Threat model report

Assignment Help Other Subject
Reference no: EM132940049 , Length: word count:1400

MIS607 Cybersecurity

Threat Model Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.
Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary
You are required write a 1500 words Threat modelling report in response to a case scenario by identifying the threat types and key factors involved. This assessment is intended to build your fundamental understanding of these key threats so that you will be able to respond/mitigate those factors in Assessment 3. In doing so, this assessment will formatively develop the knowledge required for you to complete Assessment 3 successfully.

Context
Security threat modelling, or threat modelling is a process of assessing and documenting a system's security risks. Threat modelling is a repeatable process that helps you find and mitigate all of the threats to your products/services. It contributes to the risk management process because threats to software and infrastructure are risks to the user and environment deploying the software. As a professional, your role will require you to understand the most at-risk components and create awareness among the staff of such high-risk components and how to manage them. Having a working understanding of these concepts will enable you to uncover threats to the system before the system is committed to code.

Task Instructions
1. Carefully read the attached the case scenario to understand the concepts being discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the threat model report.

3. Draw a use DFDs (Data Flow Diagrams):
• Include processes, data stores, data flows
• Include trust boundaries (Add trust boundaries that intersect data flows)
• Iterate over processes, data stores, and see where they need to be broken down
• Enumerate assumptions, dependencies
• Number everything (if manual)
• Determine the threat types that might impact your system
• STRIDE/Element: Identifying threats to the system.
• Understanding the threats (threat, property, definition)

4. The report should consist of the following structure:

A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
a) Your area of research and its context
b) The key concepts of cybersecurity you will be addressing and why you are drawing the threat model
c) What the reader can expect to find in the body of the report

The body of the report) will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the threat model report, drawing DFD and presenting the diagram by means of subheadings in the body of the report.

The conclusion will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA style for citing and referencing research.

Attachment:- Threat Model Report.rar

Reference no: EM132940049

Questions Cloud

Critical thinking discussion-the bully boss : Find and read an online article on abusive managers, such as this one from Forbes magazine or Harvard Business Review:
Record any entry required related to this obligation at dec : Black Water Mining Company discovered a new iron ore deposit, the Reed Mine, Record any entry required related to this obligation at December 31, 2020.
How much would the robotic design have to save per unit : How much would the robotic design have to save per unit in order for the company to be indifferent between the two design options?
Calculate the year-end balance of construction contract : Calculate the year-end balance of Construction Contract Asset (Liability) for 2020 and 2021 amounts using the percentage of completion method.
Threat model report : Threat Model Report - Review your subject notes to establish the relevant area of investigation that applies to the case
Find accrue one month of interest expense on note payable : Find Accrue one month of interest expense on the note payable. Bought office equipment for $15,000 and signed a three-year promissory note with a local bank.
Estimate through sensitivity the entire price of the bond : Check the results and approximation of these estimates, comparing them with the real prices of the bond with the IRR of 3.9% and 3.3%
How much would the robotic design have to save per unit : How many automobiles are needed to be produced over the next two years to make the manufacturer indifferent economically between the two systems?
Whats accounting principles that abc sdn bhd did not follow : What are two (2) Accounting Principles that ABC Sdn Bhd did not follow? The undeclared sales of RM50 million will be recorded next year.

Reviews

Write a Review

Other Subject Questions & Answers

  Frequent opportunities for interaction and discussion

Ample opportunities for students to use learning strategies, scaffolding techniques consistently used, a variety of questii tasks the promote higher-order thinking.

  Describe which shape is closest and which is furthest away

Would different colors or values add or detract from your work? How did you use line to indicate the passage of time?

  Descriptive analysis - education and learning

Descriptive Analysis ~ Education and Learning. Describing and analyzing are central features of essay writing.

  How can make speech certque better

How can make Speech Certque better? - The topic of speech is: "how to kill a goldfish". -  During my speech about "how to kill a goldfish" my nervousness affected my speech.

  What do you hope to learn from the class

What do you hope to learn from this class? What is most interesting to you about nutrition or exercise? Identify three health related lifestyle.

  Describe the six phases of the mapp framework

Describe the six phases of the MAPP framework. Write your initial response in 4-6 paragraphs. Apply APA standards to citation of sources.

  Which would you select for your organization

The method of training used can affect the behavior and cognitive learning of the audience; therefore, in meeting the needs of the audience, you must consider.

  Explain the continual foreign domination by multiple

From a contextual perspective, describe how Jewish monotheism may have helped explain the continual foreign domination by multiple empires over hundreds of year

  Jewish burial rites reflect about the belief in god

What do the Jewish burial rites reflect about the belief in God, an afterlife, and the importance of community?

  What are the considerations in terms of ages served

Which resources do you feel would be most effective and why? What are the considerations in terms of ages served, location in your community.

  Discuss the article''s findings any ethical dilemmas

Discuss the article's findings, any ethical dilemmas presented in the article, as well as how the specific topic relates to a biblical worldview.

  How would you implement the justice

These are exactly some of the issues the nation is experiencing right now. In your humble opinion, how can restorative justice be effective with the different.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd