalization : 1) Explain in depth the different reasons for and ways of growing a Small Business
How do the financials look of dominos company : 1 .How do the financials look of dominos company(Financial statement of 2020)
Determine the threat types that might impact your system : What the reader can expect to find in the body of the report and The key concepts of cybersecurity you will be addressing and why you are drawing the threat
Why business communication is critical in the workplace : The topic is "Why Business Communication is Critical in the Workplace'" it must be composed of and should mainly reflect on the concepts and principles about bu
Scope of public administration : Elaborate upon the scope of public administration while keep in view the above scenario?
What is net present value of project given sales forecasts : A firm is considering a project with a 5-year life, What is the net present value of this project given the sales forecasts and the abandonment option?
Calculate the dollar change in npv : Conduct a scenario analysis for the 5 cases specified. What is the NPV in each scenario? What is the expected (i.e. probability-weighted) NPV?

Reviews

Write a Review

Other Subject Questions & Answers

  Discuss tendencies for misuse or over-use of resources

Discuss where you have seen tendencies for misuse or over-use of resources. For example, whether the hospital or medical office tended to hoard certain kinds.

  What is the purpose of the event

Find a business outreach event in YOUR LOCAL community. What business or businesses are sponsoring the event? What is the purpose of the event?

  What do you believe are your existing blind spots

What multicultural and ethical aspects need to be considered in making decisions about competencies?

  Explain the concept of socialization

Explain the concept of socialization. Consider culture and biology and describe how, if possible, an adolescent can overcome certain socialized beliefs and behaviors when necessary,for example moving to a new country.

  Which type of hospital the va hospitals are classified

Hospitals are classified in a number of different ways. For example, the Veterans Administration (VA) hospitals are classified as which type of hospital?

  Three sociological perspectives

Compare the differences among the three major theoretical perspectives in sociology (structural-functionalism, conflict theory, and symbolic interactionism). With which theory and theorist do you find that you share similar views with and why?

  Communication message about health outbreak

Find a communication message about a health outbreak (this can be past or present) and include the link in your post.

  Dissertation topic in apa annotated bibliography

Provide five additional references related to your Dissertation topic in APA annotated bibliography format.

  Create a communication management plan

Create a communication management plan using assignment 7 template. Create a schedule/cost performance baseline for your project

  Decided to pass law requiring residents-recyclable material

Your state has decided to pass a law requiring residents to sort their trash so that recyclable material can be recovered. The purpose of the new law is not really to punish people, but rather is designed to deter people from discarding recyclable ma..

  Persuasive public speaking drama actual happenings what

persuasive public speaking? drama? actual happenings? what happened to create the trials and deaths of people in salem

  Discuss the population that the chin serves

Discuss the population that the CHIN serves. Provide an overview of the information contained in the CHIN. Explain the current operational status of the CHIN.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd