BN324 Enterprise Cyber Security and Management Governance XXXXXXXXXXPage#4 of 4
Assessment Details and Submission Guidelines
Trimeste
T1 2022
Unit Code
BN324
Unit Title
Enterprise Cyber Security and Management
Assessment Type
Group Assignment 2 (maximum 5 students per group)
Assessment Title
Enterprise Level web application Security Framework for E-Commerce
Purpose of the assessment (with ULO Mapping)
The purpose of the assignment is to analyse the web application attacks in cyber security; evaluate available defensive resolutions, and recommend a security solution. Students will be able to complete the following ULOs:
a. Articulate cyber security imperatives to key decision makers in an enterprise organisation.
. Evaluate the cyber security posture of an organisation.
d. Analyse the cyber security consequences of the increasing connectedness of end-point devices and control systems to an organisation's mission.
e. Devise strategies and risk management solutions.
Weight
25%
Total Marks
50
Word limit
See instructions section
Due Date
Week 11 (5/06/2022)
Submission Guidelines
· All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
· The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
· Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
Extension
· If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
· Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.
Assignment 2: Enterprise Level Security Framework
Assignment Description
There are two parts to this assignment, i.e. part A and part B.
A. Write a review article on one of the following topics. Your tutor will allocate you a group number (maximum four students in a group) and your topic. XXXXXXXXXX90 marks
B. Presentation 10 marks
Part A description:
Topic 1 - Cyber Security Risk assessment based on Cloud Computing for E-learning Educational Institution
Many institutions are adopting the use of e-learning due to some of its benefits such as lower cost, faster delivery, more effective learning, and lower environmental impact. E-learning system requires a well-secured environment for them to function.
Your company's senior management has requested that you prepare a risk management plan that identifies potential risks and identifies risk management strategies. Your task is to write a report on the cyber security risk assessment based on Cloud Computing for Educational Institutions. Your article should cover the following points.
· Prepare a risk management plan that identifies potential risks and identifies risk management strategies
· Review e-learning, security issues and challenges
· Security Issues in Cloud-based E-Learning
· Analysis of security issues in E-Learning system.
· Prepare a risk management plan that identifies potential risks and identifies risk management strategies
· Discusses the types of attacks in service delivery models of e-learning
· Assess the resulting severity of risk and threat
· Explains the situation and existing research relating to security in e-learning
· Develop a security risk model
· Propose/ Review a number of solutions that can be taken to overcome these challenges
Topic 2 – The management of security in Cloud computing: Challenges and approaches
A new start-up SME (small-medium enterprise) based in Melbourne with an E-government model has recently begun. You have been engaged to provide a risk assessment for the planned moves to Software as a service (or SaaS) application offerings. You are to write a report that assesses the risks to the SME (small-medium enterprise) for just their planned moves to cloud computing.
Your article should cover the following points.
· Describe the security issues in cloud computing and challenges that cloud service providers (CSP) face during cloud engineering. Recommended security standards and management models to address these are suggested for the technical and business community.
· Discuss the existing threats and risks.
· List of challenges and analysis of their possible solutions
· Discussion of technologies and techniques in the existing solutions and future works
· Investigate and discuss the appropriate design and secure solutions for the management of security in Cloud computing
· Propose/ Review a number of solutions that can be taken to overcome these challenges
Instructions:
Prepare your article as below
1. Go to the IEEE website and download the WORD template for the format. https:
www.ieee.org/publications_standards/publications/authors/author_templates.html
2. Another link for the template: https:
www.ieee.org/publications_standards/publications/journmag/ieee_tj_template_17.pdf
3. Read and familiarize yourself with the instructions carefully.
4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6). (https:
www.ieee.org/publications_standards/publications/authors/author_guide_interactive.pdf)
5. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
· Title (maximum 15 words)
· Abstract (200 – 250 words)
· Introduction (500 – 1500 words)
· Literature Review (1000 – 3000 words)
· Main body (1000 – 3000 words)
· Conclusion (200 – 300 words)
· Future Works (150 – 300 words)
· References (minimum 10 references)
6. The article must be a ‘Review’[footnoteRef:1] article including at least 5 references and not more than 25. [1: See http:
www.editage.com/insights/6-article-types-that-journals-publish-a-guide-for-early-career-researchers]
7. Strictly follow the IEEE reference format for in-body citations and the references section.
8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.
9. Remember to strictly follow the template and the instructions above to avoid penalties.
Part B description:
Prepare slides (between 5 – 10 slides) for presentation during the lab class. Read the instruction attached carefully.
Marking criteria:
Examples of marking criteria are shown in the following table. Marks are allocated as follows:
Section to be included in the report
Detailed Description of the Criteria
Marks
Conforming to the template and format
No marks will be given and severe penalties will apply for any
each of the format and template. Fonts, sizes, spacing, captions, headings, etc. will also be checked thoroughly. Be thorough and follow fully when using the template and format instructions to avoid penalties.
10
Figures and tables created
They should be created yourself and not copied from elsewhere. For full marks, you should create at least 2 figures and 2 tables.
20
Main sections
Main body structures and contents quality including word limit.
40
Literature review
Severe penalties apply for simple listing and describing. It should be a logically support analysis that reaches the review concluded that should be included at the end of the section. Check word limit.
10
In body citation
Strictly follow the order and instructions by IEEE. Check when/where to put the citation. See attached files and search the internet for guidelines
5
References section
Check whether they follow the instruction. Otherwise, no marks will be provided
5
Presentation
Presentation skills and materials quality
10
Total
100
Example Marking Ru
ic for Assignment #:
Note: The marking criteria vary for each assignment
Marking Ru
ic Criteria/ Grades
High Distinction (HD) [Excellent]
80%
Distinction (D) [Very Good]
70%-80%
Credits
(C) [Good]
60%-70%
Pass (P) [Satisfactory]
50%-60%
Fail (N) [Unsatisfactory]
50%
Criteria 1
Concise and specific to the project
Topics are relevant and soundly analysed.
Generally relevant and analysed.
Some relevance and
iefly presented.
This is not relevant to the assignment topic.
Criteria 2
Demonstrated excellent ability to think critically and sourced reference material appropriately
Demonstrated excellent ability to think critically but did not source reference material appropriately
Demonstrated ability to think critically and sourced reference material appropriately
Demonstrated ability to think critically and did not source reference material appropriately
Did not demonstrate ability to think critically and did not source reference material appropriately
Criteria 3
Demonstrated excellent ability to think critically and sourced reference material appropriately
Demonstrated excellent ability to think critically but did not source reference material appropriately
Demonstrated ability to think critically and sourced reference material appropriately
Demonstrated ability to think critically and did not source reference material appropriately
Did not demonstrate ability to think critically and did not source reference material appropriately
Criteria 4
All elements are present and very well integrated.
Components present with good cohesive
Components present and mostly well integrated
Most components present
Proposal lacks structure.
Criteria 5
Logic is clear and easy to follow with strong arguments
Consistency logical and convincing
Mostly consistent logical and convincing
Adequate cohesion and conviction
Argument is confused and disjointed
Criteria 6
Clear styles with excellent source of references.
Clear referencing style
Generally good referencing style
Sometimes clear referencing style
Lacks consistency with many e
ors
Updated by: Dr. Ammar Alazab XXXXXXXXXXModerated by: Dr Imran Jokhio May 2022
Prepared by: Dr. Ammar Alazab XXXXXXXXXXModerated by: Dr Imran Jokhio May, 2022
ieee_tj_template_17
.docx
[footnoteRef:1] [1: This paragraph of the first footnote will contain the date on which you submitted your paper for review. It will also contain support information, including sponsor and financial support acknowledgment. For example, “This work was supported in part by the U.S. Department of Commerce under Grant BS123456.”
The next few paragraphs should contain the authors’ cu
ent affiliations, including cu
ent address and e-mail. For example, F. A. Author is with the National Institute of Standards and Technology, Boulder, CO 80305 USA (e-mail: author@ boulder.nist.gov).
S. B. Author, Jr., was with Rice University, Houston, TX 77005 USA. He is now with the Department of Physics, Colorado State University, Fort Collins, CO 80523 USA (e-mail: XXXXXXXXXX).
T. C. Author is