Applied Cybersecurity

ICT740
Applied Cybersecurity
Assessment 3
Individual Report
March 2021
ICT740 Assessment 3
Copyright © 2021 KOI, All Rights Reserved. 2
Individual Assessment:
Weightage: 15%
Submission deadline: Week 12
This assessment relates to the following Learning Outcomes:
A. Identify and analyses security vulnerabilities and propose justifiable technical solutions and potential remedy actions based on findings
B. Compare different types of security systems based on functionalities, architectures, configurations, and ethical challenges
Overview
In this assignment, based on the vulnerability identified and analyzed in Assessment 1, you are required to replicate one attack in the lab environment and apply countermeasure techniques to neutralize the vulnerability from further attacks.
According to the Australian Cyber Security Center (ACSC) the most common types of cybersecurity threat are as follows:
1. Malware
2. Phishing
3. Ransomware
4. DDoS Attacks
5. SQL Injection
6. Cloud Service Securities Failures and many more.
https://www.cyber.gov.au/acsc/view-all-content/publications/small-business-cyber-security-guide
In this assignment, you need to explore one type of attack on small and medium-sized businesses (SMEs) and create an attack scenario using Virtual Machines. Explain the reasons why the attack is successful and provide screenshots of the attack. Also, attach the script used to perform the attack.
Furthermore, discuss the countermeasure for such attacks and provide the script/screenshots of your countermeasures. Your report needs to have the following sections:
ICT740 Assessment 3
Copyright © 2021 KOI, All Rights Reserved. 3
Individual assignment coversheet
1. Attack
a. Description of Attack
b. Steps to create an attack.
c. Technical finding and justification
d. Screenshot of the attack
e. Attack Scripts
2. Countermeasure
a. Description of Countermeasure
b. Steps to mitigate attack.
c. Analysis and Justification
d. Screenshot of the actions
e. Countermeasure Scripts
3. Conclusion
4. References (Harvard referencing)
Note that this assignment will be submitted using a turn-it-in drop box and a similarity score will be taken into account while grading the assignment. You must provide the proper references and in-text citations throughout the report.
Submission Guidelines:
1. You need to put all explanations, diagrams, tables and comparisons in one report (.doc/pdf) file.
2. Submit the report under “Individual Assessment (15%)” Turn-it-in link before the deadline
3. There is a late penalty of 5% of the total available marks per calendar day unless an extension is approved.
ICT740 Assessment 3
Copyright © 2021 KOI, All Rights Reserved. 4
Marking Rubric
Criteria
Fail (0 – 49%)
Pass
(50 – 64%)
Credit
(65 – 74%)
Distinction
(75 – 84%)
High Distinction (85 – 100%)
Attack (6 marks)
Not submitted or incomplete with irrelevant screenshots, no analysis and justification provided
Some screenshots of the script and attack are given with irrelevant analysis and justification
Most screenshots of the scripts and attack are given with incomplete analysis and justification
Nearly all screenshots of the scripts and attack are given with complete analysis and justifications
All screenshots of own scripts and attack are given with exceptional analysis and justifications that provides additional support
Countermeasure (6 marks)
Not submitted or incomplete with irrelevant screenshots, no analysis and justification provided for choosing the remedy
Some screenshots of the script and actions are given with irrelevant analysis and no justification for choosing the remedy
Most screenshots of the scripts and actions are given with incomplete analysis and no justification for choosing the remedy
Nearly all screenshots of the scripts and actions are given with complete analysis and justification for choosing the remedy
All screenshots of own scripts and actions are given with exceptional analysis and excellent justification for choosing the remedy that provides additional support
Demonstration (3 marks)
Not given or shown irrelevant, incomplete or ambiguous functionality and features
Some of the features and functionality are shown but some are incomplete
Most of the features and functionality are shown and are mostly complete
All of the features and functionality are shown systematically
All of the features and functionality are shown systematically with additional steps/details
Total Marks out of 15
Comments:


Buy plagiarism free, original and professional custom paper online now at a cheaper price. Submit your order proudly with us



Essay Hope