Develop the ability to assess information security challenge

Assignment Help Other Subject
Reference no: EM132509737 , Length: word count:5000

Assignment structure

The assignment is to develop your academic and professional skills throug a series of challenges where you will need to put into practice key knowledge and transferable skills. The assignment will be a critical report type document. You should spend sufficient time studying on your own. Yo need to demonstrate critiquing, logical argument, use of evidence, appropriate citing and referencing, knowledge of research design, and use of good English to ensure high grades.

1. Submit a report with wordcount of not more than 5000 words with t following structure:
Imagine you have managerial responsibilities at a hypothetical compan that deals with big data.
a) Provide a description of the company and its organisational structu including the security personnel (Suggested length 400--600 words
b) Recently, an employee has forwarded the following email hoax to all the other employees.

HOW TO PROTECT YOUR EMAIL ADDRESS BOOK

I learned a computer trick today that is really ingenious in its simplicity. I received it from a friend.

As you may know, when/if a worm virus gets into your computer it heads straight for your e-mail address book, and sends itself to everyone in there, thus infecting all your friends and associates. This trick won't keep the virus from getting into your computer, but it will stop it from using your address book to spread further, and it will alert you to the fact that the worm has gotten into your system.

Here's what you do: first, open your address book and click on "new contact", just as you would do if you were adding a new friend to your list of e-mail addresses. In the window where you would type your friend's first name, type in "AAAAAAA", Also use address [email protected]

Now, here's what you've done and why it works: The name AAAAAAA will be placed at the top of your address book as entry #1. This will be where the worm will start in an effort to send itself to all your friends. But, when it tries to send itself to AAAAAAA, it will be undeliverable because of the phony e-mail address you entered. If the
first attempt fails (which it will because of the phony
address), the worm goes no further and your friends will not be infected.

Here's the second great advantage of this method: If an e- mail cannot be delivered, you will be notified of this in your INBOX almost immediately. Hence, if you ever get an e- mail telling you that an email addressed to AAAAAAA could not be delivered, you know right away that you have the worm virus in your system. You can then take steps to get rid of it!

Pretty slick, huh? If everybody you know does this then you need not ever worry about opening mail from family or friends.

While the employee acted with good intentions, analyse why this strategy may not be useful against worms. In fact, the strategy may also be dangerous. Explain why this is the case. Prepare an Issue Specific Policy for your company to deal with email hoaxes and scams such as the one above (1000-1200 words). Your policy should contain a description of what hoaxes and scams are, provide useful examples of hoaxes and scams to make users aware of the problem and describe strategies to deal with email scams/hoaxes in your
company. The following web site may be a useful starting point: https://www.hoax-slayer.com/.

c) Describe three threats that your company could face and explain how some of the issues are specific to big data (500--700 words)
d) Provide details of risk management identification and assessment f your company (800--1000 words). Address the three threats from 1(c).
e) Explain how you would use machine-learning techniques to addres threats within your company. What are the challenges in using machine learning for security? (800--1000 words).
This is an individual assignment. You can offer your drafts to others for criticism and advice, but the submitted work must be your own. Please ensure you have not simply copied the work of another student or plagiarised from any other source(s). TurnitIn will be used to detect plagiarism and reports with a similarity index of more than 15-20% will likely be penalised. The ideas and work of others must always be identified and appropriately referenced. A viva voce may be used to assess your knowledge.

Learning outcome 1. Demonstrate a critical understanding of information security policies and strategies relevant to the management of big data in the context of data science, as well as the importance of big data to cyber security.

Learning outcome 2: Develop the ability to assess information security challenges/issues in the context of data science and advise on the adoption of relevant strategies, tools and best practices to address them.


Attachment:- Assignment structure.rar

Reference no: EM132509737

Questions Cloud

Calculate the expected return and standard deviation : Based on the following information, calculate the expected return and standard deviation for two stocks:
Incorporate social technology : Magenta Multimedia has decided to incorporate social technology into its business to maintain its competitive advantage. It would like to use technologies
Determining the overall stock market : The CFO of firm NIC Inc. failed to disclose the lavish perks afforded to its former CEO. Specifically, NIC Inc. paid for the restoration of the former CEO's
Compute Dows earnings per share : On February 28, 2018, Dow sold 51,000 common shares in keeping with its long-term share repurchase plan, Compute Dow's earnings per share
Develop the ability to assess information security challenge : Develop the ability to assess information security challenges/issues in the context of data science and advise on the adoption of relevant strategies, tools
Find decreasing inventory levels by producing less : If a manager's bonus is tied to operating income, then decreasing inventory levels by producing less compared to last year would result in
How the transactions will affect the accounting equation : Show how the above transactions will affect the accounting equation and enter how the accounts in the general Leger will be affected
Calculate the macaulay duration : Calculate the Macaulay duration of an 8%, $1,000 par bond that matures in three years if the bond's YTM is 14% and interest is paid
About the importance of shaping culture : You learned about the importance of shaping culture and how it is a critical function of leadership.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd