Identify and examine types of the malicious cyber activities

Assignment Help Risk Management
Reference no: EM132872954 , Length: word count:2500

SBM4304 IS Security and Risk Management - Asia Pacific International College

Assessment 1: Case study

Assessment Details:

Today's Internet has its roots all the way back in the late 1960s, but it was only used by researchers and the military for almost a quarter of a century. The Internet has opened the door for threat actors to reach around the world invisibly and instantaneously to launch attacks on any device connected to it.

Answer the following questions related to the case study:

1. Identify and examine all types of the malicious cyber activities identified by ACSC and summarize them in a table.

2. Identification and categories assets, including all elements of an organization's system (people, procedures, data and information, software, hardware, and networking)

3. Create a table to identifying and prioritizing threats against each type of asset identified in item (2). You have to demonstrate the way you follow to prioritizing threats with justification.

4. In general, the security defences should be based on five fundamental security principles: layering, limiting, diversity, obscurity, and simplicity. The ACSC proposed eight strategies to prevent malware delivery and limit cyber Security incidents. Analyse these principles with the strategies proposed by the ACSC. In your analysis, you have to clearly demonstrate how each mitigation strategy is related to fundamental security principle with justification.

Assessment 2: Applied Project

Assessment Details:

This assessment is designed to assess your technical skills in applying information security tools. In this assignment, you have to study and apply steganography techniques to embedded data within a file. In addition, you have to understand Linux file systems and apply access control technologies.

Task Specifications
This assessment includes three tasks as follows:

Task-1:
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Use Steghide tools available in Kali Linux/Linux to hide a text file that includes your group students IDs on audio file. You have first to create audio file with no more than 30 second to record your group students IDs only. Then, you have to create text file to include group details include first and last name for each student in your group. Finally, use Steghide tools (use security as passphrase) to embedded your text file into the created audio file.

In your report, you have to provide screenshot demonstrate the steps with the commands you followed during the process of installation of Steghide, and the way use used to hide group information text file into audio file and finally the steps to extract the text file from audio for verification of your work.

Task-2:
Access control is granting or denying approval to use specific resources. Technical access control consists of technology restrictions that limit users on computers from accessing data.

In this task you have to work in a group to understand Access Control List (ACL) and files system security using Linux environment. You have to complete the followings tasks using kali Linux or any Linux OS:

1. Fill the following table with the information related to all member of your group:

2. Create main directory named BIS3004 and set it permission to full access, fill the following table:
3. Create sub directories within BIS3004 directory according to Table-3:
4. Create users, with names according to the group member student IDs for of your group as shown in Table-4

Use the commands available in Linux or Kali Linux to complete the above tables. In your report, you have to provide screenshot to demonstrate the steps you followed during the process of conducting the assignment tasks and requirements according to your group details provided in Table-1 (student ID, first name and last name).

Task-3:
Discuss with clear demonstration, how the steganography and access control techniques that you conducted in Task-1 and Task-2, respectively, can achieve confidentiality, integrity, and availability (CIA). You have to provide justification during your discussion.

Assessment 3: Laboratory Practicum
Assessment Details:
Practical exercises assess students' ability to apply theoretical learning to practical, real world situations on a weekly basis. The practical exercises will improve student's ability to practice information security using Linux/Kali Linux platform such as phishing attack, encryption and steganography and other functions.
This assessment also includes invigilated quiz that will assess your ability to understand theoretical materials and your knowledge of key content areas. The quiz will be either multiple choice questions or short questions which are relevant to the lectures of lecture materials. For successful completion of the quiz, you are required to study the material provided (lecture slides, tutorials, and reading materials) and engage in the unit's activities. The prescribed textbook is the main reference along with the recommended reading materials.
Students will be required to complete the practical exercises and sit the quiz during the workshop and therefore, attendance is required as part of this assessment. Students will not be assessed on work that not produced in workshop so that attendance is required as part of this assessment.
Students are required to submit the work that they have completed during the workshop session only. The details of the lab work and requirements are provided on the online learning system.

Note: Need only Task-2

Attachment:- IS Security and Risk Management.rar

Reference no: EM132872954

Questions Cloud

Analyze and define the hr components : Analyze and define the HR components and strategic advantages uses to create competitive advantage for the company.
Outline six contributions of industries in the economic : 1. Discuss ways in which a country could finance its public sector income
Emerging issues in human resources training : Conduct an article review regarding the top 21st century challenges regarding emerging issues in Human Resources Training. Detailed explanation
Scope statement and work breakdown structure : 1. You are in charge of organizing dinner dance concert for a local charity. You have reserved a hall that will seat 30 couples and have hired a jazz combo.
Identify and examine types of the malicious cyber activities : Identify and examine all types of the malicious cyber activities identified by ACSC and summarize them in a table - Discuss with clear demonstration
Evaluate the contribution of strategic human resource : Task - Evaluate the contribution of Strategic Human resource management (SHRM) to the achievement of an organisation objective.
Discuss issue of allocation of opportunities in organization : Discuss the issue of allocation of opportunities in an organization.
How do an agency document direct services to clients : How do an agency document direct services to clients?
Develop and implement strategies that newcastle city : -Develop and implement strategies that Newcastle city council support agreed on objectives for recruitment, training, redeployment, and redundancy.

Reviews

len2872954

4/30/2021 5:32:30 AM

Assessment - Applied project Discuss and implement IS security protection techniques, and implementing access control under Linux

Write a Review

Risk Management Questions & Answers

  Calculate the standard deviation for two stocks

Expected return Stock A % Stock B % Calculate the standard deviation for the two stocks.

  What is the kinetic energy of the electrons that hit

What is the kinetic energy of the electrons that hit the outer cylinder at a magnetic field just below the critical value?

  Create a risk breakdown structure

Now create a Risk Breakdown Structure (RBS) as shown in the "Planning Phase" section of chapter 11. You can accomplish this by taking the first two levels of your work breakdown structure as a starting point and adding levels 3 and 4 as shown in t..

  Critique each of three methods of calculating value at risk

Critique each of the three methods of calculating Value at Risk, giving one advantage and one disadvantage of each.

  Plot the probability distribution of FTZ pre-tax earnings

Risk Management Assignment Questions - Plot the probability distribution of FTZ's pre-tax earnings and indicate the 95% Value-at-Risk on the graph

  What is the company nonoperating return

What is the company’s nonoperating return? Walt Disney’s 2016 net operating profit margin is:

  Determine the wavelength of the resonating sound wave

A sound wave resonates inside an open pipe filled with air at room temperature, as shown above. The length of the pipe is 33 cm.

  Identify lapses or gaps and lessons learned related to erm

Identify lapses or gaps and the lessons learned related to ERM. Identify and describe ERM concepts and processes.

  How much she can expect to receive net of taxes

Sally also wants to know how her investment income will be taxed and how much she can expect to receive net of taxes

  Explaining the strengths and limitations in using pipe

Write a report explaining the strengths and limitations in using pipe and filter commands. Provide a brief history of pipe and filtering style commands. Also, provide a comparison between the benefits of using pipe and filter commands with the com..

  Main purpose of mission and vision statements

Is the main purpose of mission and vision statements to motivate employees? Explain

  What are some various legal documents

What are some various legal documents that must be filed when a lawsuit is pending?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd