CPO442 Cybersecurity Principles & Organisational Practice Assignment Help

ASSESSMENT 1 BRIEF

Subject Code and Title 

CPO442 Cybersecurity Principles and Organisational Practice

Assessment 

Report

Individual/Group 

Individual

Length 

500 words (+/- 10%) plus diagrams

Learning Outcomes 

The Subject Learning Outcomes demonstrated by successful  completion of the task below include: 

a) Describe human factors and their cybersecurity  

consequences on business operations 

b) Appraise cybersecurity standards and governance  requirements to safeguard humans users within an  

organisation

Submission 

12-week duration: Due by 11:55pm AEST/AEDT Sunday end of  Module 4(Week 4). 

6-week duration: Due by Due by 11:55pm AEST/AEDT Sunday end  of Module 4 (Week 2).

Weighting 

25%

Total Marks 

100 marks


Assessment Task 

Write a 500-word (+/- 10%) report about the human factor in a company’s cybersecurity  environment. The report will explore the influence of the human factor in cybersecurity and the  legal or other regulatory requirements that apply to cybersecurity practices. The content of the  report must be supported by relevant diagrams. 

Please refer to the instructions section below for details of how to complete this task. 

Context 

Cybersecurity is a broad field that includes many different areas of expertise. Anyone working in  cybersecurity must possess a basic knowledge of field related terminology and general procedures.  This includes knowledge of key technical and organisational methods that can be used to implement  security measures, how the human factor influences key decisions regarding which security methods  to implement and why the human factor needs to be addressed when setting up a cybersecurity  project. In this assessment you will need to write a report which addresses specific questions around

that knowledge in order to prepare you for your future studies and work in cybersecurity related  roles. 

Instructions 

To complete this assessment task, you must write a 500-word (+/- 10%) report discussing the  importance of the human factor in a company’s cybersecurity environment. Please review all  learning resources for Modules 1-3 prior to writing the report. 

The content of the report should: 

o provide a definition of cybersecurity 

o explain why addressing cybersecurity is an ongoing task for an organisation o discuss recent cybersecurity threats and attacks and how they are exploited by  hackers 

o evaluate attack vectors that are not user-specific (e.g., brute-force password attack) o evaluate successful attack vectors which are specific to human activities (user specific) 

o discuss the role of governance, which is based on cybersecurity frameworks and  determines the regulations and/or laws that are required for effective cybersecurity  practices 

o include a list of applicable local (Australian) and international laws and branch specific regulations that have been created by business organisations. (Please  ensure that you include indirect regulations that require cyber security measures),  and; 

o include relevant diagrams which demonstrate the relationships between human  activity, cybersecurity threats and cybersecurity attack vectors. 

The report should be written for people with very limited technical knowledge. 

In addition to the recommended readings from Modules 1-3 you must support your report with  further information obtained by reviewing peer reviewed articles and textbooks. Search specifically  using the terms “cybersecurity governance” and “human factors in cybersecurity”. 

Please review the Academic Skills page for further support with formatting your report: Report Writing – Academic Skills – Assessment Preparation – Library at Torrens 

Referencing 

It is essential that you use current APA style for citing and referencing the sources that you use.  Please see more information on citing and referencing guidelines on the Academic Skills webpage

Submission Instructions 

Submit this task via the Assessment 1 link in the main navigation menu in CPO442 Cybersecurity  Principles and Organisational Practice. The Learning Facilitator will provide feedback via the Grade  Centre in the LMS portal. Feedback can be viewed in My Grades. 

Academic Integrity 

All students are responsible for ensuring that all work submitted is their own, is academically written  and appropriately referenced following the Academic Writing Guide. Students also need to have  read and be aware of Torrens University Australia Academic integrity policy and procedures and  subsequent penalties for academic misconduct. These are available online. 

Students must also keep a copy of all submitted material and any assessment drafts. 

Special Consideration 

To apply for special consideration for a modification to an assessment task or exam due to  unexpected or extenuating circumstances, please consult the Assessment Policy for Higher Education Coursework and ELICOS and, if applicable to your circumstance, submit a completed  Application for Assessment Special Consideration Form to your Learning Facilitator.


Assessment Rubric

Assessment  

Attributes

Fail 

(Yet to achieve  

minimum standard) 

0-49%

Pass  

(Functional) 

50-64%

Credit  

(Proficient) 

65-74%

Distinction  

(Advanced) 

75-84%

High Distinction  

(Exceptional) 

85-100%

Importance of  

cybersecurity explained;  explanation supported  with diagrams. 

Total Percentage for  this Assessment  

Attribute = 20%

No or only rudimentary  explanation of the  

importance of  

cybersecurity for an  

organisation. 

No supporting diagrams.

General explanation of  

the importance of  

cybersecurity for an  

organisation; no  

justification of its  

importance provided. 

No supporting diagrams.

Clear explanation of  

the importance of  

cybersecurity for an  

organisation; some  

justification of the  

implementation of  

cybersecurity  

projects. 

At least one diagram  

showing increases in  

attacks or amount of  

damage caused.

