Reference no: EM132505015
MOD002692 Secure Systems - Anglia Ruskin University
Case Study - Assignment
Introduction
Macmillan Games is a medium-sized toy company located in the UK. The company develops online multiplatform games that can be purchased anywhere around the world and has a reputation for producing top quality games for children aged 7 to 11. The company is a major employer in the area, providing jobs for over 1000 employees.
Assessment Description
Throughout the semester you will learn different security concepts as well as their relevance to businesses within real life scenarios. The assessment will allow you to demonstrate your understanding of the concepts reviewed in class by applying them to a case study and writing and individual report that should not exceed 2500 words
Analyse and evaluate the need for security management in information systems and the tools and techniques used to minimise the threat of attack. This analysis must be done in terms of the tools and techniques reviewed in class and in relation to the case study.
Discuss the motives, origins and techniques used by attackers of network based information systems and evaluate the role of cryptography in securing data transfer between systems. Within the case study, you must identify the possible motives, origins and techniques used by the attackers that allowed them to make the attack successful.
Research, critically evaluate and document solutions to known weaknesses in information security together with appropriate countermeasures and legal and ethical strategies. This should be done in context of the case study. Systematically investigate and discriminate between effective tools for maintaining system security and construct a strategy for deployment. Also in terms of the case study.
Introduction, a brief description of the contents of the document, scenario, etc.
Body of the document, all the elements described above (1-4). You can organise them as you want. Conclusions, a summary of what the document was about and the lessons learned.
References, a list of all the sources used. Intended learning outcomes for the assessment
Analyse and evaluate the need for security management in information systems and the tools and techniques used to minimise the threat of attack.
Discuss the motives, origins and techniques used by attackers of network based information systems and evaluate the role of cryptography in securing data transfer between systems.
Research, critically evaluate and document solutions to known weaknesses in information security together with appropriate countermeasures and legal and ethical strategies.
Systematically investigate and discriminate between effective tools for maintaining system security and construct a strategy for deployment.
Other skills and competencies:
The report must be written in your own words, except where referenced quotations are used, and be written in a style that makes the topic accessible to staff who are not security specialists, but who do have a good grasp of computing and networking. You will learn to critically analyse online material and to summarise it in a technical document.
Attachment:- Assessment Description.rar