Threat modelling report assessment

Assignment Help Computer Engineering
Reference no: EM133110586 , Length: word count:1500

MIS607 Cybersecurity - Laureate International Universities

Assessment - Threat Model Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.

Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.

Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary

You are required write a 1500 words Threat modelling report in response to a case scenario by identifying the threat types and key factors involved. This assessment is intended to build your fundamental understanding of these key threats so that you will be able to respond/mitigate those factors in Assessment 3. In doing so, this assessment will formatively develop the knowledge required for you to complete Assessment 3 successfully.

Context

Security threat modelling, or threat modelling is a process of assessing and documenting a system's security risks. Threat modelling is a repeatable process that helps you find and mitigate all of the threats to your products/services. It contributes to the risk management process because threats to software and infrastructure are risks to the user and environment deploying the software. As a professional, your role will require you to understand the most at-risk components and create awareness among the staff of such high-risk components and how to manage them. Having a working understanding of these concepts will enable you to uncover threats to the system before the system is committed to code.

Task Instructions

1. Carefully read the attached the case scenario to understand the concepts being discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the threat model report.

3. Draw a use DFDs (Data Flow Diagrams):
• Include processes, data stores, data flows
• Include trust boundaries (Add trust boundaries that intersect data flows)
• Iterate over processes, data stores, and see where they need to be broken down
• Enumerate assumptions, dependencies
• Number everything (if manual)
• Determine the threat types that might impact your system
• STRIDE/Element: Identifying threats to the system.
• Understanding the threats (threat, property, definition)

4. The report should consist of the following structure:

A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
a) Your area of research and its context
b) The key concepts of cybersecurity you will be addressing and why you are drawing the threat model
c) What the reader can expect to find in the body of the report

The body of the report) will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the threat model report, drawing DFD and presenting the diagram by means of subheadings in the body of the report.

The conclusion will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA style

Attachment:- Case Scenario.rar

Reference no: EM133110586

Questions Cloud

Number of foreign banks in the philippines : Why do you think it is important to have a limited number of foreign banks in the Philippines? Please create a scenario to justify your answer and explain.
Limited number of foreign banks in the philippines : Why do you think it is important to have a limited number of foreign banks in the Philippines? Please create a scenario to justify your answer and explain.
Issuing a qualified report : A news story reports that your employer's auditor is issuing a qualified report because of the use of questionable accounting practices.
Prepare a RACM for a General IT Control : Prepare a RACM for a General IT Control. Be sure the six elements are consistent, i.e. do not mix items from different business processes and objectives
Threat modelling report assessment : Draw a use DFDs - Iterate over processes, data stores, and see where they need to be broken down and Determine the threat types that might impact your system
How to rebalance portfolio : 1. A stock paying an annual dividend of $10 indefinitely, the beta of the stock is 0.8, the expected return of the market portfolio is 15% and the risk free rat
What is net benefit from implementing Preventative Controls : Last year $500,000 worth of inventory was lost to thieves who broke in through windows and doors. What is net benefit from implementing Preventative Controls
Prepare a schedule of expected cash collections for August : The merchandise inventory at June 30 is $25,000. Dividends of $1,700 will be declared and paid in September. Prepare a schedule of expected cash collections
Demonstrate understanding of the importance of symmetry : Demonstrate understanding of the importance of symmetry in molecular structure and spectra and Understand the importance of thermodynamic quantities

Reviews

Write a Review

Computer Engineering Questions & Answers

  Symmetric and asymmetric multiprocessing

Explain the difference between symmetric and asymmetric multiprocessing.

  Write a commentary on your thoughts on the case

Please do an internet search and find out the results of the Erin Andrews invasion of privacy case that the Craig discusses in the assigned text.

  How many restore commands would you have to give to recover

In the worst case scenario, how many restore commands would you have to give to recover a file that was dumped using this schedule?

  Describe the phases of the digital forensics

Digital forensics is often summarized in four phases (e.g. collection, preservation, analysis and reporting). We have learned this already.

  Write the sieve of eratosthenes as a generator function

Write a class named Permutation in a file named myPermutation.py that will generate on demand all the permutations of a given list.

  Create a method and the corresponding recursive function

Create a method and the corresponding recursive function to count the leaves (i.e., the nodes with both subtrees empty) of a linked binary tree.

  Perform an exploratory analysis of your dataset

You will perform an exploratory analysis of your dataset and results from ML models using What-If Tool. You can either use their web demo if you use their.

  Analyze the difference between a use case and a scenario

Analyze the difference between a use case and a scenario. Give a specific example of a use case with at least two (2) possible scenarios.

  What are the benefit of using short circuit evaluations

What are the benefit of using short circuit evaluations? Are there are safety/reliability issues involved? If so, what are they?

  How long would it take to transmit the file

How long would it take to transmit the file if each link has a capacity of 10Mbs, propagation speed of 15Km/s, and length of 30m?

  Constructing and Evading network traffic based model of IDS

Project - ML for Security. Constructing & Evading network traffic based model of IDS. Create a model that learns normal network traffic

  What are specific examples of database failures

If you were one of the users of a damaged database, how will you be affected by such a failure and what measures could you take to prevent it.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd