Draw a use data flow diagrams

Assignment Help Other Subject
Reference no: EM132944503 , Length: word count:1400

MIS607 Cybersecurity - Threat Model Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.
Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary

You are required write a 1500 words Threat modelling report in response to a case scenario by identifying the threat types and key factors involved. This assessment is intended to build your fundamental understanding of these key threats so that you will be able to respond/mitigate those factors in Assessment 3. In doing so, this assessment will formatively develop the knowledge required for you to complete Assessment 3 successfully.

Context
Security threat modelling, or threat modelling is a process of assessing and documenting a system's security risks. Threat modelling is a repeatable process that helps you find and mitigate all of the threats to your products/services. It contributes to the risk management process because threats to software and infrastructure are risks to the user and environment deploying the software. As a professional, your role will require you to understand the most at-risk components and create awareness among the staff of such high-risk components and how to manage them. Having a working understanding of these concepts will enable you to uncover threats to the system before the system is committed to code.

Task Instructions
1. Carefully read the attached the case scenario to understand the concepts being discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the threat model report.

3. Draw a use DFDs (Data Flow Diagrams):
• Include processes, data stores, data flows
• Include trust boundaries (Add trust boundaries that intersect data flows)
• Iterate over processes, data stores, and see where they need to be broken down
• Enumerate assumptions, dependencies
• Number everything (if manual)

• Determine the threat types that might impact your system
• STRIDE/Element: Identifying threats to the system.
• Understanding the threats (threat, property, definition)

4. The report should consist of the following structure:

A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
a) Your area of research and its context
b) The key concepts of cybersecurity you will be addressing and why you are drawing the threat model
c) What the reader can expect to find in the body of the report

The body of the report) will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the threat model report, drawing DFD and presenting the diagram by means of subheadings in the body of the report.

The conclusion will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA style for citing and referencing research.

Attachment:- Threat Model Report.rar

Reference no: EM132944503

Questions Cloud

Describe how to plate the dessert with artistic flair : Describe how to plate the dessert with artistic flair. Include any garnishes or decorations.
What is company long service leave liability relating Sala : Her current salary is $50,000. Salaries are expected to grow by 2% for the next 5 years. What is company long service leave liability relating Sala
What is the impact of nafta on north american middle class : What is the impact of NAFTA on North American middle class or small business; how did they get adversely impacted?
What makes a good problem if it is for consulting : 1. What makes a good problem if it is for a case study?
Draw a use data flow diagrams : Draw a use Data Flow Diagrams - The key concepts of cybersecurity you will be addressing and why you are drawing the threat model
What amount of amortization expense would the lessee record : The asset is recorded at $820000 and has an economic life of 8 years. What amount of amortization expense would the lessee record for the first year of lease
Record a tabular summary to record the sale : Blossom Company issued $455,000, 15-year, 8% bonds at 96. (a) Record a tabular summary to record the sale of these bonds on January 1, 2022
Determine the taxpayer current-year economic income : Determine the taxpayer's current-year (1) economic income and (2) gross income for tax purposes from the following events
Discuss Securities and Privacy issue of Financial Technology : Discuss the Securities and Privacy issues of Financial Technology (FinTech) and how FinTech will revolutionize the future of banking industries

Reviews

Write a Review

Other Subject Questions & Answers

  Determine the minimum required copper wire size to power

Determine the minimum required copper wire size to power a 28VCD motor that uses 40 Amps and is 25 feet from the bus bar (nearest power source).

  What is the break-even probability of default

What is the average collection period for One Potato Two Potato and What is the break-even probability of default

  Strategic focus on the external environment

Adaptability culture is basically characterized by strategic focus on the external environment through flexibility and the change to literally meet the customer

  Define synesthesia and discuss what you have learned

Define synesthesia and discuss what you have learned about this neurological condition.What do you think causes synesthesia to occur in these individuals?

  Explain what effect of a bystander in a potential reduction

Consider the phenomenon of pain. Ethics committees, What is the effect of a bystander in a potential reduction of number of sexual assault?

  Describe evidence about the issues supported by resources

Write a 750-1,000-word policy brief that summarizes the issue, explains the effect on the population, and proposes a solution to the issue. Follow this outline.

  Examine what claim descartes process of doubting

Examine what you claim to know about yourself light of Descartes' process of doubting. Is your piece of knowledge subject to doubt by the Dream Argument?

  Preparation for assessing mental illness in adolescence

Reflect on each of the categories listed in the Assignment Preparation for Assessing Mental Illness in Adolescence: Bullying & , particularly on the issues.

  Account of the meaning of human existence

In what different ways do the existentialist philosophers Kierkegaard and Sartre use the notions of love and sexual relations (sexual desire) to provide an account of the meaning of human existence?

  Illegal immigration is certainly a hot topic

Illegal Immigration is certainly a hot topic and one that resonates with me because of my career. You can go to any major city in the U.S. and find them in the tens of thousands (or more) and just about any smaller city in the U.S.

  Discuss the importance of timestamping server

Explain the importance of demonstrating that a forensic process was followed to a criminal or civil case.

  Pulmonary valve stenosis is suspected in a patient

Pulmonary valve stenosis is suspected in a patient. The right ventricle has a maximum cross-sectional area of 1.8 cm2. From echocardiography, the velocities in the right ventricle and across the pulmonary valve are 0.4 m/s and 1.2 m/s respectively.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd