Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assessment item 2 back to top Research Report task Value: 15% Due Date: 24-Aug-2018 Return Date: 14-Sep-2018 Length: Submission method options: Alternative submission method Task back to top Part A:...

1 answer below »
Assessment item 2
ack to top
Research Report task
Value: 15%
Due Date: 24-Aug-2018
Return Date: 14-Sep-2018
Length:
Submission method options: Alternative submission method
Task
ack to top
Part A: 10 Marks
1. Search the web for news on computer security
eaches that occu
ed during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues:
· What the problem was;
· How and why it occu
ed;
· What could have been done to prevent it?
Length: Around 900 words (Excluding references)
Part B: 10 Marks
Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the following issues:
· What the problem was;
· The scope of the attack;
· Operational details of the attack;
· What could have been done to prevent the attack?
Length: Around 900 words (Excluding references)
Rationale
ack to top
This assessment task will assess the following learning outcome/s:
· be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.
· be able to explain the fundamental concepts of cryptographic algorithms.
· be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
· be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.
Marking criteria and standards
ack to top
    Assessment criteria
    PART A : 10 marks
    Assessable Components
    HD
100% - 85%
    DI
84% - 75%
    CR
74% - 65%
    PS
64% - 50%
    FL
49% - 0
    Search the web for news on computer security
eaches that occu
ed during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues:
· What the problem was;
· How and why it occu
ed;
· What could have been done to prevent it?
    1. The comprehensive report addressing all criteria. Evidence of in-depth research.
 (Value: 95%)  
2. Referenced a wide range of appropriate sources.  
Referencing style co
ectly used.
  (Value: 5%)
    1. The comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
 (Value: 95%) 
 2. Referenced a range of appropriate sources.
 
 Referencing style co
ectly used. Minor e
ors only.
  (Value: 5%)
    
 1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
 (Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style co
ectly used. Some e
ors and omissions.
  (Value: 5%)
    1. The partially complete report addressing most of the criteria. Evidence of research. Some omissions.
 (Value: 95%)    
2. Referenced some appropriate sources.
Referencing style mostly co
ectly used. Some e
ors and omissions.
  (Value: 5%)
    1. Major omissions or inco
ect answers(Value: 95%)
 2. Either no evidence of literature being consulted or cited references i
elevant to the assignment set.
 
 Major e
ors in referencing style.
  (Value: 5%)
    Possible marks
    10.0 – 8.5
    8.4-7.5
    7.49 – 6.5
    6.49 –5.0
    4.99 – 0
    PART B: 10 marks
    Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the following issues:
· What the problem was;
· The scope of the attack;
· Operational details of the attack;
· What could have been done to prevent the attack?
    1. The comprehensive report addressing all criteria. Evidence of in-depth research.
 (Value: 95%)
 
 2. Referenced a wide range of appropriate sources.
 
 Referencing style co
ectly used.
 (Value: 5%)
    1. The comprehensive report addressing all criteria. Evidence of in-depth research. Minor omissions only.
 (Value: 95%)
2. Referenced a range of appropriate sources.
 
 Referencing style co
ectly used. Minor e
ors only.
 (Value: 5%)
    1. Mostly well-researched and well-presented report addressing all criteria. Some omissions.
 (Value: 95%)
2. Referenced a range of appropriate sources.
Referencing style co
ectly used. Some e
ors and omissions.
 (Value: 5%)
    1. The partially complete report addressing most of the criteria. Evidence of research. Some omissions.
 (Value: 95%)
2. Referenced some appropriate sources.
Referencing style mostly co
ectly used. Some e
ors and omissions.
 (Value: 5%)
    1. Major omissions or inco
ect answers.
 (Value: 95%)
2.  Either no evidence of literature being consulted or cited references i
elevant to the assignment set.
 
 Major e
ors in referencing style.
 (Value: 5%)
    Possible marks
    10.0 – 8.5
    8.4-7.5
     XXXXXXXXXX
     XXXXXXXXXX
     XXXXXXXXXX
Presentation
ack to top
· Assessment MUST be submitted as ONE MS Word file via Turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments may be marked and feedback may be generated using MS Word-based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting.
· Your answers to the questions should be precise but complete and informative.
· Each question should be answered individually with the co
esponding label to indicate the tasks completed e.g. Task 1 a.
· APA reference style must be used throughout the document, with the  Reference list not counted in the page limit. APA referencing guide can be found  in http:
student.csu.edu.au/study
eferencing-at-csu
· A cover page must be included and should contain relevant identifying information (Student name, Student ID#, Subject Code, Subject name, Session and Assessment Number).
Answered Same Day Aug 05, 2020

Solution

Kuldeep answered on Aug 10 2020
135 Votes
Running head: Cyber Crime
Cyber Crime
Cyber Crime
Student Name:
Student ID:
Subject Code:
Subject Name:
Session and Assessment number:
Contents
Part A:    3
What the problem was;    3
How and why it occu
ed;    4
What could have been done to prevent it?    5
Part B    6
What the problem was;    6
The scope of the attack;    7
Operational details of the attack;    7
What could have been done to prevent the attack?    8
References    10
Part A:
What the problem was;
At least 87 million records
eached (though likely many more)
Date disclosed: March 17, 2018 
Who can disremember about the data outrage that Facebook shocked in March 2018? There were reports at that time that political data company named Cam
idge Analytica collects the personal information of about fifty million of Facebook users through an application setting out the personality, social networking and participation on platform. Although Cam
idge Analytica claims that it has merely 30 million users, Facebook has determined that the initial estimation was actually very low (Frenkel & Roose, 2018). In April, the corporation announced its 87 million followers that their information was shared. Unfortunately, as the Facebook app gets a more accurate overview, Cam
idge Analytica outrage can only be the tip of an iceberg. On 27 June, security researcher Inti De Ceukelaire announced another application known as Nametests.com which revealed information from more than 120 million users (Houser & Voss, 2018).
The problem began in March when the $ 500 billion company previously recognized that the investigation company Cam
idge Analytica, closely related to President Trump's campaign and legal companies, uses data collected by millions of users lacking their permission (Kowolenko&Vouk, 2018).
Facebook is still criticized by investors and commentators, as stock prices decline - the company's market value fell only by $ 50 billion in the first week. The scandal has been exposed as the biggest two-day decline in history. At the same time, lawmakers in the United States and the UK asked Zucke
erg to explain how his company's approach could get answers in the testimony next week.
How and why it occu
ed;
Last weekend, it was revealed that Cam
idge Analytics had illegally collected personal data on 50 million Facebook profiles. It all began in year 2015 when Cam
idge psychology lecturer named Alexander Cogan formed an app named "This is your digital life." The app is personality test, defined by Dr. Kogan as "a research application utilized by psychologists."
His company, Global Science Research, and Cam
idge Analytica reached an agreement to share this information. About 270,000 Facebook users signed up and received a reward for a personality test that could be stored by the company. But things here are getting riskier: the app also collects information about the user's Facebook friends, and unless they have already signed up for the app, they don't agree to store their private information. This was revealed by Christopher Wylie, a reporter and analyst who worked with Cam
idge Analytica. "We used the Facebook to gatherprofiles of millions of people." and develop models to take benefit of our understanding of them and direct their internal demons. This is a foundation for the whole company. "The program depends on the consent of its users on behalf of all friends - or at least those whose privacy settings allow to share with friends' programs - to receive more limited information (Graham-Ha
ison & Cadwalladr, 2018)". It is reported that this information is used to determine the 2016 pre-election Voter behavior, and the Brexit campaign in the early years of the year. The report shows that more than 50 million people have harvested data without permission.
Facebook faces the pressure to be more transparent about how third-party companies may or may use their user data. Critics say the scandal highlights its continuing problems to understand how others are dealing with its platform. According to reports, since 2015, the social media giant has known that this information has been harvested, but has not taken any measures to protect its users. The network tried to imply that it was deceived, and those participants should not lie about deleting the data. In a series of tweets that have been deleted, Facebook's chief officer, Alex...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here