Explore and articulate cyber trends

Assignment Help Other Subject
Reference no: EM132679070 , Length: word count:1500

MIS607 Cybersecurity - Laureate International Universities

Threat Model Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.

Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.

Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary
You are required write a 1500 words Threat modelling report in response to a case scenario by identifying the threat types and key factors involved. This assessment is intended to build your fundamental understanding of these key threats so that you will be able to respond/mitigate those factors in Assessment 3. In doing so, this assessment will formatively develop the knowledge required for you to complete Assessment 3 successfully.

Context
Security threat modelling, or threat modelling is a process of assessing and documenting a system's security risks. Threat modelling is a repeatable process that helps you find and mitigate all of the threats to your products/services. It contributes to the risk management process because threats to software and infrastructure are risks to the user and environment deploying the software. As a professional, your role will require you to understand the most at-risk components and create awareness among the staff of such high-risk components and how to manage them. Having a working understanding of these concepts will enable you to uncover threats to the system before the system is committed to code.

Task Instructions
1. Carefully read the attached the case scenario to understand the concepts being discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the threat model report.

3. Draw a use DFDs (Data Flow Diagrams):
• Include processes, data stores, data flows
• Include trust boundaries (Add trust boundaries that intersect data flows)
• Iterate over processes, data stores, and see where they need to be broken down
• Enumerate assumptions, dependencies
• Number everything (if manual)

• Determine the threat types that might impact your system
• STRIDE/Element: Identifying threats to the system.
• Understanding the threats (threat, property, definition)

4. The report should consist of the following structure:

A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
a) Your area of research and its context
b) The key concepts of cybersecurity you will be addressing and why you are drawing the threat model
c) What the reader can expect to find in the body of the report

The body of the report) will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the threat model report, drawing DFD and presenting the diagram by means of subheadings in the body of the report.

The conclusion will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA style

Attachment:- Cybersecurity.rar

Attachment:- Case Scenario.rar

Reference no: EM132679070

Questions Cloud

What is the expected growth rate for the dividends : What is the expected growth rate for the dividends? Your answer should be in percentage form and should be accurate to three decimal places
Find a source for the payment of financial income : Find a source for the payment of financial income. The woman and the man each have their own apartment. The man's apartment is rented out for 200,000.
What is the required rate of return : ABC just paid a dividend of $4.45 per share. Dividends are paid annually.
What is the effective annual rate of return : You just purchased a preferred share. You paid $97.00 for the preferred share. The preferred share just paid a dividend of $4.50. Dividends are paid annually
Explore and articulate cyber trends : Build your fundamental understanding of these key threats so that you will be able to respond/mitigate those factors - Explore and articulate cyber trends
Find accurate to two decimal places : You have forecasted that there are 3 possible future states of the world. The good state will occur 45% of the time. The so-so state will occur 30% of the time
What are the cash flows associated with the machine : What are the cash flows associated with the machine. Round the answers to the nearest whole dollar. Show inflows as positives and outflows as negatives
What does he mean by given issue and do you agree : Honestly anyone can interpret that from their own point of view and understanding. It's how we can look at the bigger picture and try to understand his message.
What is the price of the stock today : What is the price of the stock today? Your answer should be accurate to two decimal places.

Reviews

Write a Review

Other Subject Questions & Answers

  Define los angeles police departments rampart crash

Research and explain the deviant actions of the Los Angeles Police Department's Rampart CRASH unit during the late 1990s

  Three different separation phases

The "Rite of Passage" has three different separation phases. The ritual chosen is the separation phase. Lose of identity is usually violent in the nature, its where people tend to separate themselves from others and society for alienation.

  Prepare a report or critique on an academic paper

Prepare a report or critique on an academic paper related to Enterprise application or designing or implementation challenges

  Use precisiontree to construct and solve a decision tree

Use PrecisionTree to construct and solve a decision tree to decide what to do. What is the best course of action, assuming that your goal is to maximize your expected winnings?

  Secret materials at the prison in a loaf

This is a Theater Class .Please answer the True/False question 1. In "Steamboat Bill Jr." Keaton hides secret materials at the prison in a loaf.

  Give an example of how the cnl influence direct patient care

The clinical nurse leader's (CNL) educational preparation consists of a master's level and has competencies in specialized health system.

  Design poster that can be put on the wall of the staff room

Design a poster that can be put on the wall of the staff room, kitchen and other place around the BizOps offices to promote diversity in the workplace

  Design a correlational and experimental study investigating

Design a correlational and experimental study investigating the relationship between these two variables-time spent playing video games and aggression.

  What cultural barriers have been erected by germans

After watching the video, Muslims in Germany (http://video.pbs.org/video/1559885543), explain why you think Muslims have been seen and treated as foreigners within Germany. What cultural barriers have been erected by Germans against Muslims?

  Describe the difference between depression and bipolar

Describe the difference between depression and bipolar disorder. Be sure to include a description of the clinical characteristics of each from your readings.

  How did darwin origin of species change the way naturalists

How did Darwin's Origin of Species change the way naturalists thought about nature and the relationship between humans and nature

  Create a chart evaluating three age-related stereotypes

Create a chart evaluating three age-related stereotypes listing evidence that supports the stereotype (if it exists) and evidence that contradicts the stereotype

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd