MN623: Cyber security analytics Assignment help for Melbourne institute

Choose Your Path of Success With Us!

In today’s interconnected world, the rise of cyber security threats involve a significant challenge to individuals, businesses, and governments alike. As our lives become more interconnected through digital platforms, so do the opportunities for cybercriminals to exploit people have also increased. To address this increasing need for cyber defense, Melbourne Institute offers the MN623 Cyber Security Analytics course, an empowering course that provides students with the knowledge and skills to become cyber-protecting, the digital frontier against ever-evolving threats. But the assignment related to that course is very lengthy and takes a lot of time to complete it. Students should use this time to do practical work on cyber security. Therefore, we provide the best services for completing your cyber security assignments with greater efficiency and dedication.

About us:

Welcome to “MN623 Cyber Security Analytics Assignment Help for Melbourne Institute”. We work for students who desire tension-free success with less effort. Our services will act as a gateway for you. Our experts or writers have both practical and theoretical experience and knowledge about cyber security analyses that assist you in boosting your grades in your academic tasks. And our expert minds can complete your all academic requirements by providing the most unique quality services on cyber security analytics assignments.

The overall solutions provided by us will be completely fulfilled with extensive analysis and research that helps you in getting absolute and complete assistance in your academic work also.

We are known for providing completely original and error-free, and plague-free assignment solutions. So, do not take any extra tension, all type of specialized assistance is available by our expert writers and nothing is difficult for them.

So place your order as soon as possible. You can call or email and also connect with us on our official website.

T2-23 Assignment 1 Details and Submission Guidelines

Unit Code

MN623

Unit Title

Cyber Security and Analytics

Assessment Type

Individual Assignment

Assessment Title

Implementation and evaluation of penetration testing tools

Purpose of the assessment (with ULO Mapping)

This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

Analyze cyber security vulnerabilities using ethical hacking methodologies.

Weight

10%

Total Marks

30 Marks

Word limit

1000 to 1500 words

Due Date

Assignment 1- Week 3, 11:59 pm, 6/8/23

Submission

Guidelines

Submit Assignment 1 in a word document in week3.

Allwork must be submitted on Moodle by the due date

The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on allfoursides of your page with appropriate section headings. Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE Transactions on Networking referencing style.

Students must ensure before submission of final version of the assignment that the similarity percentage as computed by Turnitin must be less than 10% Assignments.

Extension

If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at: https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy

Academic

Misconduct

Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning orzero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with thefull policy and procedure available at http://www.mit.edu.au/about-mit/institute

publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct Policy-Procedure. For further information, pleaserefer to the Academic Integrity Section in your Unit Description.

Prepared by: Dr Ajay Shiv Sharma Moderated by: Dr Praneel Chand July23

MN623Cyber Security and Analytics Page 2 of 5

Purpose of Assignment

Assignment 1 is based on analyzing cyber security vulnerabilities using ethical hacking  methodologies and explain the reasons, benefits, and some regulatory requirements for  penetration testing.

The 2023 Critical Infrastructure Resilience Strategy (the Strategy) defines critical infrastructure as: those physical facilities, supply chains, information technologies and communication networks,  which if destroyed, degraded or rendered unavailable for an extended period, would significantly  impact the social or economic wellbeing of the nation, or affect Australia’s ability to conduct  national defence and ensure national security.

The students will explore organisation’s need for critical infrastructure protection and document  findings according to organisational requirements

Assignment Structure and submission guidelines

Assignment 1 is a formative assessment, and it focuses on the importance of penetration testing,  industry leading tools used for penetration testing and a review of security testing tools. The  students will develop and document critical infrastructure protection plan according to  organisational policies and procedures. Write and submit a report for Assignment 1.

Assignment Tasks

1) The penetration tester does vulnerabilities assessment task with written legal permission from the target  organization. Explain the reasons, benefits, and some regulatory requirements for penetration testing. (5 Marks)

2) There are several security testing tools available in the market. Present the industry leading tools used for penetration testing? (5 Marks)

3) a) Research organisation’s need for critical infrastructure protection and document findings according to  organisational requirements. (8 Marks) b) Develop and document critical infrastructure protection plan according to organisational policies and  procedures. (8 Marks)

4) References (4 Marks)

Prepared by: Dr Ajay Shiv Sharma Moderated by: Dr Praneel Chand July23

MN623Cyber Security and Analytics Page 3 of 5

Marking criteria:

Assignment Tasks

Marks

1) Explain the reasons, benefits, and some regulatory requirements for penetration  testing. 

2) There are several security testing tools available in the market. Present the industry  leading tools used for penetration testing?

3) a) Research organisation’s need for critical infrastructure protection and document  findings according to organisational requirements. 

b) Develop and document critical infrastructure protection plan according to  organisational policies and procedures. 

4) Follow IEEE Transactions on Networking reference style (should have both in-text citation and reference list)

5 Marks 

5 Marks 

8 Marks  

8 Marks 

4 Marks

Total Marks

30 Marks

Prepared by: Dr Ajay Shiv Sharma Moderated by: Dr Praneel Chand July23

MN623Cyber Security and Analytics Page 4 of 5 Marking Rubric

Grades

HD

D

Credit

P

N (fail)

Assignment

Report

All the points are

pertinent and

covered in detail and provide good

summary of the

literature and activity performed in the

assessment.

Mostly points are pertinent and covered in detail and provide good summary of the

literature and activity performed in the assessment.

Many points are pertinent and covered in detail and provide

summary of the

literature and activity performed in theassessment.

Few points are pertinent and covered in detail and provide outline of the literature and activity performed in the assessment.

Many points are not pertinent and not clear and summary is not provided for the activity.

IEEE Reference style

Clearly and completely followed IEEE style for citation (within) and references (at the end of) the document, number of citations is not accounted for.

Minor in corrections but followed IEEE style for citation

(within) and references (at the end of) the document,

number of citation is not

accounted for.

Some in corrections but followed IEEE style for citation

(within) and references (at the end of) the document,

number of citation is not

accounted for

Many in corrections and not followed IEEE

style for citation (within) and references (at the end of) the document,

number of citation is not

accounted for

No Referencing/ citation present at all

Prepared by: Dr Ajay Shiv Sharma Moderated by: Dr Praneel Chand July23