Plan and implement operational assurance programs

Assignment Help Other Subject
Reference no: EM132897715 , Length: word count:4500

BN223 Cyber Security Principles - Melbourne Institute of Technology

Assessment - Cybersecurity for critical infrastructures

Learning outcome 1: Understand the common types of threat and vulnerabilities to cyber systems and data

Learning outcome 2: Demonstrate an understanding of the tactical and strategic means of detecting and monitoring anomalous activity

Learning outcome 3: Understand physical security impacts on the enterprise information infrastructure

Learning outcome 4: Plan and implement operational assurance programs

Assignment Description

Tasks:

There are two parts to this assignment, i.e. part A and part B.

A. Write a group report onone of the following topics listed at Part A. Your tutor will allocate you a group number (maximum five students in a group) and your topic.

B. Demonstration. Make a group video demonstration of threecomputer security tools.

Part A description:

In this part, you are required to select any one of the listed applications and write a group report including the following sections:
» Historyand background of the selected application.
» Literature review about your topic.
» Present the security challenges in implementing the application in a IoT environment based on the referred research papers.
» Current cyber security threats and challenges in critical infrastructures protection.
» Address the securityissues.
» Analyse and review the existing security techniques and identify among them the best technique.
» Analyse the challenges and Propose/ Reviewsome solutions that can be taken to overcome these challenges.
» Examine the security tools based on your selected topic.
» Investigate the relevant computer security tools and techniques that can be used to address the challenges of the above case.
» Propose/ Review some solutions that can be taken to overcome these challenges.
» Presents an approach allowing to implement, manage and maintain cyber security program for Instrumentation and Control (I&C) systems of your selected application.

The list of applications are given below:
» Smart home
» Wearables
» Smart City
» Smart grids
» Industrial internet
» Connected car. ...
» Connected Health (Digital health/Telehealth/Telemedicine).
» Smart retail.
» Smart supply chain
» Smart farming

Instructions:
Prepare your article as below
1. Go to the IEEE website and download the WORD template for the format.
2. Another link for the template:
3. Read and familiarise yourself with the instructions carefully.
4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6).
5. Complete the assignment (minimum 6 and maximum 19 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
» Title (maximum 15 words)
» Abstract (200 - 250 words)
» Introduction (800 - 2000 words)
» Literature Review (1000 - 3000 words)
» Main body (1000 - 3000 words)
» Conclusion (200 - 300 words)
» Future Works (150 - 300 words)
» References (minimum 10 references)
6. The article must be a ‘Review' article, including at least 5 references and not more than 25.
7. Strictly follow the IEEE reference format for in-body citations and the references section.
8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.
9. Contents must include:
» History and background of the topic
» Challenges and drawbacks
» Examine the security tools based on your selected topic.
» Possible options (solutions) and future research areas proposed
» Include a minimum of two (2) figures to show the overall concept and summarised overview of the topic from the review of minimum 10 - 15 (but not limited to) papers
10. Remember to strictly follow the template and the instructions above to avoid penalties.

Part B description:

Make a group video demonstration of threesecurity tools Prepare slides (between 8 - 12 slides) for your video demonstration. As a team of five, create a 5-8 minutes video demo using Zoom application (along with presenters' video) addressing the following tasks:
1. Analyse and discuss the importance of your selected computer security tools
2. Perform three selected security tools
3. Identify and discuss the strengths and weakness of each computer security tools
4. Which computer security would you recommend? Justify your recommendation.

Attachment:- Cyber Security Principles.rar

Reference no: EM132897715

Questions Cloud

What is the firm net cash flow : A firm has net income of $5 million. Assuming that depreciation of $1 million is its only noncash expense, what is the firm's net cash flow
What impact does this have on net cash : A firm has inventories of $2 million for the previous year and $1.5 million for the current year. What impact does this have on net cash provided by operations
How learn in a supervised mode and in an unsupervised mode : ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode
Find tourism-related establishments : Surf the Internet and look up the case of Melva Nath versus Shangri la Manila Hotel, a deluxe hotel in Makati City. Melva Nath was the former director of rooms
Plan and implement operational assurance programs : Demonstrate an understanding of the tactical and strategic means of detecting and monitoring anomalous activity and Plan and implement operational assurance
What is its resulting retained earnings balance : In the current year, its net income is $2.5 million. If it pays $1 million in common dividends in the current year, what is resulting retained earnings balance
What is a forensic read blocker : How do identify some situations where it makes sense to use the hardware versions or when it makes sense to use software versions?
Discuss the future or emerging technologies : Discuss how IT can leverage innovative technologies such as social media, big data and business intelligence to provide value to the business
What was result of implementing cloud computing : Describe the organization's Cloud Computing implementation and the benefits realized from the implementation. What was result of implementing Cloud Computing.

Reviews

Write a Review

Other Subject Questions & Answers

  Develop mobile deals while avoiding this downward spiral

What could be some of the possible ways to develop mobile deals while avoiding this downward spiral which jeopardizes the economic model of mobile operators

  Identify data sources you might need to collect

Identify data sources you might need to collect and analyze for your initiative. Consider contacting people in the industry and at your organization.

  How did your leader illustrate this attribute

Select one transformational attribute of Jeff Bezos that positively affected the leader's organization. How did your leader illustrate this attribute? Use material found in the text and your own research to explain how the transformational leader'..

  Status of the incorporation doctrine

The status of the Incorporation Doctrine is that the:

  How journal entries of her life on the street

In Evelyn Lau's book Runaway Diary of a Street Kid, how does she combine her journal entries of her life on the street

  Find two or more examples of media bias

How is the media, biased, more towards progressive-liberal values, conservative values or in both directions depending on the specific media outlets.

  What is legality

What is Legality - What are Ethics - Compare and contrast legality and ethics in health care - example of a violation of ethics in a healthcare organization

  How you would disseminate the results of your project

Explain how you would disseminate the results of your project to an audience. Provide a rationale for why you selected this dissemination strategy.

  Evaluates key concepts related to the topic

Select a client from clinical experience with a acute hyperthyroidism. Based this condition, conduct a literature search for two research articles that discuss.

  How professor bermans assertion about the connection

Explore how Professor Berman's assertion about the connection of religion and law relates to H.L.A. Hart's question of "What is Law?"

  How long have you been teaching and in what grade levels

How long have you been teaching and in what grade levels? What factors did you consider when setting up your classroom environment?

  Discuss about the importance of theory

In week 4, you learned about the importance of theory, the various theoretical perspectives and the ways in which theory help guide research in regards.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd