ASSESSMENT 3 BRIEF
Subject Code and Title MIS607 Cybersecurity
Assessment Mitigation Plan for Threat Report
Length 2500 words (+/- 10%)
Learning Outcomes The Subject Learning Outcomes demonstrated by successful completion of the task below include:
b) Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
c) Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.
d) Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.
Submission Due by 11.55 pm AEST Sunday end of Module 6.1/week 11
For intensive class: Due by 11.55 pm AEST Sunday end of Module 6.2/week6
Total Marks 100 marks
For this assessment, you are required to write a 2500 words mitigation plan for threat report based on knowledge you gained about threat types and key factors in Assessment 2. You are required to use the Assessment 2 case as context to write a report to address or alleviate problems faced by the business and to protect the customers. In doing so, you are required to demonstrate your ability to mitigate threat/risks identified in Assessment 2 through the strategy you recommend (STRIDE).
Cybersecurity help organizations to mitigate threats/risks, reduce financial loss and safety violations, decrease unethical behaviour, improve customer satisfaction, and increase efficiency, as well as to maintain these improved results. Threats can be resolved by Risk Acceptance (doing nothing), Risk Transference (pass risk to an externality), Risk Avoidance (removing the feature/component that causes the risk) and Risk Mitigation (decrease the risk). This assessment gives you an opportunity to demonstrate your understanding of cybersecurity and your capability to explain Risk Mitigation strategies for such threats. Mitigations should be chosen according to the appropriate technology and resolution should be decided according to the risk level and cost of mitigation.
1. Read the Assessment 2 Case Scenario again to understand the concepts discussed in the case.
2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the mitigation plan for threat report.
3. The mitigation plan for threat report should address the following:
• Setting priorities for risks/threats
MIS607_Assessment_3_Brief_Mitigation plan for threat report_ Module 6.1 Page 1 of 4
• Analyse the case in terms of identified risk categories and scenarios
• Apply standard mitigations
• Discuss specific resolutions for improvement, and justify their significance
• Provide recommendations for mitigating risk based on an assessment of risk appetite, risk tolerance and current risk levels (Choose techniques to mitigate the threats)
• Make recommendations to the CEO on how to conduct risk management, key issues involving your process improvement model, including a road map, the identification of appropriate technologies for the identified techniques, communicating the strategy, and a suggested timeline.
4. The report should consist of the following structure:
A title page with subject code and name, assignment title, student’s name, student number, and lecturer’s name.
The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in mitigation plan report. You will need to inform the reader of:
a) Your area of research and its context (how to mitigate or manage threats)
b) The key concepts you will be addressing
c) What the reader can expect to find in the body of the report
The body of the report will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the report. Set priorities for identified threats from assessment 2, analyse the case in terms of identified risk categories and discuss specific resolutions and recommendations for improvements in the body of the report.
The conclusion (will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.
5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.
There are requirements for referencing this report using APA referencing style for citing and referencing research. It is expected that you used 10 external references in the relevant subject area based on readings and further research. Please see more information on referencing here: https://library.torrens.edu.au/academicskills/apa/tool
7. You are strongly advised to read the rubric, which is an evaluation guide with criteria for grading the assignment—this will give you a clear picture of what a successful report looks like.
Submit Assessment 3 via the Assessment link in the main navigation menu in MIS607 Cybersecurity. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades.
Academic Integrity Declaration
I declare that, except where I have referenced, the work I am submitting for this assessment task is my own work. I have read and am aware of the Torrens University Australia Academic Integrity Policy and Procedure viewable online at http://www.torrens.edu.au/policies-and-forms.
I am aware that I need to keep a copy of all submitted material and their drafts, and I will do so accordingly.
MIS607_Assessment_3_Brief_Mitigation plan for threat report_ Module 6.1 Page 2 of 4
Assessment Attributes Fail
(Yet to achieve minimum standard)
(Proficient) 65-74% Distinction
75-84% High Distinction
Visual appeal and presentation of content
Title page included. Adheres to the font, spacing, format, word count requirement. Appropriate use of paragraphs, sentence construction, spelling, and grammar.
20% No title page. Incorrect font and size with poor line spacing and large gaps in pagination, tables, or diagrams.
Report is written as a block of text with no breaks in between ideas. Separate ideas cannot be clearly discerned.
Many errors in spelling or grammar. Does not adhere to the word count requirement. Title page is included. Missing most information. Incorrect font and size is used or poor line spacing and large gaps in pagination.
Paragraphs are used but large blocks of text with long sentences make it difficult to understand the ideas being conveyed.
