代写网络安全 Subject Code and Title MIS607 Cybersecurity

代写网络安全

Subject Code and Title MIS607 Cybersecurity

代写网络安全 You are highly advised to read the “case scenario”, several times. Then, it is advised to read through this Assessment Brief document 

Assessment Task and Context  代写网络安全

Reflecting on your MIS607 Assessment 2, the organisation has decided to continue to employ you as a consultant for the nextphase: Risk Analysis and Development of the Mitigation Plan.

The organisation  has  become aware that the Australia Government  (AG)  has developed strict privacy requirements for businesses. The company wishes you to produce a brief summary of these based on  real-world Australian government  requirements (similar to  how you  used  real-world information in MIS607 Assessment 2 for real-world attack). These include the Australian Privacy Policies (APPs) especially the requirements on notifiable data breaches. The company wants you to examine these requirements and advise them on their legal requirements. Also ensure that your threat list includes attacks on customer data breaches. The company wishes to know if the GDPR applies to them.  代写网络安全

Instructions

MIS607 Assessment 3 is in many ways a continuation of MIS607 Assessment 2. You will start with the threat list from your MIS607 Assessment 2, although feel free to make changes to the threat list if it is not suitable for MIS607 Assessment 3. You may need to include threats related to privacy concerns. Beginning with the threat list:

▪    You need to align threats or vulnerabilities, as much as possible, with controls.

▪    Perform a risk analysis and determine controls to be employed.

▪    Combine the controls into a project of mitigation.

▪    Give advice on the need for ongoing cybersecurity, after your main mitigation steps.

代写网络安全

To successfully complete this assessment:  代写网络安全

▪    You  must  use  the  risk  matrix  approach  covered  in  classes  (Risk  =  likelihood  x consequence)

▪    You should show evidence of gathering data on “likelihood” and “consequence” for each of the threat you have identified. You should briefly explain how this was done.

▪    At least ONE (1) of the risks must be so trivial and/or expensive to control that you decide not to use it (In other words, in this case, you are accepting the risk). At least ONE (1) of the risks, but obviously not all.

▪    Provide cost estimates for the controls including policy or training controls. You can make up these values but try to justify at least ONE (1) of the costs (if possible, use links to justify costs).

Report Structure and Format:

The report should have the following heading structure.

Assignment Cover Sheet (Individual)  代写网络安全

(Found  via  the  following  link: https://www.torrens.edu.au/policies-forms)  Make  sure  to  complete Sections 1, 2 and 3 of the “Assignment Cover Sheet (Individual)” and sign and date it. Once finished, take a screenshot and insert it on the first page of your assessment WORD document as a JPG file.

Executive Summary

Mainly  this  section  is  where  you  “Summarize”  your  report. The  best  time to  write  the  Executive Summary  is  when  you  have  finished  working  on  your  assessment.  By  then  you  will  be  able  to “Summarise” your work. It should be written in a simple and easy to read language. IMPORTANT NOTE: Make sure to ONLY provide the summarised version of the report.



  1. Introduction



In this section introduce your assessment/report to the reader. Think of the purpose and objectives of your  assessment  and  ask  this  question  from  yourself  that  why  this  assessment  is  valuable  and important? You will need to provide a short description of the case scenario. Overall, the introduction section is about “What the assessment is going to be about?” .



  1. MainDiscussion  代写网络安全



IMPORTANT NOTE: The required discussions for sub-sections 2.1, 2.2, 2.3 and 2.4 are discussed earlier in this assessment brief document (see above).

2.1. Threats List and STRIDE Categorisation Summary

2.2. Threats Analysis (Using Risk Matrix)

2.3. Threats and Controls

2.4. Mitigation Scheme



  1. Conclusion



In this section, you will wrap  up your discussion in a clear and simple way. Overall, the conclusion section reminds the reader what the report/assessment has been about. Indicate and discuss the major findings and/or recommendation of your report.



  1. References  代写网络安全



A minimum of Five (5) references are required in this assessment. Please be advised that you can use as many references you require in your assessment; however, the minimum number of references is 5 references). At  least three  (3)  references  MUST  be from  peer-reviewed  sources  (e.g.  conferences, journals). You can put a “*” after such peer-reviewed references in the references section when you want to highlight they are peer reviewed.

 

One  (1)  of the  peer-reviewed  articles  MUST  be  uploaded  in  PDF  format  along  with  your  MIS607 Assessment  3  report  on  Blackboard.  This  PDF  file  will  be  referred  as  the  “nominated  article” . IMPORTANT NOTE: Zero marks for referencing if the nominated article is not itself peer-reviewed or if there is no peer-reviewed article submitted with your MIS607 Assessment 3 .

Of course, the nominated article should be properly referenced and cited; however, you also need to cite an important direct quote from within the article (with page number), not just a brief sentence from the abstract. The quote should also relate to the main topic of the article, not just a side issue.  代写网络安全

It is essential that you as the author of your assessment/report use appropriate APA style for citing and referencing research. Please see more information on referencing here in theAcademic Writing Guide found via the Academic  Skills  website.  Make  sure to  list the  references  alphabetically  and  where possible, make sure to use the most recent references.



  1. Appendices(Appendix 1, Appendix 2, etc.)



An Appendix is NOT necessary for your assessment UNLESS for any of the following two reasons:

✓  Your  MIS607 Assessment 2 has  been marked 60 and below and you had to work on your assessment 2 and make relevant changes and once improved attach it within the Appendices section as Appendix 1 .

✓  There  is   EXTRA  general  information  which  you  think  is  helpful  for  your  assessment. IMPORTANT NOTE: ALL important and necessary information for your report (e.g. Risk Matrix, etc.)  must  be  inserted  and  discussed  within  the  body  of  your  assessment  and  NOT  in Appendices section.

IMPORTANT NOTES FOR MIS607 ASSESSMENT 3 SUBMISSION:

.  This assessment must be submitted as a WORD document (.doc OR .docx).

.  Make sure to follow the provided guideline on how to fill in the “Assessment Cover Sheet” .

.  You are highly advised to read the “case scenario”, several times. Then, it is advised to read through this Assessment Brief document and note requirements. It is highly advised to also check the Marking Rubric for more information how the assessment will be marked.

.  Any used information/discussion from your MIS607 Assessment 2 requires to be accurately and completely referenced to avoid Academic misconduct such as “self-plagiarism” .

.  The report should use Arial or Calibri fonts, 11 point. It should be line spaced at 1.5 and must have page numbers on the bottom of each page.

.  The word count for this assessment is 2500 words (+/- 10%), NOT counting tables, figures, executive summary, cover sheet, references, and appendices (if any).

.  You must be careful NOT to use up the word count discussing cybersecurity basics. This is not an exercise  in summarising class  notes and etc.  Discussing general information and material will not count towards marks.  代写网络安全

.  Make sure to use a reasonable number of Tables and Figures in your assessment.

.  ALL inserted/used Tables and Figures within the report MUST be captioned/labelled and numbered (e.g. Table 1, Table 2, etc.).

.  ALL inserted/used Tables and Figures within the report require being initially introduced and then discussed in a clear, focused and simple way.

.  Within the assessment document, when referring to Tables and Figures, you require to refer to them by their captions (note that publishers do not guarantee Tables and Figures to be placed the same order or location as in your article). NOTE: Tables and Figures without a caption may be treated as if they are not in the report.

.  If you have not performed so well with MIS607 Assessment 2 (Your mark was less than 60%), you will need to fix the issues noted in your MIS607 Assessment 2 based on the provided feedback  and  then  include  your  MIS607  Assessment  2  in  your  MIS607  Assessment  3 “Appendix 1” section. IMPORTANT NOTE: There will be NO MARKS for the remediation of MIS607 Assessment 2.

 

Academic Integrity 代写网络安全

All students are responsible for ensuring that all work submitted is their own and is appropriately referenced and academically written according to the Academic Writing Guide. Students also need to have read and be aware of Torrens University Australia Academic Integrity Policy and Procedure and subsequent penalties for academic misconduct. These areviewable online. Students also must keep a copy of all submitted material and any assessment drafts.

Submission Instructions

You should submit your MIS607 Assessment 3 via the Assessment link in the main navigation menu in MIS607 Cybersecurity on the Student Portal.

The learning facilitator will provide feedback via Grade Centre in the Student Portal. Feedback and the mark can be viewed in “My Grades” .

更多代写:cs代写   经济代考   会计代写      计算机科学代写 essay写作

发表评论

客服一号:点击这里给我发消息
客服二号:点击这里给我发消息
微信客服1:essay-kathrine
微信客服2:essay-gloria