MN623: Cyber security analytics Assignment help for Melbourne institute
Choose Your Path of Success With Us!
In today’s interconnected world, the rise of cyber security threats involve a significant challenge to individuals, businesses, and governments alike. As our lives become more interconnected through digital platforms, so do the opportunities for cybercriminals to exploit people have also increased. To address this increasing need for cyber defense, Melbourne Institute offers the MN623 Cyber Security Analytics course, an empowering course that provides students with the knowledge and skills to become cyber-protecting, the digital frontier against ever-evolving threats. But the assignment related to that course is very lengthy and takes a lot of time to complete it. Students should use this time to do practical work on cyber security. Therefore, we provide the best services for completing your cyber security assignments with greater efficiency and dedication.
About us:
Welcome to “MN623 Cyber Security Analytics Assignment Help for Melbourne Institute”. We work for students who desire tension-free success with less effort. Our services will act as a gateway for you. Our experts or writers have both practical and theoretical experience and knowledge about cyber security analyses that assist you in boosting your grades in your academic tasks. And our expert minds can complete your all academic requirements by providing the most unique quality services on cyber security analytics assignments.
The overall solutions provided by us will be completely fulfilled with extensive analysis and research that helps you in getting absolute and complete assistance in your academic work also.
We are known for providing completely original and error-free, and plague-free assignment solutions. So, do not take any extra tension, all type of specialized assistance is available by our expert writers and nothing is difficult for them.
So place your order as soon as possible. You can call or email and also connect with us on our official website.
T2-23 Assignment 1 Details and Submission Guidelines |
|
Unit Code |
MN623 |
Unit Title |
Cyber Security and Analytics |
Assessment Type |
Individual Assignment |
Assessment Title |
Implementation and evaluation of penetration testing tools |
Purpose of the assessment (with ULO Mapping) |
This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. • Analyze cyber security vulnerabilities using ethical hacking methodologies. |
Weight |
10% |
Total Marks |
30 Marks |
Word limit |
1000 to 1500 words |
Due Date |
Assignment 1- Week 3, 11:59 pm, 6/8/23 |
Submission Guidelines |
• Submit Assignment 1 in a word document in week3. • Allwork must be submitted on Moodle by the due date • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on allfoursides of your page with appropriate section headings. • Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE Transactions on Networking referencing style. • Students must ensure before submission of final version of the assignment that the similarity percentage as computed by Turnitin must be less than 10% Assignments. |
Extension |
If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at: https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy |
Academic Misconduct |
Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning orzero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with thefull policy and procedure available at http://www.mit.edu.au/about-mit/institute publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct Policy-Procedure. For further information, pleaserefer to the Academic Integrity Section in your Unit Description. |
Prepared by: Dr Ajay Shiv Sharma Moderated by: Dr Praneel Chand July’23
MN623Cyber Security and Analytics Page 2 of 5
Purpose of Assignment
Assignment 1 is based on analyzing cyber security vulnerabilities using ethical hacking methodologies and explain the reasons, benefits, and some regulatory requirements for penetration testing.
The 2023 Critical Infrastructure Resilience Strategy (the Strategy) defines critical infrastructure as: those physical facilities, supply chains, information technologies and communication networks, which if destroyed, degraded or rendered unavailable for an extended period, would significantly impact the social or economic wellbeing of the nation, or affect Australia’s ability to conduct national defence and ensure national security.
The students will explore organisation’s need for critical infrastructure protection and document findings according to organisational requirements
Assignment Structure and submission guidelines
Assignment 1 is a formative assessment, and it focuses on the importance of penetration testing, industry leading tools used for penetration testing and a review of security testing tools. The students will develop and document critical infrastructure protection plan according to organisational policies and procedures. Write and submit a report for Assignment 1.
Assignment Tasks
1) The penetration tester does vulnerabilities assessment task with written legal permission from the target organization. Explain the reasons, benefits, and some regulatory requirements for penetration testing. (5 Marks)
2) There are several security testing tools available in the market. Present the industry leading tools used for penetration testing? (5 Marks)
3) a) Research organisation’s need for critical infrastructure protection and document findings according to organisational requirements. (8 Marks) b) Develop and document critical infrastructure protection plan according to organisational policies and procedures. (8 Marks)
4) References (4 Marks)
Prepared by: Dr Ajay Shiv Sharma Moderated by: Dr Praneel Chand July’23
MN623Cyber Security and Analytics Page 3 of 5
Marking criteria:
Assignment Tasks |
Marks |
1) Explain the reasons, benefits, and some regulatory requirements for penetration testing. 2) There are several security testing tools available in the market. Present the industry leading tools used for penetration testing? 3) a) Research organisation’s need for critical infrastructure protection and document findings according to organisational requirements. b) Develop and document critical infrastructure protection plan according to organisational policies and procedures. 4) Follow IEEE Transactions on Networking reference style (should have both in-text citation and reference list) |
5 Marks 5 Marks 8 Marks 8 Marks 4 Marks |
Total Marks |
30 Marks |
Prepared by: Dr Ajay Shiv Sharma Moderated by: Dr Praneel Chand July’23
MN623Cyber Security and Analytics Page 4 of 5 Marking Rubric
Grades |
HD |
D |
Credit |
P |
N (fail) |
Assignment Report |
All the points are pertinent and covered in detail and provide good summary of the literature and activity performed in the assessment. |
Mostly points are pertinent and covered in detail and provide good summary of the literature and activity performed in the assessment. |
Many points are pertinent and covered in detail and provide summary of the literature and activity performed in theassessment. |
Few points are pertinent and covered in detail and provide outline of the literature and activity performed in the assessment. |
Many points are not pertinent and not clear and summary is not provided for the activity. |
IEEE Reference style |
Clearly and completely followed IEEE style for citation (within) and references (at the end of) the document, number of citations is not accounted for. |
Minor in corrections but followed IEEE style for citation (within) and references (at the end of) the document, number of citation is not accounted for. |
Some in corrections but followed IEEE style for citation (within) and references (at the end of) the document, number of citation is not accounted for |
Many in corrections and not followed IEEE style for citation (within) and references (at the end of) the document, number of citation is not accounted for |
No Referencing/ citation present at all |
Prepared by: Dr Ajay Shiv Sharma Moderated by: Dr Praneel Chand July’23