Reference no: EM132897715 , Length: word count:4500
BN223 Cyber Security Principles - Melbourne Institute of Technology
Assessment - Cybersecurity for critical infrastructures
Learning outcome 1: Understand the common types of threat and vulnerabilities to cyber systems and data
Learning outcome 2: Demonstrate an understanding of the tactical and strategic means of detecting and monitoring anomalous activity
Learning outcome 3: Understand physical security impacts on the enterprise information infrastructure
Learning outcome 4: Plan and implement operational assurance programs
Assignment Description
Tasks:
There are two parts to this assignment, i.e. part A and part B.
A. Write a group report onone of the following topics listed at Part A. Your tutor will allocate you a group number (maximum five students in a group) and your topic.
B. Demonstration. Make a group video demonstration of threecomputer security tools.
Part A description:
In this part, you are required to select any one of the listed applications and write a group report including the following sections:
» Historyand background of the selected application.
» Literature review about your topic.
» Present the security challenges in implementing the application in a IoT environment based on the referred research papers.
» Current cyber security threats and challenges in critical infrastructures protection.
» Address the securityissues.
» Analyse and review the existing security techniques and identify among them the best technique.
» Analyse the challenges and Propose/ Reviewsome solutions that can be taken to overcome these challenges.
» Examine the security tools based on your selected topic.
» Investigate the relevant computer security tools and techniques that can be used to address the challenges of the above case.
» Propose/ Review some solutions that can be taken to overcome these challenges.
» Presents an approach allowing to implement, manage and maintain cyber security program for Instrumentation and Control (I&C) systems of your selected application.
The list of applications are given below:
» Smart home
» Wearables
» Smart City
» Smart grids
» Industrial internet
» Connected car. ...
» Connected Health (Digital health/Telehealth/Telemedicine).
» Smart retail.
» Smart supply chain
» Smart farming
Instructions:
Prepare your article as below
1. Go to the IEEE website and download the WORD template for the format.
2. Another link for the template:
3. Read and familiarise yourself with the instructions carefully.
4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6).
5. Complete the assignment (minimum 6 and maximum 19 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
» Title (maximum 15 words)
» Abstract (200 - 250 words)
» Introduction (800 - 2000 words)
» Literature Review (1000 - 3000 words)
» Main body (1000 - 3000 words)
» Conclusion (200 - 300 words)
» Future Works (150 - 300 words)
» References (minimum 10 references)
6. The article must be a ‘Review' article, including at least 5 references and not more than 25.
7. Strictly follow the IEEE reference format for in-body citations and the references section.
8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.
9. Contents must include:
» History and background of the topic
» Challenges and drawbacks
» Examine the security tools based on your selected topic.
» Possible options (solutions) and future research areas proposed
» Include a minimum of two (2) figures to show the overall concept and summarised overview of the topic from the review of minimum 10 - 15 (but not limited to) papers
10. Remember to strictly follow the template and the instructions above to avoid penalties.
Part B description:
Make a group video demonstration of threesecurity tools Prepare slides (between 8 - 12 slides) for your video demonstration. As a team of five, create a 5-8 minutes video demo using Zoom application (along with presenters' video) addressing the following tasks:
1. Analyse and discuss the importance of your selected computer security tools
2. Perform three selected security tools
3. Identify and discuss the strengths and weakness of each computer security tools
4. Which computer security would you recommend? Justify your recommendation.
Attachment:- Cyber Security Principles.rar