Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Subject Code and Title ASSESSMENT 2 PART C BRIEF MIS311 Cybersecurity Case Study Report and Presentation: Presentation Group Part C: 6 minute presentation Assessment Individual/Group Length Learning...

1 answer below »
page1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXX

Subject Code and Title

ASSESSMENT 2 PART C BRIEF

page1image XXXXXXXXXXpage1image XXXXXXXXXX

MIS311 Cybersecurity
Case Study Report and Presentation: Presentation Group
Part C: 6 minute presentation

page1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXX

Assessment

page1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXX

Individual/Group

page1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXX

Length

page1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXX

Learning Outcomes

page1image XXXXXXXXXXpage1image XXXXXXXXXX

Submission

The Subject Learning Outcomes demonstrated by successful completion of the task below include:

a) Investigate and analyse the tenets of cybersecurity

b) Identify and communicate a range of threats and vulnerabilities to informational assets.

c) Recommend and justify robust solutions to identified threats and vulnerabilities to cybersecurity

d) Develop own professional practice and ethical standards around security issues and implementation of solutions

page1image XXXXXXXXXX

Due by 11:55pm AEST/AEDT Sunday end of Module 6.1 15%
100 marks

page1image XXXXXXXXXXpage1image XXXXXXXXXXpage1image XXXXXXXXXX

Weighting

page1image XXXXXXXXXXpage1image XXXXXXXXXX

Total Marks

page1image XXXXXXXXXXpage1image XXXXXXXXXX

Assessment Task

The management of the business received your previous reports and decided to invite you to present your analysis to upper management and the board. You are free to discuss any of the elements from assessment 1 or assessment 2 A and B, but you must cover the main outcome of your study, the proposed mitigation scheme, its costings and proposed benefits.

Also include a few sentences on an ethically significant issue associated with cybersecurity practices (suggestion: privacy and government requirements on privacy).

You will be given time of 6 minutes only for your presentation of the main points. (You will actually be recording a 6-minute video.) Each minute over 6 minutes attracts a 10% presentation penalty.

Six minutes is not much time but keep in mind that the business management do not have a technical background, and they only want to know the main points. They should come away with a clear understanding of these. In the video, you will speak to the management as a cybersecurity specialist. A little bit of theatre here will help with presentation marks. Take the exercise seriously: dress as for a board meeting, address comments to Elaine, Jerry, etc. Show your skill as a presenter. A few rehearsals will help greatly. Don’t over promise security but be convincing in your presentation.

Instructions

1. Review your Assessment 2 Part B, focusing on the recommendations.

page1image XXXXXXXXXX

MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1Page1of6

page2image XXXXXXXXXX
  1. Create a 6-minute video presentation

  2. Requirements for the video presentation:

    a. All group members must present in the video presentation.
    b. For authentication purposes, all group members must show their face in the video presentation for at least 1 minute each.
    c. Your presentation must be in video format (mp4, MOV, etc.) for uploading onto Blackboard. There is a lot of free software that can be used to create a group presentation video, e.g. Zoom and Microsoft Teams. You may create a Zoom meeting for the presentation among your group members and record the meeting.

  3. Before submitting your assessment, you should check it against the assessment criteria and the marking rubric included in this specification to ensure that you have satisfactorily addressed all the criteria that will be used to mark your submission.

  4. Download the Group Participation Matrix from Assessment 2 Part C section. Use this document to review your group members’ performance in this assessment and to specify their specific contribution made to the group work. This Group Participation Matrix document needs to be submitted individually through the Assessment 2 Part C submission link.

Referencing

It is essential that you use appropriate APA style for citing and referencing research. Please see more information on referencing in thehttps://library.torrens.edu.au/academicskills/apa/tool

Submission Instructions

Group submission

ï‚§Each team will submit their video via the Assessment link in the main navigation menu in Blackboard. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades. For detailed instructions on compressing (if necessary) and uploading video presentations, see the link on the main Assessments page. After uploading your video presentation, retain a copy in a safe place.

Peer evaluation – Individual Submission

ï‚§Each individual student is to submit a completed Group Participation Matrix document in the Peer Evaluation submission link. Please submit a peer review correctly, as no submission may result in zero grading for this assessment criteria.

Academic Integrity

All students are responsible for ensuring that all work submitted is their own and is appropriately referenced and academically written according to theAcademic Writing Guide. Students also need to have read and be aware of Torrens University Australia Academic Integrity Policy and Procedure and subsequent penalties for academic misconduct. These are viewable online athttp://www.torrens.edu.au/policies-and-forms

Students also must keep a copy of all submitted material and any assessment drafts.

Special Consideration

To apply for special consideration for a modification to an assessment or exam due to unexpected or extenuating circumstances, please consult theAssessment Policy for Higher Education Coursework and ELICOSand, if applicable to your circumstance, submit a completedApplication for Assessment Special Consideration Formto your Learning Facilitator

page2image XXXXXXXXXXpage2image XXXXXXXXXXpage2image XXXXXXXXXXpage2image XXXXXXXXXXpage2image XXXXXXXXXXpage2image XXXXXXXXXXpage2image XXXXXXXXXXpage2image XXXXXXXXXXpage2image XXXXXXXXXX

MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1Page2of6

page3image XXXXXXXXXX

Assessment Rubric

Assessment Attributes

Fail
(Yet to achieve minimum standard) 0-49%

Pass (Functional) 50-64%

Credit (Proficient) 65-74%

Distinction (Advanced) 75-84%

High Distinction (Exceptional XXXXXXXXXX%

Knowledge and Understanding

- Clear presentation of threats - Appropriate discussion of

mitigation
- Appropriate discussion of ethical

issue

Percentage for this criterion = 35%

Little or no understanding of ethical standards around security issues and implementation of solutions.

Key components of the assessment are not addressed.

Understands the fundamentals of ethical standards around security issues and implementation of solutions.

Often confuses assertion of personal opinion with information substantiated by evidence from the research/course materials.

Some of the key components of the assessment are not addressed.

Sound understanding of ethical standards around security issues and implementation of solutions.

Supports personal opinion and information substantiated by evidence from the research/course materials.

All key components of the assessment are addressed with an adequate capacity to explain and apply relevant key concepts.

Very good understanding of ethical standards around security issues and implementation of solutions.

Discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading.

All of the key components are addressed. Well demonstrated capacity to explain and apply relevant key concepts.

Excellent understanding of ethical standards around security issues and implementation of solutions. Systematically and critically discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading.

All of the key components are addressed. Demonstrates mastery and application of key concepts.

page3image XXXXXXXXXX

MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1Page3of6

page4image XXXXXXXXXX

Assessment Attributes

Fail
(Yet to achieve minimum standard) 0-49%

Pass (Functional) 50-64%

Credit (Proficient) 65-74%

Distinction (Advanced) 75-84%

High Distinction (Exceptional XXXXXXXXXX%

Effective Communication

  • - Clear and logical structure

  • - Flow of information

  • - Clarity and quality of verbal

    communication

  • - Good use of time

  • - Appropriate for upper management

    presentation

    Percentage for this criterion = 35%

Difficult to understand for audience, no logical/clear structure, poor flow of ideas, argument lacks supporting evidence.

Audience cannot follow the line of reasoning.

Does not engage the audience or look at the camera. Body language inappropriate or not professional.

Inaccurate information. Inadequate or excessive length.

Information, arguments and evidence are presented in a way that is not always clear and logical.

Line of reasoning is difficult to follow at times.

Speech and tone not always appropriate for audience; however, not throughout the entire presentation.

The presentation is of an acceptable length.

Information, arguments and evidence are well presented, with a mostly clear flow of ideas and arguments.

Line of reasoning is easy to follow.

Uses engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice)

The presentation is of an acceptable length.

Information, arguments and evidence are very well presented; the presentation is logical, clear and well supported by evidence.

Confidently and consistently uses a range of engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice).

Clear and confident delivery.

The presentation is of an acceptable length.

Expertly presented — the presentation is logical, persuasive, and well supported by evidence, demonstrating a clear flow of ideas and arguments. Engages and sustains audience’s interest in the topic.

Dynamic, integrated and professional use of a wide range of engaging presentation techniques (e.g. posture; eye contact; gestures; volume; pitch and pace of voice).

Clear, confident and persuasive delivery. The presentation is of an acceptable length.

Teamwork

Percentage for this criterion = 10%

Does not participate effectively in a team environment.

Participates effectively in teams.

Contributes to small group discussions to

Understands group dynamics and team roles.

Builds team’s identity and commitment. Leads

page4image XXXXXXXXXX

MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1Page4of6

page5image XXXXXXXXXX

Assessment Attributes

Fail
(Yet to achieve minimum standard) 0-49%

Pass (Functional) 50-64%

Credit (Proficient) 65-74%

Distinction (Advanced) 75-84%

High Distinction (Exceptional XXXXXXXXXX%

Places individual goals ahead of the group responsibility.

Hinders the group process and upsets the schedule.

Identifies team and individual goals, tasks, responsibilities and schedules.

Contributes to group processes. Supports the team.

reach agreement on issues.

Works together with others towards shared goals. Renegotiates responsibilities to meet needed change.

Facilitates team development. Renegotiates responsibilities, tasks and schedules to meet needed change.

team. Evaluates teams’ outcomes.

Implements strategies for enhancing team effectiveness.

Content, audience and purpose

  • - Appropriate standard of dress for the occasion (tidy and free of distracting features)

  • - First impression was one of confidence and poise

  • - Speakers attracted audience’s attention from the outset

  • - Little or no fidgeting and few

    distracting mannerisms

  • - Greet the audience courteously,

    and maintained their interest

  • - Presentation met level of

    knowledge and needs of audience

  • - Use of client friendly language

    Percentage for this criterion = 20%

Demonstrates no awareness of context and/or purpose of the assessment.

No effort is made to use client friendly language.

Demonstrates limited awareness of context and/or purpose of the assessment. Demonstrates limited awareness of the context and use of client friendly language.

Demonstrates consistent awareness of context and/or purpose of the assessment. Demonstrates a reasonable awareness of the context and use of client friendly language.

Demonstrates an advanced and integrated understanding of context and/or purpose of the assessment.

Demonstrates a good awareness of the context and use of client friendly language.

Consistently demonstrates a systematic and critical understanding of context and purpose of the assessment.

Demonstrates a thorough awareness of the context and use of client friendly language.

page5image XXXXXXXXXX

MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1Page5of6

page6image XXXXXXXXXXpage6image XXXXXXXXXXpage6image XXXXXXXXXX

The following Subject Learning Outcomes are addressed in this assessment

page6image XXXXXXXXXXpage6image XXXXXXXXXXpage6image XXXXXXXXXX

Investigate and analyse the tenets of cybersecurity
Identify and communicate a range of threats and vulnerabilities to informational assets. Recommend and justify robust solutions to identified threats and vulnerabilities to cybersecurity

SLO d) Develop own professional practice and ethical standards around security issues and implementation of solutions.

SLO a)

page6image XXXXXXXXXXpage6image XXXXXXXXXX

SLO b)

page6image XXXXXXXXXXpage6image XXXXXXXXXX

SLO c)

page6image XXXXXXXXXXpage6image XXXXXXXXXXpage6image XXXXXXXXXXpage6image XXXXXXXXXX

MIS311_Assessment_2_Part C_Brief_Case Study Report_Presentation _Module 6.1Page6of6

Answered 2 days After Aug 14, 2022

Solution

Shubham answered on Aug 16 2022
75 Votes
Question 1
Confidentiality is the first tenet that is designed for preventing unauthorized access to the information. The purpose of this tenet is to keep information private and it will help in ensuring that the information is accessible and visible to authorized individuals.
Integrity is the second tenet that ensures consistency of information. This ensures that the information is protected against unauthorized changes like deletion, additions, and alteration of data. This tenet ensures that data is reliable and ensures that it cannot be modified inco
ectly. It provides protection against malicious activities.
Availability is another tenet that provides protection to the ability of the system for making software system data available according to the needs of users. The purpose of this tenet is for the development of technological infrastructure, data, and applications that are available according to the needs of the organizational process.
Question 2
Insider threats are threats to informational assets and employees with authorized access to the network can misuse the access to negatively affect an organization’s critical data. In this insider threat, employees can intentionally bypass security measures out of ill-considered attempts for becoming more productive. This
eaches cybersecurity protocol and deletes data, exploits, and steals data to sell informational...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here