Assignment 2 - Investigation into Cyber Security Countermeasures
Assignment 2 - Investigation into Cyber Security Countermeasures
Points40
Submittinga media recording
Assignment overview
Value:40%
Group or individual:individual
Presentation Time limit:5 minutes
Required Video Structure:
Record and submission instructions are here:how to record and submit a media assignment video or audioDuration:5 minutes maximum. Any video content exceeding the prescribed duration willNOTbe assessed.
Ensure you speak clearly in the recording and that everything you show and describe are clearly visible to the audience.
DO NOTdo a voice-over on a pre-recorded video. Your recording should be a live video of you talking over your slides. A voice-over of a pre-recorded video will result in a grade of zero and may be reported as contract cheating.
Student Identity Verification is mandatory.If this cannot be made, then your assignment will not be assessed.
Submittingof your PowerPoint file is mandatory. Failure to do will result in a late penalty and/or a grade of zero.
To complete the Student Identity Verification (SIV) process, you are required to record your headshot during the entire duration of the recording and show your ECU Student ID Card to the camera at the start of the recording forfive secondsso that it can be read and verified.
Unit Learning Outcomes:
ULO2 Propose appropriate countermeasures to address contemporary threats and vulnerabilities
ULO3 Evaluate the ethical and legal issues associated with information security and analyse their implications
Situation:
The US Government is proposing acyber security labelling program for smart devices. The program is expected to provide consumers with information about the security of their smart devices. There has been numerous opinions and viewpoints on the usefulness and effectiveness of such a model. The Minister for Cyber Security in Australia has requested that you analyse the proposed program as to whether it would be an effective strategy for Australia to implement.
Task:
To complete the assessment successfully you must:
Identifyandjustifythe threat(s) that such a program could mitigate to individuals. Each identified threat (that the program could mitigate) must be appropriately supported with contemporary evidence, logical reasoning and justification.
Evaluatethe effectiveness of such a program as a countermeasure for individuals.Critiquewhethersuch a countermeasure would improve the cyber security posture for end-users?
Evaluatethe ethical and/or legal challenges that may arise from the proposed program.
Your final submission for this assessmentmustbe aPanopto videoand the accompanyingMicrosoft PowerPointslides. Your submission is not complete until both are submitted.
Tips
You are encouraged to refer to and embed content from sources such as ASD Cyber, OWASP Top Ten, NIST, Australian Cyber Security Centre, US Cert, Deloitte Cyber Reports, and any other Government or corporate cyber security centric reports.
The language and explanations used should be professional, technical and refer to specific technologies, standards, procedures and best practices.
The task will require you to consider the effectiveness of current standards and/or the processes used to support end-users at the moment.
Essential information
Library guide for referencingLinks to an external site.Academic integrityRequesting an extensionRubric
Copy of A2: Investigation into cyber security countermeasures (1)
Copy of A2: Investigation into cyber security countermeasures (1)
Criteria Ratings Pts
This criterion is linked to a learning outcome Analysis and justification of identified threats. 8to >6.0Pts
Good-Excellent
Outstanding and complex analysis of the threats that the proposed program could mitigate. Insightful, persuasive justification that demonstrates why the identified threat would be addressed. 6to >4.0Pts
Satisfactory
Effective analysis of the threats that the proposed program could mitigate. The selected threats have been explained although gaps and inconsistencies in the justification exist, thus a convincing argument has not been presented. 4to >0Pts
Need Improvement
Poor or no analysis of the threats that the proposed program could mitigate. The selected threats are superficial and are not based on synthesis or logical reasoning.
8pts
This criterion is linked to a learning outcomeEvaluation of the effectiveness of the proposed program in improving the cyber security posture for end-users in Australia. 12to >9.0Pts
Good-Excellent
Outstanding evaluation and information synthesis as to how the proposed "program" would effectively address the threats. 9to >6.0Pts
Satisfactory
Sound justification and information synthesis as to how the proposed "program" would effectively address the threats. 6to >0Pts
Need Improvement
Poor, or no justification and information synthesis as to how the proposed "program" would effectively address the threats.
12pts
This criterion is linked to a learning outcomeEvaluation of the ethical and legal challenges with the proposed countermeasure. 8to >6.0Pts
Good-Excellent
A quality, evidence-based synthesis of the ethical, and/or legal challenges that may arise from the proposed has been completed. 6to >4.0Pts
Satisfactory
An attempt has been made to evaluate and reflect on the ethical and/or legal challenges that may arise from the proposed countermeasures. However, a substantiated evidence-based critique was missing. 4to >0Pts
Need Improvement
There is no or minimal evaluation or reflection on the ethical and/or legal challenges that may arise from the proposed countermeasures.
8pts
This criterion is linked to a learning outcomePresentation is communicated using language and diagrams that are professional and appropriate for the target audience. 6to >4.5Pts
Good-Excellent
Shows strong understanding of appropriate structure. Communicates ideas clearly, fluently and with ease throughout the presentation. Uses a wide range of highly effective verbal and non-verbal communication skills and strategies that are very well -suited to the audience and purpose. Use of language is highly appropriate and accurate and enhances communication. The language and diagrams used are professionally communicated and appropriate for the target audience. 4.5to >3.0Pts
Satisfactory
Shows some understanding of appropriate structure. Communicates clearly throughout most of the presentation. Uses a range of effective verbal and non-verbal communication skills and strategies that may not be entirely suited to audience and purpose. Use of language is mostly appropriate and accurate. The language and diagrams used are generally appropriate for the target audience. However, the use of overly simplistic technical terminology diminishes the sophistication of the information. 3to >0Pts
Need Improvement
Does not show understanding of appropriate structure. Does not communicate clearly due to errors in pronunciation, emphasis and /or rhythm, which interfere with understanding. Uses verbal and non-verbal communication skills and strategies that are not suited to audience and purpose. Use of language is inappropriate and/ or inaccurate. The language and diagrams used are ineffective for the target audience.
6pts
This criterion is linked to a learning outcomeAcademic integrity (Originality and student voice). Note: References should be formatted as APA 7th edition style. In-text references should be positioned next to the idea, concept or data being discussed. 6to >4.5Pts
Good-Excellent
Highly skilful use of quality, credible sources to integrate evidence to support highly developed critical argument or discussion. Appropriate use of others work which is adequately and correctly acknowledged. Highly developed in-text and end-text references have been accurately and appropriately used to acknowledge all ideas and topics taken from sources and formatted according to APA 7th edition style. 4.5to >3.0Pts
Satisfactory
An attempt has been made to use credible/relevant sources to integrate evidence with integrity to support student argument or discussion. Good use of others work which is mostly acknowledged. In-text and end-text references have been mostly used accurately and appropriately to acknowledge the ideas and topics taken from sources and formatted according to APA 7th edition style. 3to >0Pts
Need Improvement
No or little attempt to adequately integrate evidence from quality sources with integrity to support student argument or discussion. Inappropriate use of others work which is not acknowledged. In-text and end-text references are either not included or not formatted according to APA 7th edition style.
6pts
Total points:40