0% found this document useful (0 votes)
182 views2 pages

ISYS1002 Cybersecurity Assignment 1: Task Description

aaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxx

Uploaded by

RK user
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
182 views2 pages

ISYS1002 Cybersecurity Assignment 1: Task Description

aaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxaaxasxxxxxxxxxxxxxxxxxxxxxxxxx

Uploaded by

RK user
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ISYS1002 Cybersecurity

Assignment 1

Task: Report
Unit Objectives: LO1, LO2 Task 5: let's assume that the university website is one
of the most critical information assets of the
Due Date: Sunday of Week 3, 11:59 pm
university. Discuss how the top five threats
Weight: 40% could/could not impact the asset. Rank the threats
Must be completed as individuals. based on their levels of impact on the asset. Support
your discussion by quoting reputable sources of
information. (9 marks)
Task Description:
• Identify potential weaknesses (vulnerabilities) of
You are interviewed by Southern Cross University for the asset based on three information security
a position of cybersecurity consultant to work in a components: confidentiality, integrity, and
university's cybersecurity program. As part of the availability.
interview, you are required to complete the following • Study the working mechanism of each threat to
tasks: assess the potential impact of the threat on the
• To complete the tasks, use the given guidelines. asset by exploiting the vulnerabilities. Use your
Task 1: discuss five important roles of cybersecurity own and public domain knowledge to help you
in the university. (5 marks) with the impact assessment.
• What are the elements of cybersecurity, and what Your report should have correct grammar and
has to be protected? spelling; Well supported Arguments; Cite all reference
sources (3 marks).
Task 2: develop five questions that allow you to Submission Format:
identify the most critical information assets of the There is no report template for this assignment, so
university. (5 marks) you can design your own template or refer to online
• What is an information asset? resources. However, the report should be well
• What makes an information asset critical? presented in a standard report format. The report
should be a minimum of 1000 words.

Task 3: discuss why risk assessment is the most The first page of the report should have your name,
critical step in developing and managing cyber student ID, ISYS1002 Assignment 1, and the date you
security in the university. (9 marks) submit your assignment.
When you have completed the assignment, you are
• What is risk assessment?
required to submit your assignment in PDF/DOC
• What do you know by performing risk assessment
format. The file will be named using the following
and what you do not know if not performing risk
convention:
assessment from the cybersecurity perspective?
• How are risk assessment results used to develop Filename = FirstInitialYourLastName_ISYS1002_A1.pdf
and manage cybersecurity, and how they can (i.e. Falaei_ISYS1002_A1.pdf)
affect the business decision-making process? Resubmit Policy:
As this task is the major task for a core unit, it is
Task 4: identify the top five threats to the university eligible for a resubmit under our resubmit policy. This
information assets. (9 marks) means that if you fail the assessment then you will be
• Clearly understand the difference between given a chance to resubmit, if you are eligible.
important security concepts, including threats, Eligible students are those who have
hazards, attacks, and incidents. • handed in all assessments; and
• Search for security threat, incident, and trend • not committed academic misconduct in the unit;
reports and use the results from reputable sources and
such as government organisations and security
• passed at least 50% of the other assessment in the
companies.
unit; and
• Identify relevant threats by studying statistics and
figures found in the reports.

ISYS1002 Cybersecurity | Assessment 1 1


ISYS1002 Cybersecurity
Assignment 1

• failed this assessment and cannot pass the unit Since you are mastering
otherwise. fundamental skills, you are permitted to work from the
examples in the MySCU site or textbook, but you must
acknowledge assistance from other textbooks or
If you fail this assessment and are eligible for a classmates. In particular, you must not use online
resubmit, your unit assessor will contact you in Week material or help from others, as this would prevent you
7 with further instructions. from mastering these concepts.

This diagram will help you understand where you can


Marking Criteria: get help:
The rubric for this assignment is available on the
MySCU site and will give the criteria for marking. Online
Lecturer Tutors Relatives
Forums
The difference between a “Pass” and higher grades
will be based on how much you look at the whole
report and complete the tasks and how well you follow Students Private
Hired coders Classmates
outside unit Tutors
best practices while completing the tasks.
Original Work:
Other
Note that you are not allowed to cut and paste from
online resources. Use your own words and figures.
Acknowledge all reference sources. Encouraged Attribution Required
Not acceptable Ask tutor
It is a university requirement that a student’s work
complies with the Academic Integrity Policy.
It is a student’s responsibility to be familiar with the
Policy. Failure to comply with the Policy can have
severe consequences in the form of university Be aware that if you do get help from one of the red
sanctions. For information on this policy please refer sources, you will be reported for academic
to the Student Academic Integrity Policy at the misconduct, which may have severe penalties. Please
following website: visit the following link for the guidelines:
http://policies.scu.edu.au/view.current.php?id=00141
https://bit.ly/scuAcadMisconduct

As part of a university initiative to support the


development of academic integrity, assessments may
be checked for plagiarism, including through an
electronic system, either internally or by a plagiarism
checking service, and be held for future checking and
matching purposes.
A Turnitin link has been set up to provide you with an
opportunity to check the originality of your work until
your due date. Please make sure you review the report
generated by the system and make changes (if
necessary!) to minimise the issues of improper
citation or potential plagiarism. If you fail to follow this
step, your report may not be graded or may incur late
feedback.
Getting Help:
This assignment, which is to be completed
individually, is your chance to gain an understanding
of the fundamental concepts of cybersecurity. It is
important that you master these concepts yourself.

ISYS1002 Cybersecurity | Assessment 1 1

You might also like