Comprehensive  

explanation of the  

importance of  

cybersecurity for an  

organisation; solid  

justification of the  

implementation of  

cybersecurity  

projects. 

At least two diagrams  

showing increases in  

attacks or amount of  

damage caused.

Expert explanation of  

the importance of  

cybersecurity for an  

organisation; solid  

and detailed  

justification of the  

implementation of  

cybersecurity  

projects. 

More than two diagrams  showing increases in  

attacks and amount of  

damage caused.

Explanation and  

justification of why  

cybersecurity is an  

ongoing task; points  supported with sourced  diagrams.

No explanation or  

justification of why  

cybersecurity is an  

ongoing task. 

No explanation of the  concept of threat  

evolution and the ensuing

Brief explanation and  

justification of why  

cybersecurity is an ongoing  task. 

Brief explanation of the  

concept ofthreat evolution  and the ensuing change of

Some explanation and  

justification of why  

cybersecurity is an ongoing  task. 

Clear explanation of the  concept ofthreat evolution  and the ensuing change of

Comprehensive explanation  and justification of why  cybersecurity is an ongoing  task. 

Comprehensive explanation  of the concept of threat  evolution and the ensuing

Expert explanation and  justification of why  

cybersecurity is an ongoing  task. 

Expert explanation of the  concept ofthreat evolution  and the ensuing change of


Total Percentage for  this Assessment  

Attribute = 10%

change ofservices. 

No supporting diagrams.

services. 

No supporting diagrams.

services. 

One diagram thatsupports  a particular concept or  

topic included and  

referenced.

change ofservices. 

Two diagramsthatsupport  particular concepts or  

topics included and  

referenced.

services. 

More than two diagrams  that support particular  concepts ortopicsincluded  and referenced.

Role of governance,  local and international  legislation and  

regulations in  

cybersecurity. 

Total Percentage for  this Assessment  

Attribute = 30%

No awareness of the role  of governance, local  

and/or international  

legislation and regulations  around cybersecurity or  data privacy  

demonstrated.

A limited list of applicable  laws provided demonstrates a  basic awareness of the role of  governance, local and/or  international cybersecurity  regulations and data privacy  legislation.

A partial list of applicable  laws provided and  

identification of regulations  for business areas  

demonstrate a competent  understanding of the role of  governance, local and/or  international cybersecurity  regulations and data privacy  legislation.

An almost complete list of  applicable laws provided,  with brief discussion of  indirect laws included  

demonstrate a detailed  understanding of the role of  governance, local and/or  international cybersecurity  regulations and data privacy  legislation.

A complete list of applicable  laws provided, with  

sufficient discussion of  indirect laws included  

demonstrate an exemplary  and comprehensive  

understanding of the role of  governance, local and/or  international cybersecurity  regulations and data privacy  legislation.

Identification and  

evaluation of generic  attack vectors 

Total Percentage for  this Assessment  

Attribute = 15%

No attack vectors  

identified.

Two attack vectors identified. 

Three attack vectors  

identified and evaluated.

Four attack vectors  

identified and evaluated.

Five or more attack vectors  identified and evaluated.

Identification and  

evaluation of user 

centric attack vectors

No user centric attack  

identified.

One user centric attack vector  identified.

Two user centric attack  vectors identified and  

evaluated.

Three user centric attack  vectors identified and  

evaluated.

Four or more user centric  attack vectorsidentified and  evaluated.

Total Percentage for  this Assessment  

Attribute = 15%






Report conformsto  

academic writing  

conventions 

Total Percentage for  this Assessment  

Attribute = 4%

Poor level of appropriate  language. Punctuation,  spelling, style, tone and  grammar are often  

inadequately expressed or  used incorrectly.

Adequate level of 

appropriate language.  

Punctuation, spelling, style,  tone and grammar are  

adequately expressed but are  often incorrect.

Good level of appropriate  language. Punctuation,  spelling, style, tone and  grammar are sometimes  incorrect.

Excellent use of language  Punctuation,spelling,style,  tone and grammar are well  expressed and correct. 

Report is understandable  and coherently phrased.

Highly sophisticated use of  language. Punctuation,  spelling, style, tone and  grammar are very well  

expressed and correct. 

.

Consistent use of  

reliable resources 

Total Percentage for  this Assessment  

Attribute = 3%

Demonstratesinconsistent  use of sources to support  and develop ideas.

Demonstrates use of sources  to support and develop some  ideas.

Demonstrates use of  

sourcesto support and  

develop most ideas.

Demonstrates use of  

sources to support and  develop almost all ideas.

Demonstrates use ofsources  to support and develop all  ideas.

Referencing/Correct  

citation of resources 

Total Percentage for  this Assessment  

Attribute = 3%

Citations follow no  

discernible referencing  format or pattern of  

frequent citation errors.

Citations follow APA style  format with several citation  errors.

Most citations are correctly  cited following APA style  with no more than two  citation errors.

Nearly all citations are  

correctly cited following  APA style with no more  than one citation error.

All citations are correctly  cited following APA style.