Write threat modelling report

Assignment Help Other Subject
Reference no: EM132680134 , Length: word count:1500

MIS607 Cybersecurity - Laureate International Universities

Threat Model Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.

Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.

Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary
You are required write a 1500 words Threat modelling report in response to a case scenario by identifying the threat types and key factors involved. This assessment is intended to build your fundamental understanding of these key threats so that you will be able to respond/mitigate those factors in Assessment 3. In doing so, this assessment will formatively develop the knowledge required for you to complete Assessment 3 successfully.

Context
Security threat modelling, or threat modelling is a process of assessing and documenting a system's security risks. Threat modelling is a repeatable process that helps you find and mitigate all of the threats to your products/services. It contributes to the risk management process because threats to software and infrastructure are risks to the user and environment deploying the software. As a professional, your role will require you to understand the most at-risk components and create awareness among the staff of such high-risk components and how to manage them. Having a working understanding of these concepts will enable you to uncover threats to the system before the system is committed to code.

Task Instructions
1. Carefully read the attached the case scenario to understand the concepts being discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the threat model report.

3. Draw a use DFDs (Data Flow Diagrams):
• Include processes, data stores, data flows
• Include trust boundaries (Add trust boundaries that intersect data flows)
• Iterate over processes, data stores, and see where they need to be broken down
• Enumerate assumptions, dependencies
• Number everything (if manual)

• Determine the threat types that might impact your system
• STRIDE/Element: Identifying threats to the system.
• Understanding the threats (threat, property, definition)

4. The report should consist of the following structure:

A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
a) Your area of research and its context
b) The key concepts of cybersecurity you will be addressing and why you are drawing the threat model
c) What the reader can expect to find in the body of the report

The body of the report) will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the threat model report, drawing DFD and presenting the diagram by means of subheadings in the body of the report.

The conclusion will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA style

Attachment:- Cybersecurity.rar

Reference no: EM132680134

Questions Cloud

Identify potential outcomes of the proposed resolution : Select one of the four primary principles (Autonomy, Beneficence, Nonmaleficence, Justice) from the Principles-Based Model from the readings to apply to the.
Brief description of democracy in the nations : A brief description of democracy in the nations you selected. Explain the similarities and differences of democracy in this nation(s) with democracy
Determine the break-even point in sales dollars : Rubber and Steel Company is planning to manufacture a new product. Determine the break-even point in sales dollars. Calculate the contribution margin per unit.
Some of challenges facing australian government : What are some of the challenges facing the Australian government in dealing with the delivery of the healthcare system, which is large and complex?
Write threat modelling report : Write a 1500 words Threat modelling report in response to a case scenario by identifying the threat types and key factors involved
What price should she charge to break even : Susan is considering the expansion of her picture-framing camera. What price should she charge to break even? Compute the break-even point in sales dollars.
Discuss the diagnostic tool for h pylori : Discuss the importance to identify if helicobacter pylori, a gram negative bacterium, is present, you can discuss the diagnostic tool for h pylori.
Secure technologies within various organisational contexts : Security threat modelling, or threat modelling is a process of assessing and documenting a system's security risks. Threat modelling is a repeatable process
How would given be more beneficial than other models of care : In addition to your infographic, choose a patient population that would benefit from your selected model. Include a 300-500 word rationale for how this model.

Reviews

Write a Review

Other Subject Questions & Answers

  Write a paper using the completed matrix

For the second part of the assignment, you will write a paper using the completed matrix and your reading of the three articles. When you write the paper, you will be extending the research on your dissertation topic.

  Is health care compatible with first-mover advantage

Is health care as an industry compatible with first-mover advantage? Provide your thoughts in the context of Theranos and Elizabeth Holmes.

  Prepare a recruitment and retention plan for a company

Prepare a recruitment and retention plan for a company that specifically targets women employees

  The ruler who became the dominant figure

The ruler who became the dominant figure in Europe in the late 8th and early 9th centuries was

  Write paragraph about the important necessary of life

Write paragraph about the important necessary of life and explni why it is important (Giive details and example)

  How well do our attitudes predict our behavior

How well do our attitudes predict our behavior? Explain the circumstances under which attitudes do predict behavior and provide an example.

  The threat of revocation plays an important role

The threat of revocation plays an important role in the effective management of many offenders under community supervision. Describe revocation and discuss how it can be used as a tool to encourage compliance with the conditions of a community ..

  Discuss interesting events or people involved with faction

This is a brief investigation into a very specific topic, this is not your research paper. Have some more fun with this one. If you picked one of these.

  Implications of health economic concepts for healthcare

Analyze the primary potential benefits of learning about health economics related to government involvement in healthcare economics, financing, and delivery - Implications of Health Economic Concepts for Healthcare

  Examine basic descriptive statistics and demonstrate results

Examine basic descriptive statistics, and demonstrate results using calculated values and statistical charts. A major client of your company is interested.

  Discuss major discretionary budget eliminations

Discuss major discretionary budget eliminations. Why is it important that government budgets accurately estimate future revenues during economic downturns?

  Write 750 words at least 3 sources sources must use your

write 750 words at least 3 sources sources must use your own words. do not use wikipedia evaluate the factors that

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd