CPO442 Cybersecurity Principles & Organisational Practice Assignment Help

ASSESSMENT 1 BRIEF

Subject Code and Title

CPO442 Cybersecurity Principles and Organisational Practice

Assessment

Report

Individual/Group

Individual

Length

500 words (+/- 10%) plus diagrams

Learning Outcomes

The Subject Learning Outcomes demonstrated by successful  completion of the task below include:

a) Describe human factors and their cybersecurity

consequences on business operations

b) Appraise cybersecurity standards and governance  requirements to safeguard humans users within an

organisation

Submission

12-week duration: Due by 11:55pm AEST/AEDT Sunday end of  Module 4(Week 4).

6-week duration: Due by Due by 11:55pm AEST/AEDT Sunday end  of Module 4 (Week 2).

Weighting

25%

Total Marks

100 marks

 

Assessment Task

Write a 500-word (+/- 10%) report about the human factor in a company’s cybersecurity  environment. The report will explore the influence of the human factor in cybersecurity and the  legal or other regulatory requirements that apply to cybersecurity practices. The content of the  report must be supported by relevant diagrams.

Please refer to the instructions section below for details of how to complete this task.

Context

Cybersecurity is a broad field that includes many different areas of expertise. Anyone working in  cybersecurity must possess a basic knowledge of field related terminology and general procedures.  This includes knowledge of key technical and organisational methods that can be used to implement  security measures, how the human factor influences key decisions regarding which security methods  to implement and why the human factor needs to be addressed when setting up a cybersecurity  project. In this assessment you will need to write a report which addresses specific questions around

that knowledge in order to prepare you for your future studies and work in cybersecurity related  roles.

Instructions

To complete this assessment task, you must write a 500-word (+/- 10%) report discussing the  importance of the human factor in a company’s cybersecurity environment. Please review all  learning resources for Modules 1-3 prior to writing the report.

The content of the report should:

o provide a definition of cybersecurity

o explain why addressing cybersecurity is an ongoing task for an organisation o discuss recent cybersecurity threats and attacks and how they are exploited by  hackers

o evaluate attack vectors that are not user-specific (e.g., brute-force password attack) o evaluate successful attack vectors which are specific to human activities (user specific)

o discuss the role of governance, which is based on cybersecurity frameworks and  determines the regulations and/or laws that are required for effective cybersecurity  practices

o include a list of applicable local (Australian) and international laws and branch specific regulations that have been created by business organisations. (Please  ensure that you include indirect regulations that require cyber security measures),  and;

o include relevant diagrams which demonstrate the relationships between human  activity, cybersecurity threats and cybersecurity attack vectors.

The report should be written for people with very limited technical knowledge.

In addition to the recommended readings from Modules 1-3 you must support your report with  further information obtained by reviewing peer reviewed articles and textbooks. Search specifically  using the terms “cybersecurity governance” and “human factors in cybersecurity”.

Please review the Academic Skills page for further support with formatting your report: Report Writing – Academic Skills – Assessment Preparation – Library at Torrens

Referencing

It is essential that you use current APA style for citing and referencing the sources that you use.  Please see more information on citing and referencing guidelines on the Academic Skills webpage.

Submission Instructions

Submit this task via the Assessment 1 link in the main navigation menu in CPO442 Cybersecurity  Principles and Organisational Practice. The Learning Facilitator will provide feedback via the Grade  Centre in the LMS portal. Feedback can be viewed in My Grades.

Academic Integrity

All students are responsible for ensuring that all work submitted is their own, is academically written  and appropriately referenced following the Academic Writing Guide. Students also need to have  read and be aware of Torrens University Australia Academic integrity policy and procedures and  subsequent penalties for academic misconduct. These are available online.

Students must also keep a copy of all submitted material and any assessment drafts.

Special Consideration

To apply for special consideration for a modification to an assessment task or exam due to  unexpected or extenuating circumstances, please consult the Assessment Policy for Higher Education Coursework and ELICOS and, if applicable to your circumstance, submit a completed  Application for Assessment Special Consideration Form to your Learning Facilitator.

Assessment Rubric

Assessment

Attributes

Fail

(Yet to achieve

minimum standard)

0-49%

Pass

(Functional)

50-64%

Credit

(Proficient)

65-74%

Distinction

(Advanced)

75-84%

High Distinction

(Exceptional)

85-100%

Importance of

cybersecurity explained;  explanation supported  with diagrams.

Total Percentage for  this Assessment

Attribute = 20%

No or only rudimentary  explanation of the

importance of

cybersecurity for an

organisation.

No supporting diagrams.

General explanation of

the importance of

cybersecurity for an

organisation; no

justification of its

importance provided.

No supporting diagrams.

Clear explanation of

the importance of

cybersecurity for an

organisation; some

justification of the

implementation of

cybersecurity

projects.

