ICT5350 Securing IT Systems Assignment Help
Assessment Brief: ICT5350 Securing IT Systems
Trimester 2, 2024
Assessment Overview
equiv. – equivalent word count based on the Assessment Load Equivalence Guide. It means this assessment is equivalent to the normally expected time requirement for a written submission containing the specified number of words.
Note for all assessments tasks:
-
Students can generate/modify/create text generated by AI. They are then asked to modify the text according to the brief of the assignment.
-
During the preparation and writing of an assignment, students use AI tools, but may not include any AI-generated material in their final report.
-
AI tools are used by students in researching topics and preparing assignments, but all AI-generated content must be acknowledged in the final report as follows:
Assessment 1: Weekly Workshop Activity
Assessment Details:
Practical exercises assess students’ ability to apply theoretical learning to practical, real-world situations on a weekly basis. The practical exercises will improve student’s ability to practice information security using Linux/Kali Linux platform such as phishing attack, encryption and steganography and other functions.
Students will be required to complete the practical exercises during the workshop and therefore, attendance is required as part of this assessment. Students will not be assessed on work that not produced in workshop so that attendance is required as part of this assessment. Students are required to submit the work that they have completed during the workshop session only. The details of the lab work and requirements are provided on the online learning system.
Assessment 1 Marking Criteria and Rubric
The assessment will be marked out of 100 and will be weighted 20% of the total unit mark. The marking criteria and rubric are shown on the following page.
Assessment 1 Marking Criteria and Rubric
Assessment 2: Quiz
Assessment Details:
This assessment also includes an invigilated quiz that will assess your ability to understand theoretical materials and your knowledge of key content areas. The quiz will be either multiple choice questions or short questions that are relevant to the lectures of lecture materials. For successful completion of the quiz, you are required to study the material provided (lecture slides, tutorials, and reading materials) and engage in the unit’s activities. The prescribed textbook and lecture slides are the main reference along with the recommended reading materials.
Assessments 2 Marking Criteria and Rubric
The assessment will be marked out of 100 and will be weighted 20% of the total unit mark.
Assessment 3: Case Study: Part I
Assessment Details:
Assessment Title: Comprehensive Analysis of a Notable Cybersecurity Breach
Objective: This assessment requires students to perform a thorough investigation into a significant cybersecurity breach. The aim is to understand the breach’s root causes, the strategies employed by the attackers, vulnerabilities exploited, and the broader impact of the incident.
Word Count: 1000 words, excluding references
Format: Individual assignment
Detailed Instructions
-
Case Overview:
-
Describe the cyber-attack, providing a detailed narrative and timeline of events.
-
Identify the stakeholders affected by the attack (e.g., employees, customers, business partners).
-
Use real-world data and examples to support your description.
-
-
Initial Point of Compromise:
-
Investigate how the attackers first breached the system.
-
Explain the methods used (e.g., phishing, malware, social engineering).
-
-
Propagation Mechanisms:
-
Analyze how the attack moved laterally within the network.
-
Discuss techniques such as credential theft, exploiting software vulnerabilities, or using malicious tools.
-
-
Exploited Vulnerabilities:
-
Identify the specific vulnerabilities that were exploited by the attackers.
-
Provide a detailed explanation of how these vulnerabilities were leveraged.
-
-
Human Errors:
-
Examine any mistakes made by individuals that facilitated the attack.
-
Consider errors such as weak passwords, lack of security training, or failure to apply patches.
-
-
Tools and Techniques:
-
Describe the tools (e.g., malware, hacking software) and techniques (e.g., phishing, brute force attacks) used by the attackers.
-
Explain how these tools and techniques were employed to carry out the attack.
-
Potential Cybersecurity Incidents for Analysis:
-
2013 Target Corporation Data Breach
-
2017 Equifax Data Breach
-
2018 Facebook–Cambridge Analytica Data Scandal
-
2020 SolarWinds Cyber Espionage
-
2020 Twitter Bitcoin Scam
-
Australian National University Data Breach, 2018
-
JBS Foods Ransomware Attack, 2021
-
Irish Health Service Executive Ransomware Attack, 2021
Alternatively, students can suggest their own case incident for analysis after obtaining approval from the lecturer.
Note: Students are expected to use credible sources, including academic journals, industry reports, and official statements, to support their analysis. Proper citation and adherence to academic integrity are mandatory.
Note: Students need to find a detailed timeline for the selected attack as this will be extended in Assessment 4.
Assessment 4: Case Study: Part II Final security incident response plan.
Assessment Details:
Assessment Title: Advanced Cybersecurity Incident Analysis and Response Plan
Overview
Building on the foundational analysis conducted in Assessment 3, this assessment requires you to develop a comprehensive Incident Response Plan. Your plan should be approximately 4500 words, excluding references, and include detailed strategies for incident response, remediation measures, and lessons learned to improve future cybersecurity resilience.
Objective:
-
Develop a comprehensive Incident Response Plan.
-
Analyze firewall logs and integrate findings into the response plan.
-
Provide an incident report and remediation plan.
-
Conduct a constraint analysis of projected actions.
Word Count: 4500 words, excluding references.
Format: Individual assignment
Guidelines:
-
Utilize the incident response template provided by as a reference.
-
The response plan should be tailored to the specific incident analysed in the first assignment, incorporating specific details and nuances of that incident.
Detailed Instructions
-
Roles and Responsibilities:
-
Define and rationalize roles and responsibilities, including Points of Contact (POC), Cyber Incident Response Team (CIRT), and Senior Executive Management Team (SEMT).
-
Ensure clarity on who will be involved in the response process and their specific duties.
-
-
Communications:
-
Create an internal and external communications plan.
-
Outline how information will be disseminated during the incident, including stakeholders and the public.
-
-
Supporting Procedures and Playbooks:
-
Develop Standard Operating Procedures (SOPs) and playbooks relevant to the case study.
-
Include detailed steps for responding to similar incidents in the future.
-
-
Sector, Jurisdictional, and National Arrangements:
-
Demonstrate understanding and application of sector-specific, jurisdictional, and national arrangements.
-
Address compliance with relevant regulations and coordination with external bodies.
-
-
Firewall Log Analysis:
-
Provide a detailed analysis of firewall logs related to the case study.
-
Highlight key insights and interpret the data to inform the incident response.
-
-
Incident Notification and Reporting:
-
Cover legal and regulatory requirements for incident notification and reporting.
-
Discuss insurance matters and ensure thorough coverage.
-
-
Containment, Evidence & Remediation:
-
Detail the steps for containing the incident and collecting evidence.
-
Develop a comprehensive remediation action plan.
-
-
Recovery:
-
Outline a clear and practical recovery plan, including ‘stand down’ procedures.
-
Ensure the plan is actionable and considers potential constraints.
-
-
References:
-
Provide clear evidence of a wide range of relevant, current, and credible sources.
-
Ensure adherence to formatting requirements and proper citation.
-
Note: This assessment builds upon assessment 3, in which students analysed a selected cyber or cyber-enabled incident. This assessment aims to test your ability to synthesize incident analysis with practical response strategies, emphasizing real-world applicability and adherence to existing cybersecurity frameworks and best practices. The response plan should be actionable, well-researched, and reflective of the complexities involved in managing cybersecurity incidents.
Assessment Criteria

Leave A Comment