Reference no: EM132509737 , Length: word count:5000
Assignment structure
The assignment is to develop your academic and professional skills throug a series of challenges where you will need to put into practice key knowledge and transferable skills. The assignment will be a critical report type document. You should spend sufficient time studying on your own. Yo need to demonstrate critiquing, logical argument, use of evidence, appropriate citing and referencing, knowledge of research design, and use of good English to ensure high grades.
1. Submit a report with wordcount of not more than 5000 words with t following structure:
Imagine you have managerial responsibilities at a hypothetical compan that deals with big data.
a) Provide a description of the company and its organisational structu including the security personnel (Suggested length 400--600 words
b) Recently, an employee has forwarded the following email hoax to all the other employees.
HOW TO PROTECT YOUR EMAIL ADDRESS BOOK
I learned a computer trick today that is really ingenious in its simplicity. I received it from a friend.
As you may know, when/if a worm virus gets into your computer it heads straight for your e-mail address book, and sends itself to everyone in there, thus infecting all your friends and associates. This trick won't keep the virus from getting into your computer, but it will stop it from using your address book to spread further, and it will alert you to the fact that the worm has gotten into your system.
Here's what you do: first, open your address book and click on "new contact", just as you would do if you were adding a new friend to your list of e-mail addresses. In the window where you would type your friend's first name, type in "AAAAAAA", Also use address [email protected]
Now, here's what you've done and why it works: The name AAAAAAA will be placed at the top of your address book as entry #1. This will be where the worm will start in an effort to send itself to all your friends. But, when it tries to send itself to AAAAAAA, it will be undeliverable because of the phony e-mail address you entered. If the
first attempt fails (which it will because of the phony
address), the worm goes no further and your friends will not be infected.
Here's the second great advantage of this method: If an e- mail cannot be delivered, you will be notified of this in your INBOX almost immediately. Hence, if you ever get an e- mail telling you that an email addressed to AAAAAAA could not be delivered, you know right away that you have the worm virus in your system. You can then take steps to get rid of it!
Pretty slick, huh? If everybody you know does this then you need not ever worry about opening mail from family or friends.
While the employee acted with good intentions, analyse why this strategy may not be useful against worms. In fact, the strategy may also be dangerous. Explain why this is the case. Prepare an Issue Specific Policy for your company to deal with email hoaxes and scams such as the one above (1000-1200 words). Your policy should contain a description of what hoaxes and scams are, provide useful examples of hoaxes and scams to make users aware of the problem and describe strategies to deal with email scams/hoaxes in your
company. The following web site may be a useful starting point: https://www.hoax-slayer.com/.
c) Describe three threats that your company could face and explain how some of the issues are specific to big data (500--700 words)
d) Provide details of risk management identification and assessment f your company (800--1000 words). Address the three threats from 1(c).
e) Explain how you would use machine-learning techniques to addres threats within your company. What are the challenges in using machine learning for security? (800--1000 words).
This is an individual assignment. You can offer your drafts to others for criticism and advice, but the submitted work must be your own. Please ensure you have not simply copied the work of another student or plagiarised from any other source(s). TurnitIn will be used to detect plagiarism and reports with a similarity index of more than 15-20% will likely be penalised. The ideas and work of others must always be identified and appropriately referenced. A viva voce may be used to assess your knowledge.
Learning outcome 1. Demonstrate a critical understanding of information security policies and strategies relevant to the management of big data in the context of data science, as well as the importance of big data to cyber security.
Learning outcome 2: Develop the ability to assess information security challenges/issues in the context of data science and advise on the adoption of relevant strategies, tools and best practices to address them.
Attachment:- Assignment structure.rar