Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

CYB401: Cyber Security Threat and Risk Assignment Module Name CYB401: Cyber Security Threat and Risk Assignment Name CYB401: Cyber Security Threat and Risk Assignment Level 4 Plagiarism and...

1 answer below »
CYB401: Cyber Security Threat and Risk Assignment
Module Name CYB401: Cyber Security Threat and Risk
Assignment Name CYB401: Cyber Security Threat and Risk Assignment
Level 4
Plagiarism and Collusion
In submitting the assignment Learner must complete a statement of authenticity
confirming that the work submitted for all tasks is their own. The statement should also
include the word count.
Plagiarism and collusion are treated very seriously. Plagiarism involves presenting
work, excerpts, ideas, or passages of another author without appropriate referencing
and attribution.
Collusion occurs when two or more learners submit work that is so alike in ideas,
content, wording and/or structures that the similarity goes beyond what might have
een mere coincidence.
Referencing
A professional approach to work is expected from all learners. Learners must therefore
identify and acknowledge ALL sources/methodologies/applications used.
The learner must use an appropriate referencing system to achieve this. Marks are not
awarded for the use of English; however, the learner must express ideas clearly and
ensure that appropriate terminology is used to convey accuracy in meaning.
Please use the Harvard Style of Referencing throughout your work.
Appendices
You may include appendices to support your work. However, appendices must only
contain additional supporting information and must be clearly referenced in you
assignment.
CYB401: 1
You may also include tables, graphs, diagrams, Gantt charts, and flowcharts that
support the main report and should be incorporated into the back of the assignment
eport that is submitted.
Any published secondary information such as annual reports and company literature
should be referenced in the main text of the assignment, following Harvard Style
Referencing, and referenced at the end of the assignment.
Confidentiality
When Learners choose to include organisational information that deals with sensitive
material or issues, they must seek advice and permission from that organisation about
its inclusion.
Where confidentiality is an issue, Learners are advised to anonymise their assignment
eport so that it cannot be attributed to that particular organisation.
Word Count Policy
Learners must comply with the required word count, within a margin of +10%. These
ules exclude the index, headings, tables, images, footnotes, appendices, and
information contained within references and bibliographies. When an assessment task
equires learners to produce presentation slides with supporting notes, the word count
applies to the supporting notes only.
Submission of Assignments
-Before submitting your work check you have:
✓ Completed the tasks or activities as required by the assignment
✓ Labeled or numbered each task or activity
✓ Understood and responded to the command ve
s in the Assessment Criteria
✓ Produced the tasks or activities in the required format
✓ Presented your work clearly
✓ Referenced sources you have used and cited from
✓ Put cited material in quotation marks
✓ Checked for any spelling or grammatical e
ors
✓ Added a footer with page numbers
CYB401: 2
Marking and Grades
The details of a standard marking ru
ic can be found at the end of this document.
Unless stated elsewhere, learners must answer all questions in this document.
Assignment Question
Task 1 – 700 words
Understand complex business cyber security threats and risks.
1.1: Analyse major cyber
eaches and methods of attack that have severely impacted
usinesses and public organisations.
1.2: Examine how to calculate the business impact of a suspected or actual cybe
security
each.
Assessment Criteria
1.1: Analyse major cyber
eaches and methods of attack that have severely
impacted businesses and public organisations.
1.2: Examine how to calculate the business impact of a suspected or actual
cyber security
each.
Task 2 – 650 words
Understand recent mega
eaches and explain malware and ransomware attacks.
2.1: Apply threat and risk management concepts and models.
2.2: Explain the terms malware, ransomware and other forms of intentional malicious
cyber attacks.
Assessment Criteria
2.1: Apply threat and risk management concepts and models.
2.2: Explain the terms malware, ransomware and other forms of intentional
malicious cyber attacks.
Task 3 – 650 words
Understand how threats and malicious hackers are advancing and developing
customized intrusion tools.
CYB401: 3
3.1: Discuss the development of customised intrusion tools and their use by malicious
hackers.
3.2: Analyse how an intrusion occu
ed to cause a mega data
each.
Assessment Criteria
3.1: Discuss the development of customised intrusion tools and their use by
malicious hackers.
3.2: Analyse how an intrusion occu
ed to cause a mega data
each.
CYB401: 4
Marking Ru
ic:
Distinguished Excellent Good Proficient Basic Marginal Unacceptable
Criteria XXXXXXXXXX0
Content
(alignment with
assessment
criteria)
Extensive
evaluation and
synthesis of
ideas; includes
substantial
original thinking
Comprehensiv
e critical
evaluation and
synthesis of
ideas; includes
coherent
original
thinking
Adequate
evaluation and
synthesis of
key ideas
eyond basic
descriptions;
includes
original
thinking
Describes
main ideas
with
evidence of
evaluation;
includes
some original
thinking
Describes some
of the main ideas
ut omits some
concepts; limited
evidence of
evaluation;
confused original
thinking
Largely
incomplete
description of
main issues;
misses key
concepts; no
original
thinking
Inadequate
information o
containing
information not
elevant to the
topic
Application of
Theory and
Literature
In-depth,
detailed and
elevant
application of
theory; expertly
integrates
literature to
support ideas
and concept
Clear and
elevant
application of
theory; fully
integrates
literature to
support ideas
and concepts
Appropriate
application of
theory;
integrates
literature to
support ideas
and concepts
Adequate
application of
theory; uses
literature to
support
ideas and
concepts
Limited
application of
theory; refers to
literature but may
not use it
consistently
Confused
application of
theory; does
not use
literature fo
support
Little or no
evidence of
application of
theory and
elevant
literature
Knowledge and
Understanding
Extensive depth
of
understanding
and exploration
eyond key
principles and
concepts
Comprehensiv
e knowledge
and depth of
understanding
key principles
and concepts
Sound
understanding
of
principles and
concepts
Basic
Knowledge
and
understandin
g
of key
concepts and
principles
Limited and
superficial
knowledge and
understanding of
key concepts and
principles
Confused o
inadequate
knowledge
and
understanding
of key
concepts and
principles
Little or no
evidence of
knowledge o
understanding
of key concepts
and principles
Presentation
and Writing
Skills
Logical,
coherent and
polished
presentation
exceeding
expectations at
this level; free
from e
ors in
mechanics and
syntax
Logical,
coherent
presentation
demonstrating
mastery; free
from e
ors in
mechanics
and syntax
Logical
structure to
presentation;
makes few
e
ors in
mechanics and
syntax which
do not prohibit
meaning
Orderly
presentation;
minor e
ors
in mechanics
and syntax
Somewhat weak
presentation;
e
ors in
mechanics and
syntax may
interfere with
meaning
Confused
presentation;
e
ors in
mechanics
and syntax
often interfere
with meaning
Illogical
presentation
lacking
cohesion;
contains
significant e
ors
that interfere
with meaning
Referencing Advanced use
of in- text
citation and
eferences
Mastery of
in-text citation
and
eferencing
Appropriate
use of in-text
citation and
eferencing
Adequate
use of in- text
citation and
eferencing
Limited use of in-
text citation and
eferencing
Inadequate
use of citation
and
eferencing
Little or no
evidence of
appropriate
eferencing o
use of sources
Assessor’s Comments
CYB401: 5
Directions:
Total the boxes and divide by 5 to a
ive at the final mark.
Example:
Distinguished Excellent Good Proficient Basic Marginal Unacceptable
Range XXXXXXXXXX XXXXXXXXXX34
Criteria Score
Content 50
Application of Theory and Literature 40
Knowledge and Understanding 50
Presentation/Writing Skills 40
Referencing 40
Total Score 220/5 = 44, Pass
CYB401: 6
Answered 2 days After Nov 28, 2022

