1School of Business and Tourism UnitCybersecurityUnit codeCMP71001 Assignment 2Due DateSecurity consultation report and guideline.Sunday 23:59:59 of the last study week.LearningOutcomes3 – 6GraduateAttributes3, 4 & 5Weight30% of overall unit assessmentSuggestionThis assignment is developmental and cumulative. You are strongly advised to startdoing this assignment from Week-6 in your study. Leaving your starting date tothe week before the due date is a very poor strategy for success in the unit.A marking scheme will be posted on MySCU to help you direct your effortssuccessfully.Marks Task DescriptionYou are hired by Southern Cross University as a cybersecurity consultant to work on asecurity program to address the contemporary and emerging risks from the cyber threatsthe university is facing. Your tasks are the following: Task 1: the university is currently using a password based authentication systemto control the user access to the university’s information system. However, theBring Your Own Device (BYOD) policy recently implemented by the universityhas raised some security concerns. As a security consultant, assess the risk fromthe BYOD policy to the university’s information system. Task 2: After the assessing the risk from the BYOD policy, you suggest theuniversity to replace the current password-based authentication scheme with aCertificate-Based Authentication. To justify your suggestion, write a technicalreport to explain the working principle of the Certificate-Based Authenticationmechanism and discuss why the university should use the mechanism in this caseby comparing it with the password-based authentication mechanism. Use figurewhen necessary to support your answers. Task 3: You have identify Spamming is among the top cybersecurity threats facingby the university. Use the Spam Act 2003 and available online resources to developa guideline for the university students and staff to combat with the threat. Theguideline will include the following:o Definition of spam and its distinctive characteristics.2o At least three (3) real examples of spams showing the spam characteristics.o An instruction to the users of how to recognise and safely handle a spam.o An instruction to the IT administrator of how to minimize the spam threat.Assignment-2 guidelineTask 1: BOYD risk assessmentTo complete this task, use the following guidelines: Identify the most critical components of the university’s information system – thecritical information assets. Identify what threats the BYOD policy may bring to the identified critical assets. Identify potential vulnerabilities of each asset against the identified threats. Assess the risk to the university’s information system using either quantitative orqualitative risk assessment approach and document the risk assessment process.Task 2: Certificate-based AuthenticationTo complete this task, use the following guidelines: Perform necessary research to understand the working principle, pros and cons ofthe Certificate-based Authentication mechanism. Document all reference sources. Write a technical report to explain the working principle of the Certificate-basedAuthentication mechanism. Compare the certificate-based authentication againstthe password-based authentication and highlight the features you think are usefulfor combating the threats from the BYOD policy. Note that you are not allowed to cut and paste from online resources. Use yourown words and figures. Acknowledge all reference sources.Task 3: Anti-spam guidelineTo complete this task, use the following guidelines: Read and understand Spam Act 2003. The Spam Act 2003 document is availableat: https://www.legislation.gov.au/Details/C2016C00614. The Act will help you todefine what type of electronic messages should be treated as spams, what are thedistinctive characteristics of a spam and what act is considered as spamming? Search for 3 representative examples of spams or use your own spams as examples. Use samples from reputable online resources to help you with the development ofspam handling instructions. The instructions should be clear, concise and precise.Assignment-2 Marking RubricA spreadsheet that will be used for the marking of your site is provided (co-located withthis assignment specification) on MySCU to itemise exactly what tutors will be looking atin relation to marking your assignment. It contains a detailed breakdown of the markingcriteria for this assignment. I strongly suggest you peruse this spreadsheet.3Submission FormatWhen you have completed the assignment, you are required to submit your assignment inthe PDF/DOC format. The file will be named using the following convention:filename = FirstInitialYourLastName_CMP71001_A2.pdf(i.e. FJones_CMP71001_A2.pdf)Note to IBS students: Please check with your local lecturer/tutor the submissionrequirements for your assignments. Typically, they will be different from on-shore studentsof Southern Cross University.Original workIt is a University requirement that a student’s work complies with the Academic Policy,Chapter 4.20 on Student Academic Integrity. It is a student’s responsibility to be familiarwith the Policy.Failure to comply with the Policy can have severe consequences in the form of Universitysanctions. For information on this Policy please refer to Chapter 4.20 on Student AcademicIntegrity at the following website:http://www.scu.edu.au/governance/academicboard/policy/As part of a University initiative to support the development of academic integrity,assessments may be checked for plagiarism, including through an electronic system, eitherinternally or by a plagiarism checking service, and be held for future checking andmatching purposes.Retain duplicate copyBefore submitting the assignment, you are advised to retain electronic copies of originalwork. In the event of any uncertainty regarding the submission of assessment items, youmay be requested to reproduce a final copy.School Extension PolicyIn general, I will NOT give extension unless where there are exceptional circumstances.Students wanting an extension must make a request at least 24 hours before the assessmentitem is due and the request must be received in writing by the unit assessor or designatedacademic. Extensions within 24 hours of submission or following the submission deadlinewill not be granted (unless supported by a doctor’s certificate or where there are exceptionalcircumstances – this will be at unit assessor’s discretion and will be considered on a caseby case basis). Extensions will be for a maximum of 48 hours (longer extensions supportedby a doctor’s certificate or alike to be considered on a case by case basis).A penalty of 5% of the total available grade will accrue for each 24-hour period that anassessment item is submitted late. Therefore, an assessment item worth 20 marks will have1 marks deducted for every 24-hour period and at the end of 20 days will receive 0 marks.Students who fail to submit following the guidelines in this Unit Information Guide will bedeemed to have not submitted the assessment item and the above penalty will be applied4until the specified submission guidelines are followed.Marks and FeedbackAll assessment materials submitted during the semester will normally be marked andreturned within two weeks of the required date of submission (provided that the assessmentmaterials have been submitted by the due date).Marks will be made available to each student via the MySCU Grade book.
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS