diff_months: 17

Cryptographic Data Protection Assignment

Download Solution Now
Added on: 2022-12-27 13:32:22
Order Code: 466989
Question Task Id: 0
  • Subject Code :

    CSE2SIA

  • Country :

    Australia

Assignment problem

All businesses handle sensitive data as they conduct their operations. Cryptography provides manyways to help protect these data, depending on the data type, data state and the apparent datathreats/attacks. Good security design relies on appropriately assessing the business workflow andthreat landscape in order to implement appropriate controls to mitigate the data threats.

Your task it to model a real business threat scenario identifying any applicable sensitive data.Consider one state of these data in the business environment, and then propose and justifyappropriate cryptographic controls to ensure data integrity and authenticity for this business.

Please select a business scenario (the scenario must be not the same as your Assignment 1) fromthe following list:

  • A GP who provides treatments to her patients through Australian My Health Record(MHR) platform.
  • A bank manager who is providing financial services to his customers.
  • A cybersecurity team lead who verifies roles and responsibilities through Identity andAccess Management (IAM) system as first line of defense.
  • A local clinic with several doctors and nurses specialising in family care.
  • An independent mortgage broker who processes loan applications for customers.
  • A subscription-based video content streaming service for children, allowing subscribers towatch TV shows from multiple devices.

Assignment guidance

You should use approximately 1000 words to cover the following sections (excluding references).

The marking rubric is given below. A suggestion for the template of the assignment is as follows:

  • Introduction explaining the business data and the processing environment (at a high level)based on your chosen scenario. Please include your assumptions to enrich the scenario.
  • Identify and describe the data threats/attacks from the scenario.
  • Appropriate cryptographic controls (to ensure data integrity and authenticity) to mitigatethe identified threats/attacks.
  • Any references used. Referencing and citations should use a format approved by La Trobe.You can follow Harvard referencing style in the text and in the refence list at the end.
  • Please prepare at least 10 slides including above sections.

This Big Data Assignment has been solved by our Big Data Expert at Exam Question Bank. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing Styles. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : Katthy Wills
  • Posted on : December 27th, 2022
  • Downloads : 0
  • Views : 124

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more