Solution

Shubham answered on Nov 30 2022
43 Votes
CYBER SECURITY THREAT AND RISK ASSIGNMENT
Task 1
1.1 Analysis of cyber
each and method of attacks
The biggest data
each was CAM4 Data
each that happened in the year 2020. This
each has impacted around 10.88 billion people. In this data
each, confidential information of customers was exposed that includes email address, name, chat transcripts, password hashes, payment logs and IP address. In this
each, most of the email addresses were linked with the cloud storage services. If the hacker tries to launch a phishing attack on users then the hacker can easily get deeper and get access to business information and personal photos. The Yahoo Data Breach happened in the year 2017 was the another biggest data
each that has impacted 3 billion customers. The security answers and questions were compromised and it increases the risk of identity theft. This
each has affected multiple users and users were asked to change password and reenter the unencrypted security answers and questions.
The SQL injection attack has mostly impacted the business and attackers go around the vulnerable website to target the stored data and get access to user financial data and credentials. If the attacker directly targets the website user then hackers may get the access to website users. The SQL injection attack includes injecting malicious code into the website. The malicious code used by attackers is injected and it is run in the
owser of the user. It includes the way for injecting malicious code in the website and hackers can easily attack the website. The common ways attackers deploy the cross-site scripting includes use of malicious code into scripts or comments that are run automatically.
Session hijacking is commonly used and the information present on the server is accessed by hackers. In this process, hackers can get the login credentials for accessing the sensitive information (Husák et al. 2018). The session between the remote web server and the computer gives a unique session ID that should stay private. In this attack, hackers captured session ID and posed it at the computer for making a request that provides access to the webs server.
1.2 Calculation of impact of cyber security beach on the business
The calculation of the impact of any cyber security
each is calculated by the number of customer’s data that was put at risk. The cyberattack can put customers away from accessing the website or application. It can also lock out a company's critical database and attackers may demand for ransom for restoring the access. The malware introduced attack may erase, alter or overwrite the database that can cost extensive money, time and other resources. It can cause severe loss to trust of customers, overall reputation and loyalty of the
and (Sarker, 2021). The successful data
each may lead to confidential customer data that are being used for the fraud along with financial activity and identify theft. The Yahoo
each has exposed data of customers and it has defended the business in a big way. The loss of customers includes a drop in sales. Failing trust of investors, critical information theft, decreased valuation of the company and productivity losses. The cost involves the incidence response, vulnerability analysis and escalation.
It includes malicious software that is designed for destroying operations and stealing data. The cost of cyber attack can cripple the business and it can shut down the complete operations that can result in loss of data. It can have the serious effect of a cyberattack that can cause a lack of reputation. The data
each can cause loss of client data including security numbers, credit card diesel and back account information. It can result in loss of trust of clients. It can result in rising the cost for operation of the business (Alshaikh, 2020). The cyber attack can impact both productivity of the organization for the period of time and it can cause crippling losses of revenue. It can also affect the manufacturer’s network with ransomware or malware, rendering the IT systems unusable and it can impact the reputation. The direct loss in sales and revenue that can cause downtime that can create inefficiencies that can...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here