ISYS1002 Cybersecurity Assignment 1: Task Description
ISYS1002 Cybersecurity Assignment 1: Task Description
Assignment 1
Task: Report
Unit Objectives: LO1, LO2 Task 5: let's assume that the university website is one
of the most critical information assets of the
Due Date: Sunday of Week 3, 11:59 pm
university. Discuss how the top five threats
Weight: 40% could/could not impact the asset. Rank the threats
Must be completed as individuals. based on their levels of impact on the asset. Support
your discussion by quoting reputable sources of
information. (9 marks)
Task Description:
• Identify potential weaknesses (vulnerabilities) of
You are interviewed by Southern Cross University for the asset based on three information security
a position of cybersecurity consultant to work in a components: confidentiality, integrity, and
university's cybersecurity program. As part of the availability.
interview, you are required to complete the following • Study the working mechanism of each threat to
tasks: assess the potential impact of the threat on the
• To complete the tasks, use the given guidelines. asset by exploiting the vulnerabilities. Use your
Task 1: discuss five important roles of cybersecurity own and public domain knowledge to help you
in the university. (5 marks) with the impact assessment.
• What are the elements of cybersecurity, and what Your report should have correct grammar and
has to be protected? spelling; Well supported Arguments; Cite all reference
sources (3 marks).
Task 2: develop five questions that allow you to Submission Format:
identify the most critical information assets of the There is no report template for this assignment, so
university. (5 marks) you can design your own template or refer to online
• What is an information asset? resources. However, the report should be well
• What makes an information asset critical? presented in a standard report format. The report
should be a minimum of 1000 words.
Task 3: discuss why risk assessment is the most The first page of the report should have your name,
critical step in developing and managing cyber student ID, ISYS1002 Assignment 1, and the date you
security in the university. (9 marks) submit your assignment.
When you have completed the assignment, you are
• What is risk assessment?
required to submit your assignment in PDF/DOC
• What do you know by performing risk assessment
format. The file will be named using the following
and what you do not know if not performing risk
convention:
assessment from the cybersecurity perspective?
• How are risk assessment results used to develop Filename = FirstInitialYourLastName_ISYS1002_A1.pdf
and manage cybersecurity, and how they can (i.e. Falaei_ISYS1002_A1.pdf)
affect the business decision-making process? Resubmit Policy:
As this task is the major task for a core unit, it is
Task 4: identify the top five threats to the university eligible for a resubmit under our resubmit policy. This
information assets. (9 marks) means that if you fail the assessment then you will be
• Clearly understand the difference between given a chance to resubmit, if you are eligible.
important security concepts, including threats, Eligible students are those who have
hazards, attacks, and incidents. • handed in all assessments; and
• Search for security threat, incident, and trend • not committed academic misconduct in the unit;
reports and use the results from reputable sources and
such as government organisations and security
• passed at least 50% of the other assessment in the
companies.
unit; and
• Identify relevant threats by studying statistics and
figures found in the reports.
• failed this assessment and cannot pass the unit Since you are mastering
otherwise. fundamental skills, you are permitted to work from the
examples in the MySCU site or textbook, but you must
acknowledge assistance from other textbooks or
If you fail this assessment and are eligible for a classmates. In particular, you must not use online
resubmit, your unit assessor will contact you in Week material or help from others, as this would prevent you
7 with further instructions. from mastering these concepts.