ICT740 Assessment 2
Copyright © 2021 KOI, All Rights Reserved. 2
Submission deadline: Week 11
This assessment relates to the following Learning Outcomes:
A. Identify and analyse security vulnerabilities and propose justifiable technical solutions and potential remedy actions based on findings
B. Compare different types of security systems based on functionalities, architectures, configurations, and ethical challenges
In this assignment, you are required to analyses one cybersecurity vulnerability in an organization and conduct a literature review to explore the existing techniques to solve the chosen security problem.
In this information era, every organization either small, medium or large is at the risk of cyber-attacks. According to Cisco’s 2018 SMB Cybersecurity report, small and mid-sized enterprises (SMEs) are more prone to cyber-attacks due to their weak security infrastructure. In 2020-2021 many SMEs adapt to remote working due to the COVID19 pandemic, which put a burden on the security budget of many businesses. Furthermore, working remotely make it difficult to provide the appropriate support against cyber-attacks. Australian Cyber Security Center provides detail about security vulnerabilities, cyber-attacks and attack mitigation techniques for SMEs. These details can be found on https://www.cyber.gov.au/acsc/small-and-medium-businesses.
In this assignment you need to explore the ACSC website and choose one common cybersecurity incident and conduct the literature review to explore the existing prevention/detection/protection techniques for the chosen incident. You also need to develop a risk management framework to enhance the security of the SMEs. The report must be more than 2000 words in length and need to have the following sections:
Individual assignment coversheet
1. Introduction of the Problem
2. Literature Review
a. Known attacks examples
ICT740 Assessment 2
Copyright © 2021 KOI, All Rights Reserved. 3
b. Existing solutions
c. Comparison of existing solutions/Critical Analysis
3. Risk Management Techniques
5. References (Harvard referencing)
Note that this assignment will be submitted using a turn-it-in drop box and a similarity score will be taken into account while grading the assignment. You must provide the proper references and in-text citations throughout the report.
1. You need to put all explanations, diagrams, tables and comparisons in one report (.doc/pdf) file.
2. Submit the report under “Individual Assessment (20%)” Turn-it-in link before the deadline
3. There is a late penalty of 5% of the total available marks per calendar day unless an extension is approved.
ICT740 Assessment 2
Copyright © 2021 KOI, All Rights Reserved. 4
Fail (0 – 49%)
(50 – 64%)
(65 – 74%)
(75 – 84%)
High Distinction (85 – 100%)
Overview of the chosen vulnerability (6 marks)
Very difficult to find the problem in the description, structure not clear, does not meet most requirements
Limited description of the problem, structure is clear, very limited literature review, does not provide support for most of the discussion
Proper description of the problem, structure is quite clear, literature review supports some of the discussion
Good description of the problem, structure is very clear, literature review supports most of the discussion
Outstanding description of the problem, structure is very clear, comprehensive literature review supports all parts of the discussion
Comparison or existing solutions (6 marks)
No comparison made or solutions not from formal resources
Limited comparison made on very few solutions. Solutions lack or formality.
Proper comparison of solutions, not in-depth. Solutions from formal resources but not typical.
Good comparison of solutions, touching at depth to some extent.
Outstanding comparison of solutions. Fully understand the principle of solutions and express the core of them.
Risk management and remediation (5 marks)
No risk management and remediation provided, or very brief, without details. Irrelevant solution given, not support for the position taken or a wrong argument is given
Limited recommendation made in report, lack of details. Incomplete support provided for the position taken in the solution
Effective measures are provided with limited details and ambiguous relevance, provides basic level of support for the position taken in the solution.
Effective and relevant measures are provided with relevant details, provides good level of support for the position taken in the solution.
Effective and relevant security solutions are provided that gives additional insights and theoretical perspective, provides exceptional level of support for the position taken in the solution
Report Organisation (3 marks)
Very difficult to read, unclear structure, and most of the required sections are missing.
Some difficulty in reading, not very clear, but important sections are included.
Clear and readable, and all required sections are included
Well written and very clear, and all required sections with completed discussion are included
Well written and very clear, all required sections with completed discussion are included, and additional sections have been added for clarity
Total Marks out of 20