Spelling or grammar has errors but meaning remains clear. Does not adhere to the word count requirement. Title page is included but is missing key information. Some errors in font use and line spacing. Some pagination problems. One idea or concept per paragraph. Some paragraphs could be more succinctly written.
Minor spelling or grammar errors. Adheres to the word count requirement. Title page is included with most required information. Minor errors in font, spacing and format. One idea or concept per paragraph with 3–4 well- constructed sentences per paragraph.
No errors in spelling or grammar. Adheres to the word count requirement. Title page is included with all required information. Font, spacing, and format are in accordance with the requirements of the assignment brief.
Expert use of paragraphs with 3–4 well-constructed sentences per paragraph that follow logically from each other.
No errors in spelling or grammar. Adheres to the word count requirement.
Understanding of the key concepts, principles of cybersecurity, Analyse the case in terms of identified risk categories and scenarios and apply standard mitigations.
30% Lack of understanding of the required concepts and knowledge. Key components of the assignment are not addressed. Lack of analysis of the case in terms of identified risk categories and scenarios and no application of standard mitigations. Limited understanding of required concepts and knowledge. Some of the key components of the assignment are not addressed. Limited analysis of the case in terms of identified risk categories and scenarios. Limited application of standard mitigations. Adequate understanding of the required concepts. A reasonable capacity to explain and apply relevant key concepts.
Supports opinion and information substantiated by evidence from research to analyse the case in terms of identified risk categories and scenarios.
Adequate application of standard mitigations. Thorough understanding of the key concepts. Well- demonstrated capacity to apply and analyse relevant information to analyse the case in terms of identified risk categories and scenarios and application of standard mitigations. Highly developed understanding of the field or discipline/s and key concepts.
Expert analysis of case in terms of identified risk categories and application of standard mitigation.
MIS607_Assessment_3_Brief_Mitigation plan for threat report_ Module 6.1 Page 3 of 4
Evaluation and recommendations
Discuss specific resolutions for improvement. Evaluation and justification of resolutions to provide recommendations for mitigating risks
30% Lack of discussion on specific resolution for improvement. No evaluation of resolutions for improvement to provide recommendations for mitigating risk. Limited discussion on specific resolutions for improvement. Lack of evaluation of resolutions for improvement to provide recommendations for mitigating risk. Adequate discussion of specific resolutions for improvement. Provide
resolutions for improvement and recommendations for mitigating risk. Well demonstrated capacity to explain and discuss specific resolutions for improvement. A comprehensive evaluation and justification of resolutions to provide recommendations for mitigating risk. Expert discussion of specific resolutions for improvement.
Comprehensive and high level of evaluation and justification of the significance of resolutions to provide recommendations for mitigating risks.
Use of academic and
Formal tone. No use of first-party perspective. Meets the assignment brief regarding introduction, body, and conclusion.
Appropriate use of credible resources. Correct citation of key resources using APA style of referencing.
20% Does not adhere to the assignment brief requirements. Poorly written with informal tone using first person pronouns. No introduction attempted. Conclusion not attempted. Inconsistent and inadequate use of good- quality, credible resources. No use of in- text references, or no reference list at the close of the report. Many mistakes in using the APA style. Written according to academic genre. Minor errors in the use of first-person pronouns.
Introduction attempted but very generic. Does not clearly state the purpose of the report and what the reader should expect to find in the report. Conclusion attempted but does not include summation of key concepts and/or recommendations. Consistent use of credible sources but these are not always explicit or well- developed. Little use of in- text referencing. Mistakes in using APA style. Written according to academic genre. Sound use of the introduction but does not clearly state either the purpose of the report or what the reader should expect to find in the body of the report.
Sound use of the conclusion and succeeds in either the summation of key concepts discussed or recommendations, but not both. Consistent use of credible sources. Good use of in-text referencing. Minor errors in using the APA style. Well-written and adheres to the academic genre. Good use of the introduction, which clearly states the purpose of the report and what the reader should expect to find in the body of the report.
Good use of the conclusion and succeeds in summation of key concepts discussed and key conclusions or recommendations.
Consistently demonstrates expert use of good quality, credible sources. Very good use of in-text referencing. No mistakes in using the APA style. Expertly written. Adheres to the academic genre. Excellent use of introduction. Secures the attention of the reader, clearly states the purpose of the report and what the reader should expect to find in the report. Excellent use of the conclusion. Succeeds in confident summation of key concepts and recommendations.
Expert use of credible and relevant sources. Excellent use of in-text referencing. No mistakes in using the APA style.
MIS607_Assessment_3_Brief_Mitigation plan for threat report_ Module 6.1 Page 4 of 4
ASSESSMENT 3 BRIEF