ICT5352 Cyber Security Management Trimester-3 Assignment Help
Assessment Overview
Assessment Task | Type | Weighting | Due | Length | ULOs |
---|---|---|---|---|---|
Assessment 1: Workshop Quiz Students will complete in class workshop including situation analyses and practical application of skills. | Individual Invigilated | 20% | Week 4 | 1 hour (equiv. 1000 words) | ULO1 ULO2 |
Assessment 2: Report Threat and Risk Assessment Report. | Individual | 30% | Week 6 | 2500 words | ULO3 ULO4 |
Assessment 3a: Report Students will develop an Information Security Roadmap for a given situation. Assessment 3b: Presentation The Information Security Roadmap generated in part A will be presented in a plenary session to the class. | Group Invigilated | Part A 20% Part B 10% | Part A Week 10 Part B Weeks 10, 11 | Part A 3000 words Part B (equiv. 1500 words) | ULO1 ULO2 ULO3 ULO4 |
Assessment 4: Critique Report Students will be allocated a roadmap from another group submitted as part of Assessment 3. Each student will prepare a critique on that report identifying strengths and weaknesses in the report and providing | Individual | 20% | Week 12 | 1500 words | ULO1 ULO2 ULO3 ULO4 |
equiv. – equivalent word count based on the Assessment Load Equivalency Guide. It means this assessment is equivalent to the normally expected time requirement for a written submission containing the specified number of words.
Assessment 1: Workshop Quiz
Due date: | Week 4 |
Group/individual: | Individual |
Word count/Time provided: | 1 hour (equiv. 1000 words) |
Weighting: | 20% |
Unit Learning Outcomes: | ULO1, ULO2 |
Assessment 1 Detail
Students will complete a class workshop quiz including situation analyses and practical application of skills. This assessment covers the topics of Week 1 and Week 2. The quiz will be conducted individually and under your instructor’s invigilation in the class of Week 4. The student must attend the class in Week 4 to perform this quiz.
The Quiz has two parts:
Part 1: 20 Multiple-choice (MC) questions
Part 2: 10 short answer questions
You need to answer all questions.
Assessment 1 Marking Criteria and Rubric
The assessment will be marked out of 100 and will be weighted 20% of the total unit mark. The marking criteria and rubric are shown on the following page.
Assessment 2: Report
Due date: | Week 6 |
Group/individual: | Individual |
Word count/Time provided: | 2500 words |
Weighting: | 30% |
Unit Learning Outcomes: | ULO3, ULO4 |
Assessment 2 Detail
Threat and Risk Assessment Report
XYZ Ltd. is a medium-sized company specializing in providing software development services to various industries. The company has been operational for 8 years and has a growing client base that includes both small and large enterprises. XYZ Ltd. stores sensitive client information, including intellectual property, contracts, and financial data, on its internal systems and cloud-based solutions. Recently, the company has experienced an increase in cyber threats and is concerned about the security of its data and systems.
Assumptions
• Operating Systems:
o Servers: Windows Server 2019
o Workstations: Windows 10/11 Pro and macOS
o Mobile Devices: iOS and Android
• Cloud Services: AWS (Amazon Web Services) for cloud infrastructure, including EC2, S3, and RDS.
• Database: PostgreSQL 13
• Development Tools: GitHub for version control and Jenkins for CI/CD pipelines. • Network Security: Basic firewall and VPN setup for remote access.
• Data Storage: Client data is stored in both on-premises and cloud-based PostgreSQL databases.
Use reasonable assumptions for any additional required information, such as which network architecture is used, applications, etc.
You need to write a threat and risk assessment report. The report will be graded based on the following components:
1. Identification of potential risks
• The student accurately identifies and describes potential vulnerabilities in the company’s systems, network, and sensitive information.
• The student identifies and describes potential cyber threats facing the organization, including current trends and techniques used by attackers. (This point and the previous point are referred to them as the threat analysis in the marking rubric)
• The identified vulnerabilities and threats should lead to at least ten risks.
2. Risk assessment
• The student presents a comprehensive risk analysis, which includes the classification of impacted assets.
• The student provides a thorough analysis of the likelihood and impact of each risk.
• The student uses quantitative risk assessment or qualitative risk assessment as appropriate. The report must include both quantitative and qualitative risk assessments.
• The student uses the risk matrix to present a clear and actionable picture of the overall risk to the organization.
3. Recommendations for risk response
• The student provides clear and practical recommendations for the appropriate risk response for the identified risks.
• The student demonstrates an understanding of industry best practices and standards for information security.
4. Presentation and organization
• The student presents the information in a clear and organized manner.
• The report is well-written and easy to understand.
5. Research and references
• The student uses credible sources to support the analysis and recommendations. • The student properly cites all sources used in the report.
Assessments 2 Marking Criteria and Rubric
The assessment will be marked out of 100 and will be weighted 30% of the total unit mark. The marking criteria and rubric are shown on the following page.
Assessment 2 Marking Criteria and Rubric
Marking Criteria | Not Satisfactory (0-49% of the criterion mark) | Satisfactory (50-64% of the criterion mark) | Good (65-74% of the criterion mark) | Very Good (75-84% of the criterion mark) | Excellent (85-100% of the criterion mark) |
Identification of potential risks (30 marks) | The student does not identify any potential risks or provides an inadequate analysis and no threat analysis. | The student identifies a minimal number of potential risks and basic threat analysis. | The student identifies a few potential risks with providing a basic threat analysis. | The student identifies several potential risks, along with providing a clear threat analysis. | The student demonstrates a thorough understanding of the company’s systems, along with providing a clear and specific threat analysis. |
Risk assessment (30 marks) | The student does not present a risk analysis and risk matrix. | The student presents a minimal or inadequate risk analysis and risk matrix. | The student presents a risk quantitative and qualitative analysis and risk matrix that may lack detail or accuracy. | The student presents a detailed quantitative and qualitative risk analysis and risk matrix, but they may not be completely accurate or actionable. | The student presents a comprehensive and accurate quantitative and qualitative risk analysis, using a risk matrix that presents a clear and actionable picture of the overall risk to the organisation. |
Recommendations for risk response (20 marks) | Student does not provide any recommendations for the appropriate risk response, or the recommendations provided are not practical or do not demonstrate an understanding of industry best practices and standards for information security. | Student provides some recommendations for the appropriate risk response, but they are weak or missing key components. | Student provides basic recommendations for the appropriate risk response, but they are not well supported or do not demonstrate a strong understanding of industry best practices and standards for information security. | Student provides clear and practical recommendations for the appropriate risk response and demonstrates a good understanding of industry best practices and standards for information security. | Student provides clear, practical, and well supported recommendations for the appropriate risk response, and demonstrates an in depth understanding of industry best practices and standards for information security. |
Presentation and organization (10 marks) | The student presents the information in an inadequate or unorganized manner, with severe issues in writing and understanding. | The student presents the information in a limited or disorganized manner, with significant issues in writing and understanding. | The student presents the information in an adequate manner, but the report may have some issues in organization and writing. | The student presents the information in an organized manner, but the report may have some minor issues in writing and understanding. | The student presents the information in a clear and organised manner, with well-written and easy-to understand report. |
Research and references (10 marks) | The student does not use any sources to support their analysis and recommendations or does not cite sources correctly. | The student uses minimal sources to support their analysis and recommendations, and may not cite all sources used in the report or may not use exclusively reputable sources. | The student uses a limited number of sources to support their analysis and recommendations, and may not cite all sources used in the report or may not use exclusively reputable sources. | The student uses a variety of sources to support their analysis and recommendations, but may not cite all sources used in the report or may not use exclusively reputable sources. | The student uses a variety of reputable sources to support their analysis and recommendations, and correctly cites all sources used in the report. |
Assessment 3a: Report
Due date: | Week 10 |
Group/individual: | Group |
Word count/Time provided: | 3000 words |
Weighting: | 20% |
Unit Learning Outcomes: | ULO1, ULO2, ULO3, ULO4 |
Assessment 3a Detail
Students will develop an Information Security Roadmap for a given situation.
Your group (a maximum of three members) has been hired as an information security consultant by a selected Company/Organisation that operates in one of the listed industries below. They store sensitive information such as client’s intellectual property and financial data on their network and cloud infrastructure. The company/organization has been experiencing a rise in cyber-attacks and is concerned about the security of their sensitive information and the potential impact on their operations and reputation. The company’s management team has asked your group to develop an Information Security Roadmap that aligns with their strategic objectives and addresses the identified risks and incidents.
By Week 4, each group will be allocated one of the following industries:
1. Banks
2. Healthcare providers
3. Retail companies
4. Educational institutions
5. Government agencies
6. Technology companies
7. Energy companies
8. Manufacturing companies
9. Transport and logistics companies
10. Insurance companies
11. Service providers (e.g., consulting, legal, accounting)
12. Non-profit organizations
13. Media and entertainment companies
14. Telecommunications companies
15. Pharmaceutical companies
Each group will select a specific real-world company/organization that belongs to their allocated industry. The group should gather any required information from the selected company’s official website (or any other authentic sources). Otherwise, reasonable assumptions should be used for any required information that could not be obtained officially about the selected company.
The report will be graded based on the following components:
1. Strategic Objectives
• The student accurately identifies the company’s strategic objectives and explains how the information security plan aligns with them.
• The student demonstrates an understanding of the company’s goals and objectives and how they relate to information security.
2. Risk Assessment
• The student conducts a thorough risk assessment, identifying potential vulnerabilities, threats, and risks (at least 10 risks) facing the company’s systems, network and cloud infrastructure, and sensitive information.
• The student provides a clear and actionable picture of the overall risk to the organization.
3. Information Security Program
• The student develops a comprehensive security program that includes appropriate controls and treatments for the identified risks.
• The student demonstrates an understanding of industry best practices and standards for information security.
4. Incident Management and Response
• The student develops a clear and comprehensive incident management and response plan that includes procedures for identifying, reporting, and responding to security incidents (at least 10 incidents).
• The student demonstrates an understanding of incident response best practices.
5. Implementation Roadmap Plan
• The student provides a clear and comprehensive implementation plan that includes timelines, resources, and milestones required to implement the security program and incident management.
• The student demonstrates an understanding of information security roadmap best practices.
6. Presentation and Organisation
• The student presents the information in a clear and organized manner.
• The report is well-written and easy to understand.
7. Research and References
• The student uses credible sources to support the analysis and recommendations, and properly cites all sources used in the report.
• The student demonstrates an understanding of research and referencing best practices
Assessment 3b: Presentation
Due date: | Week 10, Week 11 |
Group/individual: | Group |
Word count/Time provided: | (equiv. 1500 words) |
Weighting: | 10% |
Unit Learning Outcomes: | ULO1, ULO2, ULO3, ULO4 |
Assessment 3b Detail
The Information Security Roadmap generated in part A will be presented in a plenary session to the class.
The presentation should focus on the main findings and recommendations of the report, including the strategic objectives, risk assessment, security program, incident management and response, implementation plan, monitoring and evaluation, and any other relevant information.
The presentation should cover the main elements of the report within 15 minutes (5 minutes for each member).
During the presentation, all group members should actively participate and take turns presenting different parts of the report. The group members should also be prepared to answer any questions or clarifications at the end of the presentation.
This presentation will be graded based on the group’s ability to effectively communicate the main findings and recommendations of the report, as well as their ability to answer any questions and engage with the class during the presentation. The presentation skills and response to the questions will be marked individually (see the Criteria and Rubric for more details).
The presentation should be delivered in a clear and organized manner, and the slides should be well designed, visually appealing, and easy to read.
Assessment 3 Marking Criteria and Rubric
The assessment will be marked out of 100 and will be weighted 30% of the total unit mark. The marking criteria and rubric are shown on the following page.
Assessment 3 Marking Criteria and Rubric
Marking Criteria | Not Satisfactory (0-49% of the criterion mark) | Satisfactory (50-64% of the criterion mark) | Good (65-74% of the criterion mark) | Very Good (75-84% of the criterion mark) | Excellent (85-100% of the criterion mark) |
Strategic Objectives (8 marks) | The student does not identify the company’s strategic objectives or provide an explanation of how the information the security plan aligns with them. | The student identifies some of the company’s strategic objectives, but does not provide a clear or complete explanation of how the the information security plan aligns with them. | The student identifies the company’s strategic objectives, but does not provide a clear explanation of how the information the security plan aligns with them. | The student identifies the company’s strategic objectives and provides a general explanation of how the information security plan aligns with them. | The student accurately identifies the company’s strategic objectives and provides a clear and detailed explanation of how the information security plan aligns with them. |
Risk Assessment (8 marks) | The student does not identify any potential vulnerabilities, threats, and risks facing the company or provides an inadequate analysis of likelihood and impact. | The student identifies a minimal number of potential vulnerabilities, threats, and risks facing the company, or provides an inadequate analysis of likelihood and impact. | The student identifies a few potential vulnerabilities, threats, and risks facing the company, but the risk assessment may lack detail. | The student identifies several potential vulnerabilities, threats, and risks facing the company, but the risk assessment may not be as complete as the Excellent Level | The student conducts a thorough risk assessment and identifies multiple potential vulnerabilities, threats, and risks facing the company. The student provides a clear and actionable picture of the overall risk to the organisation. |
Information Security Program (15 marks) | The student does not develop a security program or the program is not relevant to the identified risks. | The student develops a security program that includes minimal controls and treatments for identified risks, or the program may not be relevant to the identified risks. | The student develops a security program that includes some controls and treatments for identified risks, but the program may lack detail or not fully address all risks. | The student develops a security program that includes appropriate controls and treatments for identified risks, but the program may not be as comprehensive as the Excellent Level. | The student develops a comprehensive security program that includes appropriate controls and treatments for identified risks. The student demonstrates an understanding of industry best practices and standards for information security. |
Incident Management and Response (15 marks) | The student does not develop an incident management and response plan or the plan is not relevant to the identified risks. | The student develops an incident management and response plan that includes minimal procedures for identifying, reporting, and responding to security incidents, or the plan may not be relevant to the identified risks. | The student develops an incident management and response plan that includes some procedures for identifying, reporting, and responding to security incidents, but the plan may lack detail or not fully address all aspects of incident | The student develops an incident management and response plan that includes procedures for identifying, reporting, and responding to security incidents, but the plan may not be as comprehensive as the Excellent Level. | The student develops a clear and comprehensive incident management and response plan that includes procedures for identifying, reporting, and responding to security incidents. The student demonstrates an understanding of incident response best practices. |
Implementation roadmap Plan (15 marks) | The student does not provide an implementation plan or the plan is not relevant to the identified risks. | The student provides an implementation plan that includes minimal timelines, resources, and milestones required to implement the security program and incident management and response plan, or the plan may not be relevant to the identified risks. | The student provides an implementation plan that includes some timelines, resources, and milestones required to implement the security program and incident management and response plan, but the plan may lack detail or not fully address all aspects of implementation. | The student provides an implementation plan that includes timelines, resources, and milestones required to implement the security program and incident management and response plan, but the plan may not be as comprehensive as the Excellent Level. | The student provides a clear and comprehensive implementation plan that includes timelines, resources, and milestones required to implement the security program and incident management and response plan. The student demonstrates an understanding of project management best practices. |
Presentation and Organization (3 marks) | The student presents the information in an inadequate or unorganized manner, with severe issues in writing and understanding. | The student presents the information in a limited or disorganized manner, with significant issues in writing and understanding. | The student presents the information in an adequate manner, but the report may have some issues in organization and writing. | The student presents the information in an organized manner, but the report may have some minor issues in writing and understanding. | The student presents the information in a clear and organised manner, with well-written and easy-to understand report. |
Research and References (3 marks) | The student does not use any sources to support their analysis and recommendations or does not cite sources correctly. | The student uses minimal sources to support their analysis and recommendations, and may not cite all sources used in the report or may not use exclusively reputable sources. | The student uses a limited number of sources to support their analysis and recommendations, and may not cite all sources used in the report or may not use exclusively reputable sources. | The student uses a variety of sources to support their analysis and recommendations, but may not cite all sources used in the report or may not use exclusively reputable sources. | The student uses a variety of reputable sources to support their analysis and recommendations, and correctly cites all sources used in the report. |
Content (9 marks) Group | The presentation does not cover any of the main elements of the report or includes inaccuracies. | The presentation covers a minimal number of the main elements of the report and includes minimal relevant information, or the information provided may not be accurate. | The presentation covers some of the main elements of the report and includes some relevant information, but may lack detail or accuracy in many areas. | The presentation covers most of the main elements of the report and includes relevant information, but may lack detail or accuracy in some areas. | The presentation effectively covers all the main elements of the report and includes relevant and accurate information. |
Organization and Visual Aids (9 marks) Group | The presentation is not organized and is difficult to follow. The visual aids are not used in the presentation, or they are so poorly designed and unprofessional that they detract from the overall effectiveness of the presentation. | The presentation is minimally organized, and may lack detail or have many inconsistencies. The visual aids are poorly designed, unprofessional, and do not effectively support the content of the presentation. | The presentation is somewhat organized but may lack detail or have many inconsistencies. The visual aids are functional, but may not be as well-designed or professional at the higher levels. | The presentation is generally well-organized, but may lack detail or have some inconsistencies. The visual aids are well designed and support the content of the presentation, but there may be some minor errors or inconsistencies. | The presentation is well organised, easy to follow, and logical. The presentation is easy to follow and understand. The visual aids are well designed, professional, and effectively support the content of the presentation. |
Presentation Skills (9 marks) Individual | The student does not present the information in a clear, concise, and confident manner, and has many issues with verbal and nonverbal communication. | The student presents the information in a minimal manner, and may lack confidence or have many issues with verbal and nonverbal communication. | The student presents the information in a general manner, and may lack confidence or have many issues with verbal and nonverbal communication. | The student presents the information in a clear and concise manner, but may lack confidence or have some issues with verbal and nonverbal communication. | The student presents the information in a clear, concise, and confident manner, and demonstrates good verbal and nonverbal communication skills. |
Knowledge (6 marks) Individual | Lack or poor knowledge of the topic is presented, and most questions were left unanswered. | Basic knowledge of the topic is presented, and many questions were left unanswered. | Good understanding of some parts of topic is presented, but few elements went unanswered. | Very Good understanding of most parts of topic. The response was informative, but few elements went unclear. | Extensive knowledge of the topic is presented. The member showed complete understanding of assignment. Accurately answered all questions posed. |
Assessment 4: Critique Report
Due date: | Week 12 |
Group/individual: | Individual |
Word count/Time provided: | 1500 words |
Weighting: | 20% |
Unit Learning Outcomes: | ULO1, ULO2, ULO3, ULO4 |
Assessment 4 Detail
Students will be allocated a roadmap from another group submitted as part of Assessment 3. Each student will prepare a critique on that report identifying strengths and weaknesses in the report and providing recommendations for improvement.
The critique should focus on evaluating the report’s content, organization, and presentation, as well as the effectiveness of the security program, incident management and response, implementation plan, monitoring and evaluation, and any other relevant information.
The student should aim to provide a balanced critique that identifies both the strengths and weaknesses of the report and provides specific examples to support their evaluation. The student should also provide relevant and feasible recommendations for improvement, highlighting areas where the report could be enhanced or strengthened.
The critique should be presented in a clear, well-organized and logical manner, using appropriate language, grammar, and free of errors. The critique should be easy to follow and understand.
The critique will be graded based on the student’s ability to effectively evaluate the report and provide relevant and feasible recommendations for improvement. The critique should also be well organized, easy to follow and understand, and the language used should be appropriate and free of errors.
Submission: Each student has to submit his/her critique as a report (pdf file) containing the following components:
1. Identification of Strengths
2. Identification of Weaknesses
3. Recommendations for Improvement
Assessments 4 Marking Criteria and Rubric
The assessment will be marked out of 100 and will be weighted 20% of the total unit mark. The marking criteria and rubric are shown on the following page.
Assessment 4 Marking Criteria and Rubric
Marking Criteria Total: 40 marks | Not Satisfactory (0-49% of the criterion mark) | Satisfactory (50-64% of the criterion mark) | Good (65-74% of the criterion mark) | Very Good (75-84% of the criterion mark) | Excellent (85-100% of the criterion mark) |
Identification of Strengths (30 marks) | The student does not identify any strengths in the report or the evaluation is not relevant to the report. | The student identifies minimal strengths in the report and provides minimal examples to support their evaluation, or the evaluation may not be relevant to the report. | The student identifies some strengths in the report and provides examples to support their evaluation, but the evaluation may lack detail or not fully address all strengths. | The student identifies a range of strengths in the report and provides examples to support their evaluation, but the evaluation may lack detail or not fully address all strengths. | The student identifies a comprehensive range of strengths in the report and provides specific examples to support their evaluation. or the evaluation may not be relevant to the report. |
Identification of Weaknesses (30 marks) | The student does not identify any weaknesses in the report or the evaluation is not relevant to the report. | The student identifies minimal weaknesses in the report and provides minimal examples to support their evaluation, or the evaluation may not be relevant to the report. | The student identifies some weaknesses in the report and provides examples to support their evaluation, but the evaluation may lack detail or not fully address all weaknesses. | The student identifies a range of weaknesses in the report and provides examples to support their evaluation, but the evaluation may lack detail or not fully address all weaknesses. | The student identifies a comprehensive range of weaknesses in the report and provides specific examples to support their evaluation. |
Recommendations for Improvement (30 marks) | The student does not provide any recommendations for improvement or the recommendations are not relevant to the report. | The student provides minimal recommendations for improvement that are relevant and specific, or the recommendations may not be relevant to the report. | The student provides some recommendations for improvement that are relevant and specific, but may lack detail or not fully address all areas for improvement. | The student provides a range of recommendations for improvement that are relevant and specific, but may lack detail or not fully address all areas for improvement. | The student provides a comprehensive range of recommendations for improvement that are relevant, specific, and feasible. |
Organization and Clarity (10 marks) | The student presents the critique in a disorganized and difficult to follow manner, and the language used has errors that affect the understanding of the critique. | The student presents the critique in a minimal organized manner, and may lack detail or have many inconsistencies. The language used may have many errors. | The student presents the critique in a somewhat organized manner, but may lack detail or have many inconsistencies. The language used is appropriate, but may have some errors. | The student presents the critique in a generally clear and well-organized manner, but may lack detail or have some inconsistencies. The language used is appropriate, but may have some errors. | The student presents the critique in a clear, well organised, and logical manner, easy to follow and understand. The language used is appropriate, grammatically correct and free of errors. |
Leave A Comment