How you will structure your ideas for the threat model

Assignment Help Computer Network Security
Reference no: EM132941465 , Length: 1500 Words

MIS607 Cybersecurity - Threat Model Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.
Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary

You are required write a 1500 words Threat modelling report in response to a case scenario by identifying the threat types and key factors involved. This assessment is intended to build your fundamental understanding of these key threats so that you will be able to respond/mitigate those factors in Assessment 3. In doing so, this assessment will formatively develop the knowledge required for you to complete Assessment 3 successfully.

Context

Security threat modelling, or threat modelling is a process of assessing and documenting a system's security risks. Threat modelling is a repeatable process that helps you find and mitigate all of the threats to your products/services. It contributes to the risk management process because threats to software and infrastructure are risks to the user and environment deploying the software. As a professional, your role will require you to understand the most at-risk components and create awareness among the staff of such high-risk components and how to manage them. Having a working understanding of these concepts will enable you to uncover threats to the system before the system is committed to code.

Task Instructions
1. Carefully read the attached the case scenario to understand the concepts being discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the threat model report.

3. Draw a use DFDs (Data Flow Diagrams):
• Include processes, data stores, data flows
• Include trust boundaries (Add trust boundaries that intersect data flows)
• Iterate over processes, data stores, and see where they need to be broken down
• Enumerate assumptions, dependencies
• Number everything (if manual)

• Determine the threat types that might impact your system
• STRIDE/Element: Identifying threats to the system.
• Understanding the threats (threat, property, definition)

4. The report should consist of the following structure:

A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
a) Your area of research and its context
b) The key concepts of cybersecurity you will be addressing and why you are drawing the threat model
c) What the reader can expect to find in the body of the report

The body of the report) will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the threat model report, drawing DFD and presenting the diagram by means of subheadings in the body of the report.

The conclusion will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA style for citing and referencing research.

Attachment:- Assessment Brief -Case Study.rar

Reference no: EM132941465

Questions Cloud

Male and female styles of leadership : What differences do you see in the male and female styles of leadership
Identify the different types of corporations that exist : Identify the different types of corporations that exist (hint: their name contains a letter). What are the differences in these type of corporations? What are t
Recommend marketing the product : You are an executive with a large pharmaceutical company, W. B. Milestone, Inc., and you have to decide whether to market a product that might have undesirable
Interpretation of data : Interpretation of data. Conduct research from WTTC, data comes from the year 2018-20019. Compare the date in 3 paragraphs.
How you will structure your ideas for the threat model : Plan how you will structure your ideas for the threat model report and Your area of research and its context
Discuss the need for in an in-service training : Discuss the need for in an in-service training when a policy is changed. Include small changes and large changes as well as staff involvement.
Assignment on global business environment : Select an exclusive Canadian company and evaluate it on its Global Business Environment criteria: (BROOKFIELD ASSET MANAGEMENT or Any other Canadian company tha
Discuss common types of industry key success factors : Examine and discuss the common types of industry key success factors (KSFs) in relation to the mobile communications sector in South Africa.
Explain government regulation of business firms : -"What we are actually doing is trying to maximize profits in the endgame," he adds. "That's why there is a rush to approve new coal mines. We know that in 30 y

Reviews

Write a Review

Computer Network Security Questions & Answers

  Article about network security

Write a 1 Page summary on an article about network security

  Why is network security critical to financial institutions

Why is network security critical to financial institutions? The Blog topic is based on ‘Banks Banking on Network Security' (Closing Case Study Two, Section 11/Plug in B5 - Integrating the Enterprise, IS Function & IS Technologies).

  Identify a recently announced security vulnerability

Identify a recently announced security vulnerability and write a profile of the threat - determine what the risk to an organisation is, you need to know

  Design and implementation of a security approach

use Microsoft Powerpoint to create your slides for a 15-minute presentation. It`s about Computer Hacking the same subject that you wrote in the report. You are going to take the same information that you wrote in the report and make it as slides.

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security, you have determined that there was no security plan in place and no ..

  How do you verify people and security levels

Develop a 1- to 2-page chart. Your chart should have four columns for Authorization, Authentication, Roles, and Mitigation, as well as three columns for Small.

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Prepare a report on network design and management trends

Prepare a report on network design and management trends over the last three years in the areas of virtualization, hardware and network management tools.

  Data standards and data security

Data Standards and Data Security

  Appraise the individual and organizational consequences of

1.compare and contrast the mis in place in two distinctly different organizations.2.compare each organizations use of

  The message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted

the message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted using a shift transformation c equiv p k mod 26. use

  Define security technique that aims to expose flaws

Fuzzing" is a security technique that aims to expose flaws in error handling by providing invalid, random, or unexpected data as inputs to computer systems. Here "system" is used generically, and should be read as "function call, program, or shell..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd