Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

could you help

1 answer below »
BN324 Enterprise Cyber Security and Management Governance XXXXXXXXXXPage#4 of 4
    Assessment Details and Submission Guidelines
    Trimeste
    T1 2022
    Unit Code
    BN324
    Unit Title
    Enterprise Cyber Security and Management
    Assessment Type
    Group Assignment 2 (maximum 5 students per group)
    Assessment Title
    Enterprise Level web application Security Framework for E-Commerce
    Purpose of the assessment (with ULO Mapping)
    The purpose of the assignment is to analyse the web application attacks in cyber security; evaluate available defensive resolutions, and recommend a security solution. Students will be able to complete the following ULOs:
a. Articulate cyber security imperatives to key decision makers in an enterprise organisation.
. Evaluate the cyber security posture of an organisation.
d. Analyse the cyber security consequences of the increasing connectedness of end-point devices and control systems to an organisation's mission.
e. Devise strategies and risk management solutions.
    Weight
    25%
    Total Marks
    50
    Word limit
    See instructions section
    Due Date
    Week 11 (5/06/2022)
    Submission Guidelines
    · All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
· The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
· Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
    Extension
    · If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
    Academic Misconduct
    · Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.
Assignment 2: Enterprise Level Security Framework
Assignment Description
There are two parts to this assignment, i.e. part A and part B.
A. Write a review article on one of the following topics. Your tutor will allocate you a group number (maximum four students in a group) and your topic.          XXXXXXXXXX90 marks
B. Presentation                 10 marks
Part A description:
Topic 1 - Cyber Security Risk assessment based on Cloud Computing for E-learning Educational Institution
Many institutions are adopting the use of e-learning due to some of its benefits such as lower cost, faster delivery, more effective learning, and lower environmental impact. E-learning system requires a well-secured environment for them to function.
Your company's senior management has requested that you prepare a risk management plan that identifies potential risks and identifies risk management strategies. Your task is to write a report on the cyber security risk assessment based on Cloud Computing for Educational Institutions. Your article should cover the following points.
· Prepare a risk management plan that identifies potential risks and identifies risk management strategies
· Review e-learning, security issues and challenges
· Security Issues in Cloud-based E-Learning
· Analysis of security issues in E-Learning system.
· Prepare a risk management plan that identifies potential risks and identifies risk management strategies
· Discusses the types of attacks in service delivery models of e-learning
· Assess the resulting severity of risk and threat
· Explains the situation and existing research relating to security in e-learning
· Develop a security risk model
· Propose/ Review a number of solutions that can be taken to overcome these challenges
Topic 2 – The management of security in Cloud computing: Challenges and approaches
A new start-up SME (small-medium enterprise) based in Melbourne with an E-government model has recently begun. You have been engaged to provide a risk assessment for the planned moves to Software as a service (or SaaS) application offerings. You are to write a report that assesses the risks to the SME (small-medium enterprise) for just their planned moves to cloud computing.
Your article should cover the following points.
· Describe the security issues in cloud computing and challenges that cloud service providers (CSP) face during cloud engineering. Recommended security standards and management models to address these are suggested for the technical and business community.
· Discuss the existing threats and risks.
· List of challenges and analysis of their possible solutions
· Discussion of technologies and techniques in the existing solutions and future works
· Investigate and discuss the appropriate design and secure solutions for the management of security in Cloud computing
· Propose/ Review a number of solutions that can be taken to overcome these challenges
Instructions:
Prepare your article as below
1. Go to the IEEE website and download the WORD template for the format. https:
www.ieee.org/publications_standards/publications/authors/author_templates.html
2. Another link for the template: https:
www.ieee.org/publications_standards/publications/journmag/ieee_tj_template_17.pdf
3. Read and familiarize yourself with the instructions carefully.
4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6). (https:
www.ieee.org/publications_standards/publications/authors/author_guide_interactive.pdf)
5. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
· Title                             (maximum 15 words)
· Abstract                             (200 – 250 words)
· Introduction                         (500 – 1500 words)
· Literature Review                         (1000 – 3000 words)
· Main body                             (1000 – 3000 words)
· Conclusion                             (200 – 300 words)
· Future Works                         (150 – 300 words)
· References                             (minimum 10 references)
6. The article must be a ‘Review’[footnoteRef:1] article including at least 5 references and not more than 25. [1: See http:
www.editage.com/insights/6-article-types-that-journals-publish-a-guide-for-early-career-researchers]
7. Strictly follow the IEEE reference format for in-body citations and the references section.
8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.
9. Remember to strictly follow the template and the instructions above to avoid penalties.
Part B description:
Prepare slides (between 5 – 10 slides) for presentation during the lab class. Read the instruction attached carefully.
Marking criteria:
Examples of marking criteria are shown in the following table. Marks are allocated as follows:
    Section to be included in the report
    Detailed Description of the Criteria
    Marks
    Conforming to the template and format
    No marks will be given and severe penalties will apply for any
each of the format and template. Fonts, sizes, spacing, captions, headings, etc. will also be checked thoroughly. Be thorough and follow fully when using the template and format instructions to avoid penalties.
    10
    Figures and tables created
    They should be created yourself and not copied from elsewhere. For full marks, you should create at least 2 figures and 2 tables.
    20
    Main sections
    Main body structures and contents quality including word limit.
    40
    Literature review
    Severe penalties apply for simple listing and describing. It should be a logically support analysis that reaches the review concluded that should be included at the end of the section. Check word limit.
    10
    In body citation
    Strictly follow the order and instructions by IEEE. Check when/where to put the citation. See attached files and search the internet for guidelines
    5
    References section
    Check whether they follow the instruction. Otherwise, no marks will be provided
    5
    Presentation
    Presentation skills and materials quality
    10
    Total
    100
Example Marking Ru
ic for Assignment #:
Note: The marking criteria vary for each assignment
    Marking Ru
ic Criteria/ Grades
    High Distinction (HD) [Excellent]
80%
     Distinction (D) [Very Good]
70%-80%
    Credits
(C) [Good]
60%-70%
    Pass (P) [Satisfactory]
50%-60%
    Fail (N) [Unsatisfactory]
50%
    Criteria 1
    Concise and specific to the project
    Topics are relevant and soundly analysed.
    Generally relevant and analysed.
    Some relevance and
iefly presented.
    This is not relevant to the assignment topic.
    Criteria 2
    Demonstrated excellent ability to think critically and sourced reference material appropriately
    Demonstrated excellent ability to think critically but did not source reference material appropriately
    Demonstrated ability to think critically and sourced reference material appropriately
    Demonstrated ability to think critically and did not source reference material appropriately
    Did not demonstrate ability to think critically and did not source reference material appropriately
    Criteria 3
    Demonstrated excellent ability to think critically and sourced reference material appropriately
    Demonstrated excellent ability to think critically but did not source reference material appropriately
    Demonstrated ability to think critically and sourced reference material appropriately
    Demonstrated ability to think critically and did not source reference material appropriately
    Did not demonstrate ability to think critically and did not source reference material appropriately
    Criteria 4
    All elements are present and very well integrated.
    Components present with good cohesive
    Components present and mostly well integrated
    Most components present
    Proposal lacks structure.

    Criteria 5
    Logic is clear and easy to follow with strong arguments
    Consistency logical and convincing
    Mostly consistent logical and convincing
    Adequate cohesion and conviction
    Argument is confused and disjointed
    Criteria 6
    Clear styles with excellent source of references.
    Clear referencing style
    Generally good referencing style
    Sometimes clear referencing style
    Lacks consistency with many e
ors
Updated by: Dr. Ammar Alazab XXXXXXXXXXModerated by: Dr Imran Jokhio    May 2022
Prepared by: Dr. Ammar Alazab     XXXXXXXXXXModerated by: Dr Imran Jokhio    May, 2022
ieee_tj_template_17
.docx
[footnoteRef:1] [1: This paragraph of the first footnote will contain the date on which you submitted your paper for review. It will also contain support information, including sponsor and financial support acknowledgment. For example, “This work was supported in part by the U.S. Department of Commerce under Grant BS123456.”
The next few paragraphs should contain the authors’ cu
ent affiliations, including cu
ent address and e-mail. For example, F. A. Author is with the National Institute of Standards and Technology, Boulder, CO 80305 USA (e-mail: author@ boulder.nist.gov).
S. B. Author, Jr., was with Rice University, Houston, TX 77005 USA. He is now with the Department of Physics, Colorado State University, Fort Collins, CO 80523 USA (e-mail: XXXXXXXXXX).
T. C. Author is
Answered 14 days After May 16, 2022