At least one diagram

showing increases in

attacks or amount of

damage caused.

Comprehensive

explanation of the

importance of

cybersecurity for an

organisation; solid

justification of the

implementation of

cybersecurity

projects.

At least two diagrams

showing increases in

attacks or amount of

damage caused.

Expert explanation of

the importance of

cybersecurity for an

organisation; solid

and detailed

justification of the

implementation of

cybersecurity

projects.

More than two diagrams  showing increases in

attacks and amount of

damage caused.

Explanation and

justification of why

cybersecurity is an

ongoing task; points  supported with sourced  diagrams.

No explanation or

justification of why

cybersecurity is an

ongoing task.

No explanation of the  concept of threat

evolution and the ensuing

Brief explanation and

justification of why

cybersecurity is an ongoing  task.

Brief explanation of the

concept ofthreat evolution  and the ensuing change of

Some explanation and

justification of why

cybersecurity is an ongoing  task.

Clear explanation of the  concept ofthreat evolution  and the ensuing change of

Comprehensive explanation  and justification of why  cybersecurity is an ongoing  task.

Comprehensive explanation  of the concept of threat  evolution and the ensuing

Expert explanation and  justification of why

cybersecurity is an ongoing  task.

Expert explanation of the  concept ofthreat evolution  and the ensuing change of

 

Total Percentage for  this Assessment

Attribute = 10%

change ofservices.

No supporting diagrams.

services.

No supporting diagrams.

services.

One diagram thatsupports  a particular concept or

topic included and

referenced.

change ofservices.

Two diagramsthatsupport  particular concepts or

topics included and

referenced.

services.

More than two diagrams  that support particular  concepts ortopicsincluded  and referenced.

Role of governance,  local and international  legislation and

regulations in

cybersecurity.

Total Percentage for  this Assessment

Attribute = 30%

No awareness of the role  of governance, local

and/or international

legislation and regulations  around cybersecurity or  data privacy

demonstrated.

A limited list of applicable  laws provided demonstrates a  basic awareness of the role of  governance, local and/or  international cybersecurity  regulations and data privacy  legislation.

A partial list of applicable  laws provided and

identification of regulations  for business areas

demonstrate a competent  understanding of the role of  governance, local and/or  international cybersecurity  regulations and data privacy  legislation.

An almost complete list of  applicable laws provided,  with brief discussion of  indirect laws included

demonstrate a detailed  understanding of the role of  governance, local and/or  international cybersecurity  regulations and data privacy  legislation.

A complete list of applicable  laws provided, with

sufficient discussion of  indirect laws included

demonstrate an exemplary  and comprehensive

understanding of the role of  governance, local and/or  international cybersecurity  regulations and data privacy  legislation.

Identification and

evaluation of generic  attack vectors

Total Percentage for  this Assessment

Attribute = 15%

No attack vectors

identified.

Two attack vectors identified.

Three attack vectors

identified and evaluated.

Four attack vectors

identified and evaluated.

Five or more attack vectors  identified and evaluated.

Identification and

evaluation of user

centric attack vectors

No user centric attack

identified.

One user centric attack vector  identified.

Two user centric attack  vectors identified and

evaluated.

Three user centric attack  vectors identified and

evaluated.

Four or more user centric  attack vectorsidentified and  evaluated.

Total Percentage for  this Assessment

Attribute = 15%

Report conformsto

academic writing

conventions

Total Percentage for  this Assessment

Attribute = 4%

Poor level of appropriate  language. Punctuation,  spelling, style, tone and  grammar are often

inadequately expressed or  used incorrectly.

Adequate level of

appropriate language.

Punctuation, spelling, style,  tone and grammar are

adequately expressed but are  often incorrect.

Good level of appropriate  language. Punctuation,  spelling, style, tone and  grammar are sometimes  incorrect.

Excellent use of language  Punctuation,spelling,style,  tone and grammar are well  expressed and correct.

Report is understandable  and coherently phrased.

Highly sophisticated use of  language. Punctuation,  spelling, style, tone and  grammar are very well

expressed and correct.

.

Consistent use of

reliable resources

Total Percentage for  this Assessment

Attribute = 3%

Demonstratesinconsistent  use of sources to support  and develop ideas.

Demonstrates use of sources  to support and develop some  ideas.

Demonstrates use of

sourcesto support and

develop most ideas.

Demonstrates use of

sources to support and  develop almost all ideas.

Demonstrates use ofsources  to support and develop all  ideas.

Referencing/Correct

citation of resources

Total Percentage for  this Assessment

Attribute = 3%

Citations follow no

discernible referencing  format or pattern of

frequent citation errors.

Citations follow APA style  format with several citation  errors.

Most citations are correctly  cited following APA style  with no more than two  citation errors.

Nearly all citations are

correctly cited following  APA style with no more  than one citation error.

All citations are correctly  cited following APA style.