Discuss potential damages the threats could cause

Assignment Help Computer Network Security
Reference no: EM131960779

Network Security Assignment: Identifying and combating emerging threats in Information Systems

Purpose of the assessment (with ULO Mapping)

Identify common emerging threats, attacks, mitigation and countermeasures in networked information systems

Length: 1000 - 1500 words.

Submission Guidelines

- The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.

- Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Extension

• If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment.

Academic Misconduct

• Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.

Assignment Description

Objective of this assessment is to identify common emerging threats, attacks, mitigation and countermeasures in networked information systems.

Your deliverable for this assessment is to write a report for any ONE of the following topics:

-Cyber security
- Internet of Things
-Cloud security
-Mobile health devices
-Bring Your Own Device
-Artificial Intelligence
-Other (discuss with your Tutor)

Provided Scenario

You have been hired as an IT Security Consultant for Gigantic Corporation (your specialisation is based on the topic you have chosen above). Your role is to liaise between business stakeholders and technologists, translating potential emerging threats and attacks faced by Corporation and providing feasible countermeasures so corporation can take security decisions more effectively.

How to complete this task:

-You will write a report on any one of the topic based on the above scenario.

- Your report must be a Microsoft Word document, 1000 - 1500 words, 12 point font and single spacing.

-Discuss your research findings with valid scholarly sources and include table/graphs to support your arguments.

The report must address the following criteria:

- An Executive Summary at the beginning of the report which provides a clear statement of the emerging threats and attacks being assessed.

- Identify and explain emerging threats agents based on vulnerabilities and consequences derived from Networked Information Systems and any existing industry recommendations for the selected topic.

- Discuss potential damages these threats and vulnerabilities could cause if exploited.

- What are the challenges and issues faced by corporation to control these threats?

- Provide detail mitigation and countermeasure strategies that will impact the networked information system.

Reference no: EM131960779

Questions Cloud

Reserve ration in the banking system : Suppose that the target money reserve ration in the banking system is 20 percent, there is no cash drain
By how much will you overvalue the firm : By how much will you overvalue the firm if its beta is actually 2.1? (Do not round intermediate calculations. Round your answer to 2 decimal places.)
Account to chequing account : If you transfer $100 from your saving account to your chequing account, M1 increases by $100 but M2 does not change. Why?
What would be the expected return of the portfolio : If you want to put together a portfolio consisting of 40% Company A stock and 60% Company B stock, what would be the expected return of this portfolio?
Discuss potential damages the threats could cause : Discuss potential damages these threats and vulnerabilities could cause if exploited. What are the challenges and issue faced by corporation to control threats?
Ip address allocation plan for key network device : CSC00240 – Data communication and Networks - IP address allocation plan for each network/sub-network including network address, subnet mask, broadcast address
Indicate the change to global book value of equity : Consider the following potential events that might have occurred to Global on December 30, 2013. For each one, indicate which line items in Global's balance.
What is the cost of the portfolio : Consider the following portfolio: - Long 3 calls with strike price 98.0 and price 21.278 - Short 0 calls with strike price 98.0 and price 21.278.
Explain how the number of page faults depends on page size : In this lab you will simulate demand paging and see how the number of page faults depends on page size, program size, replacement algorithm, and job mix.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd