MIS761 Cyber Security Strategies Task 2 Assignment | Deakin University
MIS761 – Cyber Security Strategies
Trimester 3, 2025
Assessment Task 2 – Group Assignment:
Cyber Security Review
DUE DATE AND TIME: 27th Jan. 2025, 8 PM (AEDT)
PERCENTAGE OF FINAL GRADE: Weighting = 35 %
HURDLE DETAILS: No Assignment Hurdle
Learning Outcome Details
Unit Learning Outcome (ULO) |
Graduate Learning Outcome (GLO) |
ULO3: Apply relevant security policies and technologies in the creation of cybersecurity solutions that align with an organisation’s business goals and aspirations. |
GLO1: Discipline-specific knowledge and capabilities. GLO5: Problem solving. |
ULO4: Develop adaptive solutions for authentic and real-world security issues within an organisation’s cybersecurity service management. |
GLO1: Discipline-specific knowledge and capabilities. GLO4: Critical thinking. GLO5: Problem solving. |
Assessment Feedback:
Students who submit their work by the due date will receive their Marks and Feedback within 15 Working Days on Cloud Deakin.
Assignment Description/Requirements
Thisis a group assignment, and you must be a member of and contribute to the group effort in order to submit your assignment and receive a mark.
You are required to work in groups of two-three (2-3) students. Your overall task is to conduct a comprehensive cybersecurity review of a real-life business entity, which you will source yourselves. This involves using a structured questionnaire derived from the NIST Cybersecurity Framework 2.0. Your task will be to assess the current cybersecurity posture of the business, develop a target profile that aligns with its business needs and regulatory environment, and propose a detailed action plan to address identified gaps. You should present your review in the form of a Business Report in the format provided in Report Structure and Layout Format below.
IMPORTANT: There is NO random assignment for this project. If you are unable to find teammates, you will be required to complete the project individually, with all requirements and assessment criteria remaining unchanged.
The maximum word count for the report is 3500 +/- 10% words. (Note that Reference List, Appendices and Tables are not included in the word count)
Team Meetings
Your team is required to meet (virtually or physically) regularly. You must conduct the meetings at a mutually agreed upon time.
Each team member is expected to attend and contribute to each meeting or offer a valid apology if absent.
NOTE: It is strongly advised that you use Microsoft Teams for all communications (Deakin University’s Office 365 subscription provides Teams to all students).
IMPORTANT: You are required to document (i.e., record meeting minutes) your meeting discussions and decisions. This includes meeting details (e.g. date, time, who was present for the meeting, absentees/apologies, action items and deadlines, allocated team members etc.) including regular inter-team communications.
The topics that should be covered in these Meetings are as follows:
• List who is Chairing the meeting, attendees, apologies and non-attendees (why?). • Each member is to report back on action items, progress and deliverable outcomes completed. • Describe what tasks you are currently working on?
• Discuss what you plan to do next?
• Identify any roadblocks you are facing as a group and as individuals?
• Discuss and develop possible resolutions, noting assigned/reassigned personnel resources.
Remember the essence of these meetings is that they are short and sharp and let the team know what everyone is working on at any given time, what the potential roadblocks are and if there are any major issues that need to be addressed.
In addition to your team meetings, time will be allocated in some of our seminars for you to work on the assignment.
You need to provide evidence of your team meetings in the final project report documenting team
attendance and 2 key outcomes from each meeting. The meeting minutes are presented in the report Appendix.
Selecting a Business Organisation to Investigate
If you are in doubt about the suitability of the organisation which you have chosen, please check with your Tutor as early as possible. The business owner or a manager from the organisation MUST also approve your review and will need to sign the Letter of Consent (please refer to Report Structure and Layout Format below).
Some suggested types of businesses/organisations for this review are:
• A family business or other small business;
• A community library, sporting association or other NGO/NPO;
• A department within a larger business;
Note: The organization does not need to be located in Australia.
Hint for Entity Selection: The key consideration is whether you can gather sufficient evidence to assess and score the categories across the six functions of the NIST CSF 2.0 framework. To help determine this, consider the following questions:
• Does the organization have logical assets that could potentially be targeted or stolen? • Does it use networking technologies to interact with staff, supply chains, or loyal customers? • Does it have an IT infrastructure with potential concerns about data breaches or unauthorized access?
Positive answers to these questions suggest that the organization would be a suitable candidate for your analysis.
Data Collection
For this assessment, you will evaluate the business’s cybersecurity practices using a detailed questionnaire that aligns with the NIST Cybersecurity Framework. The questionnaire covers 22 categories across the six functions of the framework. You are required to:
• Rate Each Category: Assess and score each category on a scale from 0-4, based on the degree to which the business has implemented the corresponding cybersecurity measures. • Document Findings: For each statement in the questionnaire, provide not only a score but also a description of how the business demonstrates compliance or falls short of the framework’s criteria. Use NIST’s Implementation Examples as a reference to understand potential ways of meeting each criterion. Remember, these examples are not exhaustive, and deviation from them does not automatically imply a failure to meet the standard. • Customize the Questionnaire: Consider tailoring the questionnaire to include additional questions on specific subcategories that are particularly relevant to your target profile analysis. This customization will allow for deeper investigation into areas of keen interest or concern.
Data collection can be conducted through various methods, including face-to-face, email, or phone interviews with key personnel such as the managing director, business owner, or IT manager. This flexibility allows you to engage with businesses remotely if necessary, such as those located in different countries. Real-time interviews are highly recommended as they allow for immediate follow-up questions, providing deeper insights into the business’s cybersecurity practices and the rationale behind them. Additionally, consider exploring the business organization’s website and any policy documents provided by the organization to supplement your findings. This approach ensures a comprehensive understanding of the business’s cybersecurity practices and the contextual factors influencing them.
IMPORTANT: Solely relying on public information (e.g., company website) without interviewing internal personnel will not provide a report of sufficient quality. A comprehensive understanding of the business’s cybersecurity practices requires direct insights from key personnel and access to internal context not available publicly.
Assignment Business Report
Audience
Your business report is intended for your group’s client business owner/manager. Therefore, the style and tone of the report should take this into consideration. You should write the report in a professional business style, selecting appropriate fonts and styles and writing in a constructive (non critical) manner appropriate to be read by the business owner or manager.
We suggest you review this resource at the outset:
Report Structure and Layout Format
Your business report should consist of the following sections.
Title Page
Disclaimer
You MUST include the following disclaimer on a separate page (see below).
IMPORTANT NOTICE: DISCLAIMER
This report, including any recommendations contained therein, was prepared for the purposes of academic assessment in Deakin University’s unit:
• MIS761 – Cyber Security Strategies.
It should not be relied upon, or used in any way as a basis for making any “real-life” commercial decisions.
The assistance of (insert pseudonym of organisation) in providing us with access to its staff and records in the course of researching the report is gratefully acknowledged. For confidentiality and privacy, any identifying details of the organization have been intentionally de-identified.
Copyright © 2024 (insert names of students) All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the author.
Letter of Consent
You MUST submit the signed Letter of Consent to by Dec 20, 2024 (Week 7):
Dept. of Information Systems and Business Analytics
Deakin Business School, Faculty of Business and Law
Deakin University
LETTER OF CONSENT
MIS761 – Assignment – CYBER SECURITY REVIEW REPORT
Dr. Wilson Li
Dept. of Information Systems and Business Analytics
Deakin University
221 Burwood Hwy
Burwood 3125
Phone: (03) 9244 6370
Email: [email protected]
……. / ……. / 2024
Dear Wilson,
I/we hereby give permission for the following students:
………………………………………………………..
………………………………………………………..
………………………………………………………..
to review the cybersecurity aspects of our business organisation:
…………………………………………………………………………………………………………….. to fulfill the Assignment requirements for MIS761.
I/we have read the Assignment requirements, and understand that:
• The final report will use a pseudonym for our organization and will contain de-identified information to minimize any recognition of our organization.
• The signed Letter of Consent will be submitted to a secure system accessible only to the unit chair (Dr. Wilson Li) and will not be included in the final report.
• The students will adhere to professional standards and handle all information responsibly throughout the review process.
I/we expect to receive a copy of the final assignment report, containing the results of the review, during the week beginning 17th February 2025.
Yours sincerely,
……………………………………………………….. (signed)
……………………………………………………….. (Please Print Name)
……………………………………………………….. (Work email address)
Executive Summary (approximately 150 words)
Provide an overview of key findings from the review, intended for the business owner. Table of Contents (separate page)
Introduction (approximately 100 words)
Provide an overview of the following:
• Introduction to the cyber security resilience review.
• The organisation name, industry, location and brief business background.
• Scope, aims and constraints for the review.
Report Body: Business Background and Context (approximately 450 words)
Provide a description of the organisational context in terms of potential organisational influences on cyber security strategy, including:
• Business Profile and Strategic Goals: Provide an overview of the business, including its mission and vision, the products and services it offers, and its strategic goals. This summary should illustrate the business’s aspirations, market positioning, and how it plans to grow and innovate. This foundation helps align cybersecurity strategies to the business’s overall objectives.
• Regulatory and Compliance Landscape: Outline the regulatory, compliance, and industry specific requirements that influence business strategy. Discuss how legal obligations, industry standards, and expectations from stakeholders (such as customers, business partners, and regulators) impact strategic planning and cybersecurity needs, ensuring that the business maintains trust and meets its obligations within the market.
• Threat Landscape: Provide a general description of the threat landscape the business faces, considering factors such as the industry, region, and size of the business. Highlight specific threats that are more prevalent or damaging given the business’s operational context.
• Organizational Resources: Discuss the resources available to the business that may influence its cybersecurity strategy. This includes financial, personnel, and technological resources. Note any limitations or strengths that could impact cybersecurity planning and execution.
General description of the threat landscape the business faces (consider the industry, region, size).
Report Body: Review of Current and Target Profile of Cyber Security Posture (approximately 1700 words)
Current Profile:
• Summarize the business’s existing cybersecurity postures across all six NIST functions (Govern, Identify, Protect, Detect, Respond, Recover). For each function, provide an overall rating based on category-level scores from the questionnaire and explain the rationale behind these scores. Avoid repeating detailed justifications for each category; direct readers to the appendix for more in-depth information if needed.
• Describe how the business currently achieves or falls short in each function, detailing specific practices, technologies, and policies in place. You may summarize or directly quote from the
questionnaire responses (e.g., “Refer to Answer to Qxx”) to support your points.
• Highlight both strengths and weaknesses, providing a comprehensive view of the cybersecurity landscape of the business.
• Additionally, discuss the underlying reasons why the firm is succeeding or failing in these areas, examining factors like resource allocation, employee training, and technology adoption.
Target Profile:
• Focus on three selected NIST functions. This analysis should reflect the business’s unique context, including its threat environment, regulatory requirements, and strategic business objectives.
• In developing the target profile, consider the organization’s risk tolerance and anticipate changes to its cybersecurity posture that may arise from new business requirements (e.g., demands from current clients, prospective customers, and/or business partners), regulatory changes, adoption of new technologies, and evolving trends in cybersecurity threat intelligence. Define clear cybersecurity goals that are responsive to these dynamic factors, ensuring the proposed measures are robust yet adaptable to anticipated changes.
• This profile should articulate a vision for enhanced cybersecurity practices that align with both immediate needs and future challenges, emphasizing a proactive approach to security planning.
Report Body: Gap Analysis and Action Plan (approximately 1000 words)
• Identify and discuss the most significant gaps between the current and target profiles. Offer a holistic perspective on these gaps (i.e., evaluating how identified gaps are interconnected and might affect various aspects of the organization), considering potential risks and the impact of not addressing these issues.
• Develop a detailed action plan to bridge these gaps, including specific initiatives, technologies to be adopted, policy changes, or training programs. Refer to the NIST CSF 2.0 Informative References and Implementation Examples to gain deeper insights and practical examples that can guide your development of effective strategies.
• Define clear metrics for evaluating the effectiveness of the proposed improvements and ensure that the action plan is actionable within 18 months.
• When proposing realistic timelines and budgets, include actual figures provided during interviews with the business or, if not available, base your estimates on a well-informed understanding of the business’s resources, including leadership support, financial capacity, and talent/personnel availability.
Conclusion (approximately 100 words)
Conclude the report, highlighting your main findings and immediate prioritised recommendations.
Appendix A: Reference List
You must correctly use the APA7 style of referencing, and include in-text citations when quoting, referring to, summarising, or paraphrasing from any sources and tools:
Appendix B: Questionnaire Results
Please include the questionnaire answers (with the scores and a summarized finding for each question to support your assessment of the score)
Appendix C: Team Meeting Minutes
Appendix D: Provide a statement of the contribution made by each group member. This statement should be agreed upon and considered by all respective group members.
Student Name |
Student ID |
Contribution (%) |
Other Appendices may be attached as needed.
Submission Instructions
You must submit your assignment in Word file format in the Assignment Dropbox in the unit Cloud Deakin site on or before the due date (8pm on 27th January 2025). When uploading your assignment, name your document using the following syntax: <GroupNum_MIS761_Assignment2.doc (or ‘.docx’). For example, ‘Group_MIS761_Assignment2.doc’.
IMPORTANT: Before submitting the final report, you are required to submit interim files according to the timeline below. These files will support the assessment of “Report Presentation and Submission Progress” in your rubric. No extensions will be granted for submitting these progress files. Please submit each interim file to the Assignment Dropbox, with the exception of the Signed Letter of Consent and Questionnaire Results, which should be submitted via.
Progress File |
File Name |
Submission Deadline |
Team Minutes 1 |
<GroupNum_MIS761_TM1.doc> |
Dec 6, 2024 Week 5 |
Signed Letter of Consent |
\ |
Dec 20, 2024 Week 7 |
Questionnaire Results |
\ |
Dec 20, 2024 Week 7 |
Team Minutes 2 |
<GroupNum_MIS761_TM2.doc> |
Dec 20, 2024 Week 7 |
Draft of Current Profile |
<GroupNum_MIS761_P1.doc> |
Jan 10, 2025 Week 8 |
Draft of Target Profile |
<GroupNum_MIS761_P2.doc> |
Jan 17, 2025 Week 9 |
Team Minutes 3 |
<GroupNum_MIS761_TM3.doc> |
Jan 17, 2025 Week 9 |
Draft of Gap Analysis and Action Plan |
<GroupNum_MIS761_P3.doc> |
Jan 24, 2025 Week 10 |
Note: While you may create multiple sets of Team Minutes, only three are required to be submitted before the final report deadline. All Team Minutes must be attached within the final report.
Submitting a hard copy of this assignment is not required. You must keep a backup copy of every assignment you submit until the marked assignment has been returned to you. In the unlikely event that one of your assignments is misplaced you will need to submit your backup copy.
Any work you submit may be checked by electronic or other means for the purposes of detecting collusion and/or plagiarism and for authenticating work.
When you submit an assignment through your Cloud Deakin unit site, you will receive an email to your Deakin email address confirming that it has been submitted. You should check that you can see your assignment in the Submissions view of the Assignment Dropbox folder after upload and check for, and keep, the email receipt for the submission.
Marking and feedback
The marking rubric indicates the assessment criteria for this task. It is available in the Cloud Deakin unit site in the Assessment folder, under Assessment Resources. Criteria act as a boundary around the task and help specify what assessors are looking for in your submission. The criteria are drawn from the ULOs and align with the GLOs. You should familiarise yourself with the assessment criteria before completing and submitting this task.
Students who submit their work by the due date will receive their marks and feedback on Cloud Deakin 15 working days after the submission date.
Extensions
Extensions can only be granted for exceptional and/or unavoidable circumstances outside of your control. Requests for extensions must be made by 12 noon on the submission date using the online Extension Request form under the Assessment tab on the unit CloudDeakin site. All requests for extensions should be supported by appropriate evidence (e.g., a medical certificate in the case of ill health).
Applications for extensions after 12 noon on the submission date require University level special consideration and these applications must be must be submitted via Student Connect in your Deakin Sync site.
Late submission penalties
If you submit an assessment task after the due date without an approved extension or special consideration, 5% will be deducted from the available marks for each day after the due date up to seven days*. Work submitted more than seven days after the due date will not be marked and will receive 0% for the task. The Unit Chair may refuse to accept a late submission where it is unreasonable or impracticable to assess the task after the due date. *’Day’ means calendar day for electronic submissions.
An example of how the calculation of the late penalty based on an assignment being due on a Monday at 8:00pm is as follows:
• 1 day late: submitted after Monday 11:59pm and before Tuesday 11:59pm– 5% penalty. • 2 days late: submitted after Tuesday 11:59pm and before Wednesday 11:59pm – 10% penalty. • 3 days late: submitted after Wednesday 11:59pm and before Thursday 11:59pm – 15% penalty. • 4 days late: submitted after Thursday 11:59pm and before Friday 11:59pm – 20% penalty. • 5 days late: submitted after Friday 11:59pm and before Saturday 11:59pm – 25% penalty. • 6 days late: submitted after Saturday 11:59pm and before Sunday 11:59pm – 30% penalty. • 7 days late: submitted after Sunday 11:59pm and before Monday 11:59pm – 35% penalty.
The Dropbox closes the Monday after 11:59pm AEST/AEDT time.
Support
The Division of Student Life provides a range of Study Support resources and services, available throughout the academic year, including Writing Mentor and Maths Mentor online drop ins and the SmartThinking 24 hour writing feedback service at this link. If you would prefer some more in depth and tailored support, make an appointment online with a Language and Learning Adviser.
Referencing and Academic Integrity
Deakin takes academic integrity very seriously. It is important that you (and if a group task, your group) complete your own work in every assessment task Any material used in this assignment that is not your original work must be acknowledged as such and appropriately referenced. You can find information about referencing (and avoiding breaching academic integrity) and other study support resources at the following website:
Your rights and responsibilities as a student
As a student you have both rights and responsibilities. Please refer to the document Your rights and responsibilities as a student in the Unit Guide & Information section in the Content area in the CloudDeakin unit site.
Use of Generative AI
Deakin University has a student guide to using generative AI (). Your submitted assignment should be your own work. It is NOT acceptable to find a generative AI tool to write your assignment. Never use generative AI to do the work that you are being assessed on. It is your responsibility to write and create your own assignments. Instead, you might use generative AI with cautions:
• as learning tool (not directly related to an assessment)
• to delve into a new topic but then go on to use credible sources to cite in your writing • to selectively take on feedback to improve your writing
Details:
If you use generative AI to assist you to improve this assignment, it is necessary for you to acknowledge the use of generative AI appropriately (). However, always ensure that your final submitted assessment is your own work, creation, and analysis.
Our university has offered the support service for students to use generative AI critically and ethically, and acknowledge the use of generative AI appropriately ().
Leave A Comment