Forensic investigation of prominent cyber offences

Assignment Help Other Subject
Reference no: EM132500276 , Length: word count:3500

CIS7028 Information Security - Cardiff Metropolitan University

Learning Outcome 1: Critically discuss the threats to information storage within a system and appreciate the main types of computer crime
Learning Outcome 2: Appraise approaches to information security and forensic investigation of prominent cyber offences;
Learning Outcome 3: Analyse the technical issues relating to the transmission and storage of data and information relating to Cloud Computing and Big Data
Learning Outcome 4: Discriminate between data management policies associated with Data Protection and the Regulation of Investigatory Powers.

Assessment Requirements

Task 1 (2000 words):Choose one of the activities described below.

Activity 1

Assume you have been hired as a security consultant by a large scale enterprise to provide them below information and recommendations. The enterprise's Chief Information Officer (CIO) has recently come to know about ISO27001 and wants to know your opinion about alternative standards, its wider benefits to the organization, how to implement the critical elements of ISO27001 and auditing and certification process. Prepare a report covering below details.

Task 1.1 (750 words):
• Alternative standards (Cyber essentials) and wider benefits of ISO27001 to the organization

Task 1.2 (1000 words):
• Main clauses need to implement under ISO27001 (750 words)
• Security control objectives applicable for the chosen company (250 words)

Task 1.3 (250 words):
• Auditing and certification process of ISO27001

OR

Activity 2 (2000 words)
Data protection by design/default: Compile a report explaining how you would implement Data protection by design and defaultfor a chosen company. The company can be any size which holds personal data of customers, clients, suppliers and employees.
Task 2.1 (1000 words):
• The implementation of Data Protection by Design and Default for the chosen company
Task 2.2 (1000 words):
• The use of below mechanisms for the chosen company to implement data protection by design and default: Data discovery, Data classification, Data Processing Impact Assessment (DPIA), Data Loss Prevention (DLP) mechanisms and Privacy Enhancing Technologies (PETs)

Task 2 (1500 words):Write a report about a recent information security attack/breach (which took place recently, January 2019 onwards). Thedescription should contain a brief description of the attack, loss to the organization, details of the vulnerability exposed by the attack (e.g.; CVE), how the attack was manifested (e.g. illustration), the tools used by the attackers and prevention mechanisms which could have stopped the threat or the vulnerability. Sample References:

Task 3 (Continuous assessment using 8 Cisco Cyber Essential labs and immersive labs): Security awareness (Cisco Cyber security essentials training). Students has to complete 8 Chapters of above training (both theoretical and practical aspects) during tutorials and average mark of chapter Quizzes will be taken into account. Students has to complete the final quiz as well. In addition, immersive labs has to be completed by the students.

Attachment:- Information Security.rar

Reference no: EM132500276

Questions Cloud

Marginal costs of installing another terminal : What are the marginal costs of installing another terminal at a location?
Find and plot the data in the order of the dates : Plot the data in the order of the dates. (To earn full credit for this graph you must plot all required points for each curve. While plotting the points a tool.
Application of contemporary analytical methods : Demonstrate your critical understanding of the need for self-awareness and continuing self-development - Developing Global Management Competencies
Short-run and long-run effects of a shift in demand : Suppose that the shrimp industry is in long-run equilibrium at a price of $5 per pound of shrimp and a quantity of 50 million pounds per year.
Forensic investigation of prominent cyber offences : Discriminate between data management policies associated with Data Protection and the Regulation of Investigatory Powers - discuss the threats to information
Discuss the main approaches to leadership and performance : Drawing upon relevant theory from the module, critically discuss the main approaches to leadership and performance. By using examples of specific organisations.
Name-brand aspirin and generic aspirin for a consumer : 1. Draw two typical indifference curves for each of the following cases. What is the MRS in each case?
Describe the challenges of the structure of your proposal : This discussion is intended to help you grapple with the benefits and challenges of the structure of your proposal for a new program in a nonprofit organization
Marginal rate of substitution : Consumers in Georgia pay twice as much for avocados as they do for peaches. However, avocados and peaches are the same price in California.

Reviews

Write a Review

Other Subject Questions & Answers

  How your design is suite to answering your research question

Discuss how your design is suited to answering your research question. Describe your research design in words, illustrating how you will conduct your research, your participants, a realistic site, and so on.

  Difference between a centralized and a decentralized economy

What is the difference between a centralized and a decentralized economy?

  Develop a work breakdown structure for your problem

Develop a work breakdown structure (WBS) for each of your two or three alternative solutions to your performance problem. The link at the end of this paragraph leads to the IT Economics WBS reading.

  What specific stressors might you expect to find

What specific stressors might you expect to find in an early childhood setting? How might you alleviate these stressors?

  The involvement of the criminal justice system

Evaluate the beginning and end of the involvement of the criminal justice system in this scenario.

  Develop the tools necessary to educate project participants

Develop the tools necessary to educate project participants and to evaluate project outcomes (surveys, questionnaires, teaching materials, PowerPoint slides, et

  What is the definition of culture

What is the definition of culture? How does one become part of a culture? Is societal culture based in genetics or environment? How so? What is cultural sensitivity? How does it affect international business?

  Identify the business in your local community

Describe a business in your local community. This can be your current place of employment or a business with which you are familiar.

  Discuss about the ground water pollution

Justify if the term represents an obstacle to that goal, or perhaps a technique or technology that might promote it. Suggest two specific actions we can take.

  How do these strength aid to you in both good and bad times

In a two page paper, report your top three strengths and how these particular strengths might benefit your cognitive, emotional, and behavioral health. For example, how do these strength aid to you in both good and bad times? Do you rely on these ..

  Why were these laws passed

Why were these laws passed?How are they enforced?Do you believe they are a good idea? Explain.

  Explain ecomonic if both parents work

Explain ecomonic if both parents work and children have to go to day caremoney wise togetherness wise and what is most important to the family

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd