Threat model report

Assignment Help Other Subject
Reference no: EM132679057 , Length: word count:1500

MIS607 Cybersecurity - Laureate International Universities

Threat Model Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.

Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.

Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary
You are required write a 1500 words Threat modelling report in response to a case scenario by identifying the threat types and key factors involved. This assessment is intended to build your fundamental understanding of these key threats so that you will be able to respond/mitigate those factors in Assessment 3. In doing so, this assessment will formatively develop the knowledge required for you to complete Assessment 3 successfully.

Context
Security threat modelling, or threat modelling is a process of assessing and documenting a system's security risks. Threat modelling is a repeatable process that helps you find and mitigate all of the threats to your products/services. It contributes to the risk management process because threats to software and infrastructure are risks to the user and environment deploying the software. As a professional, your role will require you to understand the most at-risk components and create awareness among the staff of such high-risk components and how to manage them. Having a working understanding of these concepts will enable you to uncover threats to the system before the system is committed to code.

Task Instructions
1. Carefully read the attached the case scenario to understand the concepts being discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the threat model report.

3. Draw a use DFDs (Data Flow Diagrams):
• Include processes, data stores, data flows
• Include trust boundaries (Add trust boundaries that intersect data flows)
• Iterate over processes, data stores, and see where they need to be broken down
• Enumerate assumptions, dependencies
• Number everything (if manual)

• Determine the threat types that might impact your system
• STRIDE/Element: Identifying threats to the system.
• Understanding the threats (threat, property, definition)

4. The report should consist of the following structure:

A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
a) Your area of research and its context
b) The key concepts of cybersecurity you will be addressing and why you are drawing the threat model
c) What the reader can expect to find in the body of the report

The body of the report) will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the threat model report, drawing DFD and presenting the diagram by means of subheadings in the body of the report.

The conclusion will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA style

Attachment:- Cybersecurity.rar

Attachment:- Case Scenario.rar

Reference no: EM132679057

Questions Cloud

Discuss is the primary objective of the fair value method : Fair value accounting is the practice of measuring assets, Discuss is the primary objective of the fair value method of accounting for an investment?
Discuss key items that should be included in an sla : Discuss key items that should be included in an SLA. Define predictive analytics and discuss how an IT manager might use such analytics.
How much will have saved for the trip : Assume her investment earns a 4 percent interest rate, how much will she have saved for their trip if the interest is compounded in each of the Annually ways?
What is the coefficient of variation for stock a : The expected return is 13.8%. What is the coefficient of variation for stock A. Your answer should be accurate to two decimal places.
Threat model report : Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various
What is the beta of portfolio : You have invested your money in three stocks. You have invested 50% of your wealth in stock A. You have invested 20% of your wealth in stock B
Make statement of owner equity for the year ended : Grab Bag Delivery Services reported a net loss of $43,500. Make statement of owner's equity for the year ended December 31, 2018
Evaluate the financial statement impact of the bankruptcy : Evaluate the financial statement impact of the bankruptcy on Canaday. Assume Canaday's product cost is 40% of revenue and the bad-debt reserve of $2M
What is the standard deviation of the portfolio : You have created a portfolio. You invested 30% of your wealth in Stock A and 70% of your wealth in Stock B. Stock A has a standard deviation of 17.5%.

Reviews

Write a Review

Other Subject Questions & Answers

  Define the morbidity and mortality rates of a population

Define and differentiate between morbidity and mortality rates of a population. Why are these rate important? Explain your response and give an example of each.

  Three influences on decision making by judge

Describe at least three influences on decision making by a judge. Indicate at least two reasons why you believe these influences are most influential to process

  With gdp as a measure of power

With GDP as a measure of power and the maps in book,pick a state and speculate about what coalition might form with sufficient power to oppose a state(that you select) if it becomes aggressive.

  Investigate a topic related to the hospitality industry

Investigate a topic related to the hospitality industry that is an area of interest to you. Sample research ideas will be provided to you by your tutor

  What issue is the author addressing

What issue is the author addressing? If the author is supporting a position with an argument, restate the argument in your own words. What rhetorical devices does the author employ in this text?

  Why is the audience important in argument

Why is the audience important in argument? What types of positions might an audience hold? What possible outcomes are associated with argument directed.

  Identify the burnham or sullivan inspired elements

Identify the Burnham or Sullivan inspired elements of what you are writing about. What are some of the details that we've talked about in class that you see while we are out in the field

  Analyze the literature and write scholarly review of sources

Write a 5- to 8-page literature review related to your research question or thesis statement. Analyze the literature and write a scholarly review of the 5-8 sources as they pertain to your question/statement.

  Euthyphros central attempt to define piety does so in terms

euthyphros central attempt to define piety does so in terms of what all the gods love. socrates deploys a number of

  Research report - wearable technologies in health care

Task: Select ONE of these topics (this list will continuously expand) for your research report: Wearable technologies in health care Factors impacting implementation of technology in acute care/ or any other areas

  Critical Thinking and Reflective Practices Assignment

Critical Thinking and Reflective Practices Assignment - Understanding and ability to define Socratic Method: Explain Socratic Method in your own words

  What makes for an effective politician

Can you think of examples from your everyday life when you encounter politics? What makes these experiences "political?"

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd