MIS607 Cybersecurity Four – Mitigation Plan
ASSESSMENT 1 BRIEF |
|
Individual/Group |
Individual |
Length |
1500 words Report +- 10% |
Learning Outcomes |
The Subject Learning Outcomes demonstrated by successful completion of the task below include: b) Develop and demonstrate a professional experience of cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data. c) Develop skills to analyse issues associated with business data networks and security and to develop practical solutions towards their resolution d) Demonstrate ability to evaluate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various business contexts e) Demonstrate ability to effectively communicate principles and policies of cybersecurity, and explain their applications in various business contexts f) Develops foundational knowledge and essential skills for all cybersecurity domains including defence and mitigation techniques used in protecting businesses. |
Submission |
Week 11 |
Weighting |
35% |
Total Marks |
35 marks |
Task Summary
In this assessment you will be expected to produce a 1500 word Threat Mitigation report based on the problem statement supplied by your lecturer in class building from Assessment 2.
Context
The MIS607 Cybersecurity subject is designed for you to progressively add to your understanding of basic Security principles and fundamentals. Malicious software, or malware, arguably constitutes one of the most significant categories of threats to computer systems.
Security threat modelling, or threat modelling, is a process of assessing and documenting a system's security risks. Security threat modelling enables you to understand a system's threat profile by examining it through the eyes of your potential foes.
For this assessment you are required to develop a mitigation plan based on your STRIDE threat model you have submitted for assessment 2.
Task Instructions
1- Rank the threats by decreasing risk.
2- Choose how to respond to the threats.
3- Choose techniques to mitigate the threats.
4- Choose the appropriate technologies for the identified techniques.
Expert's Answer
Get Online
Assignment Help Services