Documenting a systems security risks

Assignment Help Other Subject
Reference no: EM132845926 , Length: word count:1400

MIS607 Cybersecurity - Torrens University

Assessment - Threat Model Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.

Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.

Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary

You are required write a 1500 words Threat modelling report in response to a case scenario by identifying the threat types and key factors involved. This assessment is intended to build your fundamental understanding of these key threats so that you will be able to respond/mitigate those factors in Assessment 3. In doing so, this assessment will formatively develop the knowledge required for you to complete Assessment 3 successfully.

Context
Security threat modelling, or threat modelling is a process of assessing and documenting a system's security risks. Threat modelling is a repeatable process that helps you find and mitigate all of the threats to your products/services. It contributes to the risk management process because threats to software and infrastructure are risks to the user and environment deploying the software. As a professional, your role will require you to understand the most at-risk components and create awareness among the staff of such high-risk components and how to manage them. Having a working understanding of these concepts will enable you to uncover threats to the system before the system is committed to code.

Task Instructions

1. Carefully read the attached the case scenario to understand the concepts being discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the threat model report.

3. Draw a use DFDs (Data Flow Diagrams):
• Include processes, data stores, data flows
• Include trust boundaries (Add trust boundaries that intersect data flows)
• Iterate over processes, data stores, and see where they need to be broken down
• Enumerate assumptions, dependencies
• Number everything (if manual)
• Determine the threat types that might impact your system
• STRIDE/Element: Identifying threats to the system.
• Understanding the threats (threat, property, definition)

4. The report should consist of the following structure:

A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
a) Your area of research and its context
b) The key concepts of cybersecurity you will be addressing and why you are drawing the threat model
c) What the reader can expect to find in the body of the report

The body of the report) will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the threat model report, drawing DFD and presenting the diagram by means of subheadings in the body of the report.

The conclusion will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA style.

Attachment:- Threat Model Report.rar

Reference no: EM132845926

Questions Cloud

Find the equation of the least squares line : Below are the weights (in pounds) and amounts of roadside fuel consumed (in mi / gal) of randomly chosen cars. Is there a linear correlation
What proportion of the entire voting population : Out of 200 people sampled, 170 preferred Candidate A. Based on this, estimate what proportion of the entire voting population (p) prefers
What is the likelihood of a h2s release per year : A company that owns and operates 123 identical facilities and corporate risk management has identified that 17 releases of hydrogen sulfide
What is the standard error of the sample mean : A random sample of 16 computer chips is taken. What is the standard error of the sample mean?
Documenting a systems security risks : Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies
Probability that randomly selected credit card holder : What is the probability that a randomly selected credit card holder has a credit balance less than K2500
Compute the new least-squares regression line : Compute the new least-squares regression line based on the sample of size 19. Look at this fitted regression line. How does the least-squares line change?
What is the probability that she will live beyond : Suppose that the probability of living to be older than 70 is .6 and the probability of living to be older than 80 is .2. If a person reaches her 70th birthday
Discuss the headline or the opening sentence of the article : Discuss the headline or the opening sentence of the article as it relates to your answer for part b.

Reviews

Write a Review

Other Subject Questions & Answers

  Discuss the issue of rights and responsibilities

Discuss the issue of rights and responsibilities: Is it acceptable to link rights and responsibilities? Why or why not?

  Strategic quality management and customer satisfaction paper

Write a 1,400- to 2,100-word paper in which you discuss the strategic position, quality management approach, and customer satisfaction measurements within a company. Complete the following:

  Identify evidence-based strategies for the organization

Write for your organization a 3page impact report regarding the health concerns of a new immigrant population. Describe the population's health concerns.

  Discuss about perceptions of current economic conditions

Is there a relationship between perceptions of current economic conditions and extent of a democracy? Using Afrobarometer 2015, please provide.

  Due process vs. crime control, consensus or conflict model

Regardless of the philosophical approach one embraces with regard to the criminal justice system (due process vs. crime control, consensus or conflict model, or individual rights vs. public order), the police, courts, and correctional components m..

  Which aspect of community organizing promotora model address

Do you think the promotora model is successful? Please explain. Which aspects of community organizing does the promotora model address?

  Data collection is the use of referral sampling

Explain the approach to data collection is the use of referral sampling, in which the researcher chose a specific online university community,

  Career opportunities of a health information management

Write a paper about your job as a Director of Health Information Management. What topics would you include in your presentation? What would you include in the brochure that addresses educational requirements and career opportunities of a health in..

  What are the unintended consequences of financial innovation

What are the unintended consequences of financial innovation?

  Accurate regarding adolescents

The "graying of America" has been created by a combination of which of the following factors? Which statement is least accurate regarding adolescents? Visible signs of ________ include things like wrinkles and grey hair.

  What is the evidence that the observer rat learned

What is the evidence that the observer rat learned something? What would you expect if they didn't learn anything?

  Company credit card for personal expenses

You are an engineering office manager and one upper-level manager has repeatedly used the company credit card for personal expenses.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd