0% found this document useful (0 votes)
13 views5 pages

CSSY1208 IIS Assignmner Sem 1 24 25

i need solve

Uploaded by

i5.60099171
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views5 pages

CSSY1208 IIS Assignmner Sem 1 24 25

i need solve

Uploaded by

i5.60099171
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

INFORMATION TECHNOLOGY DEPARTMENT

Assignment
Semester 1, 2024 - 2025)
(To cover the outcomes by Self-reliant, Student Centered Learning Approach)

Level: Diploma 1 Specialization: Diploma first year

Course Code: CSSY1208 Course Name: Introduction to information security

Date of Issue: 7/11/ 2024 Date of 19/12/2024


Submission:

Assignment Number and Identifying social engineering attacks in banking sector


Title:

Group: Sec-2
Instructions:
1. E-mail your assignment to [email protected]. No hardcopy or softcopy from USB is
accepted for security purposes.
2. After sending your assignment, secure the copy of the sent mail (see Sent Items) as evidence until
you get the confirmation of receiving from your course lecturer. If you don’t get any confirmation in
one (1) or two (2) days, send it again and follow-up personally.
3. No updated versions are accepted once the assignment is submitted.
4. Write your ID, your name, and Section in the Subject of your mail.
(Example: 62S1632_Abdullah_Section_1)
5. Use only your college mail to send your work. Contact ETC in case you have a log-in problem.
6. Marks will be deducted for late submission. Twenty percent (20%) of assignment scored mark will
be reduced for each day of late submission.
7. Plagiarism is a crime. Plagiarism occurs when other’s work such as print material, images, audio-
visual creations, computer programs, electronic materials, etc. are used without appropriate
acknowledgement and this can be checked by copying your work to any search engines.
Plagiarism includes, but not limited to the following:
 Copying full or part (paragraphs, sentences or significant part of a sentence) of other’s work
directly
 Copying from other’s work with an end reference to the original source but without putting
the copied text between quotation marks
 Paraphrasing, summarising, or rearranging words, phrases or ideas of other’s work
 Copy-Paste of statements from multiple sources (electronic or print material)
 Presenting work done in collaboration with others as independent work
 Using one’s own work presented previously
www.turnitin.com
Disciplinary Action for Student Plagiarism (for ALL involved) is Zero mark.
To avoid plagiarism, you must give credit whenever you use:
a. Another person’s idea or theory;
b. Any piece of information which is not a common knowledge; and material from a website.
A student who satisfactorily completes the assignment should be able to:
Learning Objective Course Outcome No.
1. demonstrate basic knowledge and understanding of the information 1
security concepts
2. explain various types of attacks and its countermeasures. 2
3. discuss legal, ethical, and professional issues in information security. 4

Information Technology Department

College of Computing and Information


Sciences

CSSY1208 Assignment

PHASES WEEK TASK

1 Project Selection & Registration 5-6 ● Student must select his/her group.
(Maximum 3 Students in a Group)
● Students must select the social
engineering attacks in banking sector.
● Collect necessary data

2 Analysis 7-8-9 ● Analyze the problem


● Literature survey

3 Implementation 10-11-12 ● System implementation


● Developing the system
● Configuring system

4 Report Preparation 13 ● Report Preparation

LAST DATE TO SUBMIT THE REPORT: Last working day of Week 14


Submit the report via Blackboard.

5 Project Evaluation (Presentation & 14 Present a demo to demonstrate the issue


Viva) and the Countermeasure tools.
Scenario In General
You are required to identify a social engineering attacks in banking sector occurred over the past 3 years (since
January 2021) and that was reported in the media.

The objective of the assignment will be to understand an example of how a social engineering attacks occurs
and what impact(s) it can have on banking sector.

The social engineering attacks you select can be in any bank in Oman or any part of the world. Research should
be done online. If you are having trouble finding information on the social engineering attack you selected, find
another example.

Submission

Your report should contain the following sections noted below:


● Title page: Group details, course, section, date, and the teacher’s name.

● Introduction: (1 to 2 paragraphs): A brief description and background of the types social


engineering attacks; Among them, what type of attacks occur in the bank you selected and
why?

● Summary of the incident: (2 pages): Provides a chronological overview of the security breach
incident. Explain what occurred, the type of social engineering attack incident, what data was
stolen, and what steps the bank took

● Impact(s) on the organization (2 pages): Provide a summary of how the selected social
engineering attacks affected the bank (e.g., financial impact, reputational cost, customers, etc.)

● Countermeasure tools: suggest how to solve those social engineering attacks and demonstrate the same.

● Conclusion:(2 to 3 paragraphs): A brief overview of the social engineering attacks and


countermeasure.

● Reference: Note and provide Reference to any websites / books / articles used in your research.

● Submitted Document: Your report must be double-spaced in 12pt font with a one-inch margin.
The report will be submitted online and should be either in MS Word or pdf file format
Criteria Points
Title page: Contains name, course section, date 0.5
Introduction: 1
Description and background of the organization
selected and why.

Summary of incident: Detailed overview of the 2.5


Social engineering attacks. Explain what occurred,
the type of incident, whatdata was stolen, and
what steps the organization took.

Impact on the organization: Summary of how the 2.5


Social engineering attacks affected the
organization (e.g., financial impact, reputational
cost, litigation, etc.)
Countermeasure tools: suggest how to stop / 2
aware customers from Social engineering attacks
and demonstrate thesame.

Conclusion 0.5
Reference 0.5
Report format 0.5
Total 10

Plagiarized assignments will receive a mark of zero on the assignment and a failing grade on the course. You
may also receive a permanent note of plagiarism on your academic record. Please note:

even if you use work you previously wrote yourself, it is still considered plagiarism if you do not cite it properly
in your paper

Prepared by Approved by

M. Vijaya Bhaskar Reddy Dr. Venkatesan Ramalingam

Sources of information/References

You might also like