Solution

Shubham answered on May 30 2022
95 Votes
BN324: ENTERPRISE CYBER SECURITY AND MANAGEMENT
GROUP ASSIGNMENT 2: ENTERPRISE LEVEL WEB APPLICATION SECURITY FRAMEWORK FOR E-COMMERCE
[CHOSEN TOPIC 2: THE MANAGEMENT OF SECURITY IN CLOUD COMPUTING; CHALLENGES AND APPROACHES]
Table of Contents
Abstract    3
Index Terms    3
Introduction    3
Literature Review    3
Security Issues in Cloud Computing and Challenges Faced by Cloud Service Providers (CSP) During Cloud Engineering    3
Security Issues in Cloud Computing    3
Challenges Faced by CSP    3
Recommendations for Security Standards and Management Models to Address these Issues    4
Prevailing Threats and Risks    4
List of Challenges and Analysis of their Possible Solutions    4
Challenges    4
Possible Solutions    3
Technologies and Techniques in Prevailing Solutions and Future Works    4
Technologies and Techniques in Prevailing Solution    4
Future Works    5
Appropriate Design and Secure Solutions for Security Management in Cloud Computing    5
Proposed Solutions to Overcome these Challenges    5
Conclusion    5
Bibliography    6
Abstract
A new and centralised paradigm has demanded the computing resources so that capacities can be used to connect the computers in a network and decentralisation of cloud computing so that potential abnormalities can be avoided. The in-built capacities of technological gadgets are increasing day by day, which have been expanded to variety of things like cars, mobile phones and supercomputers. Cloud computing has integrated the resources, which were scarce and expensive, which were managed by specialised data service centres. This has also indicated the need of security to protect data and safeguard the network so that intruders cannot take advantage of its weakness and damage the speed of growth.
Index Terms
Enterprise Cyber Security and Management, Enterprise Level web application Security Framework for E-Commerce, security issues in cloud computing, challenges, threats, risks, technologies
    Introduction
Cloud has given businesses an edge to access data increase team collaboration and enhanced content management. There are different types of clouds like public clouds, private clouds and hy
id clouds, which have different security needs [1]. Cloud security is a most concerning part on digital platform as post pandemic many organisations shifted to cloud platforms for their businesses. It is a collection of security measures, which are designed to secure the infrastructure, data and applications. The measures keep a check on authentication of user and data, control on access to resources and data privacy and protection.
Literature Review
Distributed computing and virtualisation methods are the competitor innovations to confront configuration issues of IoT advancement. In contrast to customary IT (Information Technology) assets, distributed computing has strong handling units and enormous stockpiling, which is accessible on-request to different clients utilising virtualisation strategies. We accept that blending these two innovations can be a complete answer for some enormous scope obliged networks [2].
Different applications and administrations can be given in the Cloud because of its different promising and fascinating qualities, administrations and applications. In this paper, we investigated a portion of these qualities, administrations and applications and we are very certain that numerous others will be investigated soon [3]. Cloud administrations and applications are supposed to draw in numerous associations and people from various disciplines and our review assists them with figuring out the effect of these administrations on their business, nevertheless, distributed computing innovation is not liberated from dangers and concerns.
Security and protection issues keep on being the greatest wo
y on distributed computing that restricts its reception practically speaking. The client can utilise the modalities of distributed computing limitlessly at whatever point requested [4].
Recommendations for Security Standards and Management Models to Address these Issues
The existence of trust model is required to enhance the capabilities of large scale and distributed sharing network. It will include evidence and endorsement of different entities and parts of the system. The CSP premise should be accessed only by authorised and concerned personnel responsible for specific job functions. Through digital signatures, integrity checks and encryption the interfaces should be secured. The network security should also be maintained so that physical and virtual networks work in isolation and confidentiality can be enhanced between users. As different security controls are present, it is required to establish coordination between them so that different cloud services can be managed effectively. The security capabilities of portability, interoperability and reversibility should be strengthened from CSP’s end so that he can remove its data from cloud back to its non-cloud storage. Data isolation, protection and privacy of private data should be enhanced for secured experience by the customer.
Prevailing Threats and Risks
Mobiles are increasingly...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here